Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CS0-001 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is CS0-002

CS0-001 Exam Dumps - CompTIA CySA+ Certification Exam

Go to page:
Question # 65

A security analyst is assisting with a computer crime investigation and has been asked to secure a PC and deliver it to the forensic lab. Which of the following items would be MOST helpful to secure the PC? (Choose three.)

A.

Tamper-proof seals

B.

Faraday cage

C.

Chain of custody form

D.

Drive eraser

E.

Write blockers

F.

Network tap

G.

Multimeter

Full Access
Question # 66

Which of the following systems would be at the GREATEST risk of compromise if found to have an open vulnerability associated with perfect forward secrecy?

A.

Endpoints

B.

VPN concentrators

C.

Virtual hosts

D.

SIEM

E.

Layer 2 switches

Full Access
Question # 67

A security administrator has uncovered a covert channel used to exfiltrate confidential data from an internal database server through a compromised corporate web server. Ongoing exfiltration is accomplished by embedding a small amount of data extracted from the database into the metadata of images served by the web server. File timestamps suggest that the server was initially compromised six months ago using a common server misconfiguration. Which of the following BEST describes the type of threat being used?

A.

APT

B.

Zero-day attack

C.

Man-in-the-middle attack

D.

XSS

Full Access
Question # 68

A security analyst at a large financial institution is evaluating the security posture of a smaller financial company. The analyst is performing the evaluation as part of a due diligence process prior to a potential acquisition. With which of the following threats should the security analyst be MOST concerned? (Choose two.)

A.

Breach of confidentiality and market risks can occur if the potential acquisition is leaked to the press.

B.

The parent company is only going through this process to identify and steal the intellectual property of the smaller company.

C.

Employees at the company being acquired will be hostile to the security analyst and may not provide honest answers.

D.

Employees at the company being acquired will be hostile to the security analyst and may not provide honest answers.

E.

The industry regulator may decide that the acquisition will result in unfair competitive advantage if the acquisition were to take place.

F.

The company being acquired may already be compromised and this could pose a risk to the parent company’s assets.

Full Access
Go to page: