New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CS0-002 Exam Dumps - CompTIA CySA+ Certification Exam (CS0-002)

Go to page:
Question # 57

Which of the following is a reason for correctly identifying APTs that might be targeting an organization?

A.

APTs' passion for social justice will make them ongoing and motivated attackers.

B.

APTs utilize methods and technologies differently than other threats

C.

APTs are primarily focused on financial gam and are widely available over the internet.

D.

APTs lack sophisticated methods, but their dedication makes them persistent.

Full Access
Question # 58

Given the Nmap request below:

Which of the following actions will an attacker be able to initiate directly against this host?

A.

Password sniffing

B.

ARP spoofing

C.

A brute-force attack

D.

An SQL injection

Full Access
Question # 59

An analyst needs to provide recommendations based on a recent vulnerability scan:

Which of the following should the analyst recommend addressing to ensure potential vulnerabilities are identified?

A.

SMB use domain SID to enumerate users

B.

SYN scanner

C.

SSL certificate cannot be trusted

D.

Scan not performed with admin privileges

Full Access
Question # 60

During a risk assessment, a senior manager inquires about what the cost would be if a unique occurrence would impact the availability of a critical service. The service generates $1 ,000 in revenue for the organization. The impact of the attack would affect 20% of the server's capacity to perform jobs. The organization expects that five out of twenty attacks would succeed during the year. Which of the following is the calculated single loss expectancy?

A.

$200

B.

$800

C.

$5,000

D.

$20,000

Full Access
Question # 61

An organization has the following risk mitigation policies

• Risks without compensating controls will be mitigated first it the nsk value is greater than $50,000

• Other nsk mitigation will be pnontized based on risk value.

The following risks have been identified:

Which of the following is the ordei of priority for risk mitigation from highest to lowest?

A.

A, C, D, B

B.

B, C, D, A

C.

C, B, A, D

D.

C. D, A, B

E.

D, C, B, A

Full Access
Question # 62

Which of the following SCAP standards provides standardization tor measuring and describing the seventy of security-related software flaws?

A.

OVAL

B.

CVSS

C.

CVE

D.

CCE

Full Access
Question # 63

A security analyst is looking at the headers of a few emails that appear to be targeting all users at an organization:

Which of the following technologies would MOST likely be used to prevent this phishing attempt?

A.

DNSSEC

B.

DMARC

C.

STP

D.

S/IMAP

Full Access
Question # 64

An application must pass a vulnerability assessment to move to the next gate. Consequently, any security issues that are found must be remediated prior to the next gate. Which of the following best describes the method for end-to-end vulnerability assessment?

A.

Security regression testing

B.

Static analysis

C.

Dynamic analysis

D.

Stress testing

Full Access
Go to page: