CompTIA CS0-001 CompTIA CySA+ Certification Exam Online Training
CompTIA CS0-001 Online Training
The questions for CS0-001 were last updated at Nov 11,2024.
- Exam Code: CS0-001
- Exam Name: CompTIA CySA+ Certification Exam
- Certification Provider: CompTIA
- Latest update: Nov 11,2024
A system administrator recently deployed and verified the installation of a critical patch issued by the company’s primary OS vendor. This patch was supposed to remedy a vulnerability that would allow an adversary to remotely execute code from over the network. However, the administrator just ran a vulnerability assessment of networked systems, and each of them still reported having the same vulnerability .
Which of the following is the MOST likely explanation for this?
- A . The administrator entered the wrong IP range for the assessment.
- B . The administrator did not wait long enough after applying the patch to run the assessment.
- C . The patch did not remediate the vulnerability.
- D . The vulnerability assessment returned false positives.
Management is concerned with administrator access from outside the network to a key server in the company. Specifically, firewall rules allow access to the server from anywhere in the company .
Which of the following would be an effective solution?
- A . Honeypot
- B . Jump box
- C . Server hardening
- D . Anti-malware
As part of an upcoming engagement for a client, an analyst is configuring a penetration testing application to ensure the scan complies with information defined in the SOW .
Which of the following types of information should be considered based on information traditionally found in the SOW? (Select two.)
- A . Timing of the scan
- B . Contents of the executive summary report
- C . Excluded hosts
- D . Maintenance windows
- E . IPS configuration
- F . Incident response policies
A security analyst is reviewing the following log after enabling key-based authentication.
Given the above information, which of the following steps should be performed NEXT to secure the system?
- A . Disable anonymous SSH logins.
- B . Disable password authentication for SSH.
- C . Disable SSHv1.
- D . Disable remote root SSH logins.
A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website.
During the troubleshooting process, the network administrator notices that the web gateway proxy on the local network has signed all of the certificates on the local machine.
Which of the following describes the type of attack the proxy has been legitimately programmed to perform?
- A . Transitive access
- B . Spoofing
- C . Man-in-the-middle
- D . Replay
A security professional is analyzing the results of a network utilization report.
The report includes the following information:
Which of the following servers needs further investigation?
- A . hr.dbprod.01
- B . R&D.file.srvr.01
- C . mrktg.file.srvr.02
- D . web.srvr.03
After analyzing and correlating activity from multiple sensors, the security analyst has determined a group from a high-risk country is responsible for a sophisticated breach of the company network and continuous administration of targeted attacks for the past three months. Until now, the attacks went unnoticed.
This is an example of:
- A . privilege escalation.
- B . advanced persistent threat.
- C . malicious insider threat.
- D . spear phishing.
After running a packet analyzer on the network, a security analyst has noticed the following output:
Which of the following is occurring?
- A . A ping sweep
- B . A port scan
- C . A network map
- D . A service discovery
An alert has been distributed throughout the information security community regarding a critical Apache vulnerability .
Which of the following courses of action would ONLY identify the known vulnerability?
- A . Perform an unauthenticated vulnerability scan on all servers in the environment.
- B . Perform a scan for the specific vulnerability on all web servers.
- C . Perform a web vulnerability scan on all servers in the environment.
- D . Perform an authenticated scan on all web servers in the environment.
Which of the following is a control that allows a mobile application to access and manipulate information which should only be available by another application on the same mobile device (e.g. a music application posting the name of the current song playing on the device on a social media site)?
- A . Co-hosted application
- B . Transitive trust
- C . Mutually exclusive access
- D . Dual authentication