CompTIA CS0-001 CompTIA CySA+ Certification Exam Online Training
CompTIA CS0-001 Online Training
The questions for CS0-001 were last updated at Nov 12,2024.
- Exam Code: CS0-001
- Exam Name: CompTIA CySA+ Certification Exam
- Certification Provider: CompTIA
- Latest update: Nov 12,2024
Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?
- A . Blue team training exercises
- B . Technical control reviews
- C . White team training exercises
- D . Operational control reviews
Which of the following commands would a security analyst use to make a copy of an image for forensics use?
- A . dd
- B . wget
- C . touch
- D . rm
A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through an unknown proxy.
This type of attack is known as which of the following?
- A . Phishing
- B . Social engineering
- C . Man-in-the-middle
- D . Shoulder surfing
File integrity monitoring states the following files have been changed without a written request or approved change.
The following change has been made:
chmod 777 CRv /usr
Which of the following may be occurring?
- A . The ownership pf /usr has been changed to the current user.
- B . Administrative functions have been locked from users.
- C . Administrative commands have been made world readable/writable.
- D . The ownership of/usr has been changed to the root user.
An analyst finds that unpatched servers have undetected vulnerabilities because the vulnerability scanner does not have the latest set of signatures. Management directed the security team to have personnel update the scanners with the latest signatures at least 24 hours before conducting any scans, but the outcome is unchanged .
Which of the following is the BEST logical control to address the failure?
- A . Configure a script to automatically update the scanning tool.
- B . Manually validate that the existing update is being performed.
- C . Test vulnerability remediation in a sandbox before deploying.
- D . Configure vulnerability scans to run in credentialed mode.
A system administrator who was using an account with elevated privileges deleted a large amount of log files generated by a virtual hypervisor in order to free up disk space. These log files are needed by the security team to analyze the health of the virtual machines.
Which of the following compensating controls would help prevent this from reoccurring? (Select two.)
- A . Succession planning
- B . Separation of duties
- C . Mandatory vacation
- D . Personnel training
- E . Job rotation
Which of the following actions should occur to address any open issues while closing an incident involving various departments within the network?
- A . Incident response plan
- B . Lessons learned report
- C . Reverse engineering process
- D . Chain of custody documentation
Which of the following items represents a document that includes detailed information on when an incident was detected, how impactful the incident was, and how it was remediated, in addition to incident response effectiveness and any identified gaps needing improvement?
- A . Forensic analysis report
- B . Chain of custody report
- C . Trends analysis report
- D . Lessons learned report
A web application has a newly discovered vulnerability in the authentication method used to validate known company users. The user ID of Admin with a password of “password” grants elevated access to the application over the Internet .
Which of the following is the BEST method to discover the vulnerability before a production deployment?
- A . Manual peer review
- B . User acceptance testing
- C . Input validation
- D . Stress test the application
An organization is requesting the development of a disaster recovery plan. The organization has grown and so has its infrastructure. Documentation, policies, and procedures do not exist .
Which of the following steps should be taken to assist in the development of the disaster recovery plan?
- A . Conduct a risk assessment.
- B . Develop a data retention policy.
- C . Execute vulnerability scanning.
- D . Identify assets.