CompTIA CS0-001 CompTIA CySA+ Certification Exam Online Training
CompTIA CS0-001 Online Training
The questions for CS0-001 were last updated at Nov 11,2024.
- Exam Code: CS0-001
- Exam Name: CompTIA CySA+ Certification Exam
- Certification Provider: CompTIA
- Latest update: Nov 11,2024
Which of the following represent the reasoning behind careful selection of the timelines and time-of-day boundaries for an authorized penetration test? (Select TWO).
- A . To schedule personnel resources required for test activities
- B . To determine frequency of team communication and reporting
- C . To mitigate unintended impacts to operations
- D . To avoid conflicts with real intrusions that may occur
- E . To ensure tests have measurable impact to operations
Company A permits visiting business partners from Company B to utilize Ethernet ports available in Company A’s conference rooms. This access is provided to allow partners the ability to establish VPNs back to Company B’s network. The security architect for Company A wants to ensure partners from Company B are able to gain direct Internet access from available ports only, while Company A employees can gain access to the Company A internal network from those same ports .
Which of the following can be employed to allow this?
- A . ACL
- B . SIEM
- C . MAC
- D . NAC
- E . SAML
DRAG DROP
You suspect that multiple unrelated security events have occurred on several nodes on a corporate network. You must review all logs and correlate events when necessary to discover each security event by clicking on each node. Only select corrective actions if the logs shown a security event that needs remediation. Drag and drop the appropriate corrective actions to mitigate the specific security event occurring on each affected device.
Instructions:
The Web Server, Database Server, IDS, Development PC, Accounting PC and Marketing PC are clickable. Some actions may not be required and each actions can only be used once per node. The corrective action order is not important. If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.
Using a heuristic system to detect an anomaly in a computer’s baseline, a system administrator was able to detect an attack even though the company signature based IDS and antivirus did not detect it. Further analysis revealed that the attacker had downloaded an executable file onto the company PC from the USB port, and executed it to trigger a privilege escalation flaw .
Which of the following attacks has MOST likely occurred?
- A . Cookie stealing
- B . Zero-day
- C . Directory traversal
- D . XML injection
An application development company released a new version of its software to the public. A few days after the release, the company is notified by end users that the application is notably slower, and older security bugs have reappeared in the new release. The development team has decided to include the security analyst during their next development cycle to help address the reported issues .
Which of the following should the security analyst focus on to remedy the existing reported problems?
- A . The security analyst should perform security regression testing during each application development cycle.
- B . The security analyst should perform end user acceptance security testing during each application development cycle.
- C . The security analyst should perform secure coding practices during each application development cycle.
- D . The security analyst should perform application fuzzing to locate application vulnerabilities during each application development cycle.
A security analyst has been asked to remediate a server vulnerability.
Once the analyst has located a patch for the vulnerability, which of the following should happen NEXT?
- A . Start the change control process.
- B . Rescan to ensure the vulnerability still exists.
- C . Implement continuous monitoring.
- D . Begin the incident response process.
A recent vulnerability scan found four vulnerabilities on an organization’s public Internet-facing IP addresses.
Prioritizing in order to reduce the risk of a breach to the organization, which of the following should be remediated FIRST?
- A . A cipher that is known to be cryptographically weak.
- B . A website using a self-signed SSL certificate.
- C . A buffer overflow that allows remote code execution.
- D . An HTTP response that reveals an internal IP address.
Datacenter access is controlled with proximity badges that record all entries and exits from the datacenter.
The access records are used to identify which staff members accessed the data center in the event of equipment theft.
Which of the following MUST be prevented in order for this policy to be effective?
- A . Password reuse
- B . Phishing
- C . Social engineering
- D . Tailgating
A cybersecurity analyst is conducting a security test to ensure that information regarding the web server is protected from disclosure.
The cybersecurity analyst requested an HTML file from the web server, and the response came back as follows:
Which of the following actions should be taken to remediate this security issue?
- A . Set “Allowlatescanning” to 1 in the URLScan.ini configuration file.
- B . Set “Removeserverheader” to 1 in the URLScan.ini configuration file.
- C . Set “Enablelogging” to 0 in the URLScan.ini configuration file.
- D . Set “Perprocesslogging” to 1 in the URLScan.ini configuration file.
A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization’s internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The statement of work specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indication weaknesses in the infrastructure.
The scope of activity as described in the statement of work is an example of:
- A . session hijacking
- B . vulnerability scanning
- C . social engineering
- D . penetration testing
- E . friendly DoS