CompTIA CS0-001 CompTIA CySA+ Certification Exam Online Training
CompTIA CS0-001 Online Training
The questions for CS0-001 were last updated at Jan 03,2025.
- Exam Code: CS0-001
- Exam Name: CompTIA CySA+ Certification Exam
- Certification Provider: CompTIA
- Latest update: Jan 03,2025
A cybersecurity analyst has received a report that multiple systems are experiencing slowness as a result of a DDoS attack .
Which of the following would be the BEST action for the cybersecurity analyst to perform?
- A . Continue monitoring critical systems.
- B . Shut down all server interfaces.
- C . Inform management of the incident.
- D . Inform users regarding the affected systems.
An analyst has received unusual alerts on the SIEM dashboard. The analyst wants to get payloads that the hackers are sending toward the target systems without impacting the business operation .
Which of the following should the analyst implement?
- A . Honeypot
- B . Jump box
- C . Sandboxing
- D . Virtualization
A reverse engineer was analyzing malware found on a retailer’s network and found code extracting track data in memory .
Which of the following threats did the engineer MOST likely uncover?
- A . POS malware
- B . Rootkit
- C . Key logger
- D . Ransomware
An HR employee began having issues with a device becoming unresponsive after attempting to open an email attachment. When informed, the security analyst became suspicious of the situation, even though there was not any unusual behavior on the IDS or any alerts from the antivirus software .
Which of the following BEST describes the type of threat in this situation?
- A . Packet of death
- B . Zero-day malware
- C . PII exfiltration
- D . Known virus
Which of the following is MOST effective for correlation analysis by log for threat management?
- A . PCAP
- B . SCAP
- C . IPS
- D . SIEM
A cybersecurity analyst is reviewing the current BYOD security posture. The users must be able to synchronize their calendars, email, and contacts to a smartphone or other personal device. The recommendation must provide the most flexibility to users .
Which of the following recommendations would meet both the mobile data protection efforts and the business requirements described in this scenario?
- A . Develop a minimum security baseline while restricting the type of data that can be accessed.
- B . Implement a single computer configured with USB access and monitored by sensors.
- C . Deploy a kiosk for synchronizing while using an access list of approved users.
- D . Implement a wireless network configured for mobile device access and monitored by sensors.
A security analyst is adding input to the incident response communication plan. A company officer has suggested that if a data breach occurs, only affected parties should be notified to keep an incident from becoming a media headline .
Which of the following should the analyst recommend to the company officer?
- A . The first responder should contact law enforcement upon confirmation of a security incident in order for a forensics team to preserve chain of custody.
- B . Guidance from laws and regulations should be considered when deciding who must be notified in order to avoid fines and judgements from non-compliance.
- C . An externally hosted website should be prepared in advance to ensure that when an incident occurs victims have timely access to notifications from a non-compromised recourse.
- D . The HR department should have information security personnel who are involved in the investigation of the incident sign non-disclosure agreements so the company cannot be held liable for customer data that might be viewed during an investigation.
An organization has recently recovered from an incident where a managed switch had been accessed and reconfigured without authorization by an insider. The incident response team is working on developing a lessons learned report with recommendations .
Which of the following recommendations will BEST prevent the same attack from occurring in the future?
- A . Remove and replace the managed switch with an unmanaged one.
- B . Implement a separate logical network segment for management interfaces.
- C . Install and configure NAC services to allow only authorized devices to connect to the network.
- D . Analyze normal behavior on the network and configure the IDS to alert on deviations from normal.
A technician is running an intensive vulnerability scan to detect which ports are open to exploit. During the scan, several network services are disabled and production is affected .
Which of the following sources would be used to evaluate which network service was interrupted?
- A . Syslog
- B . Network mapping
- C . Firewall logs
- D . NIDS
A cybersecurity analyst is completing an organization’s vulnerability report and wants it to reflect assets accurately .
Which of the following items should be in the report?
- A . Processor utilization
- B . Virtual hosts
- C . Organizational governance
- D . Log disposition
- E . Asset isolation