Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CS0-001 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is CS0-002

CS0-001 Exam Dumps - CompTIA CySA+ Certification Exam

Go to page:
Question # 41

A technician receives a report that a user’s workstation is experiencing no network connectivity. The technician investigates and notices the patch cable running the back of the user’s VoIP phone is routed directly under the rolling chair and has been smashed flat over time.

Which of the following is the most likely cause of this issue?

A.

Cross-talk

B.

Electromagnetic interference

C.

Excessive collisions

D.

Split pairs

Full Access
Question # 42

A system administrator who was using an account with elevated privileges deleted a large amount of log files generated by a virtual hypervisor in order to free up disk space. These log files are needed by the security team to analyze the health of the virtual machines. Which of the following compensating controls would help prevent this from reoccurring? (Select two.)

A.

Succession planning

B.

Separation of duties

C.

Mandatory vacation

D.

Personnel training

E.

Job rotation

Full Access
Question # 43

A vulnerability scan has returned the following information:

Which of the following describes the meaning of these results?

A.

There is an unknown bug in a Lotus server with no Bugtraq ID.

B.

Connecting to the host using a null session allows enumeration of share names.

C.

Trend Micro has a known exploit that must be resolved or patched.

D.

No CVE is present, so it is a false positive caused by Lotus running on a Windows server.

Full Access
Question # 44

An HR employee began having issues with a device becoming unresponsive after attempting to open an email attachment. When informed, the security analyst became suspicious of the situation, even though there was not any unusual behavior on the IDS or any alerts from the antivirus software. Which of the following BEST describes the type of threat in this situation?

A.

Packet of death

B.

Zero-day malware

C.

PII exfiltration

D.

Known virus

Full Access
Question # 45

An analyst wants to use a command line tool to identify open ports and running services on a host along with the application that is associated with those services and port. Which of the following should the analyst use?

A.

Wireshark

B.

Qualys

C.

netstat

D.

nmap

E.

ping

Full Access
Question # 46

An application development company released a new version of its software to the public. A few days after the release, the company is notified by end users that the application is notably slower, and older security bugs have reappeared in the new release. The development team has decided to include the security analyst during their next development cycle to help address the reported issues. Which of the following should the security analyst focus on to remedy the existing reported problems?

A.

The security analyst should perform security regression testing during each application development cycle.

B.

The security analyst should perform end user acceptance security testing during each application development cycle.

C.

The security analyst should perform secure coding practices during each application development cycle.

D.

The security analyst should perform application fuzzing to locate application vulnerabilities during each application development cycle.

Full Access
Question # 47

After running a packet analyzer on the network, a security analyst has noticed the following output:

Which of the following is occurring?

A.

A ping sweep

B.

A port scan

C.

A network map

D.

A service discovery

Full Access
Question # 48

After analyzing and correlating activity from multiple sensors, the security analyst has determined a group from a high-risk country is responsible for a sophisticated breach of the company network and continuous administration of targeted attacks for the past three months. Until now, the attacks went unnoticed. This is an example of:

A.

privilege escalation.

B.

advanced persistent threat.

C.

malicious insider threat.

D.

spear phishing.

Full Access
Go to page: