CompTIA CS0-002 CompTIA Cybersecurity Analyst (CySA+) Certification Exam Online Training
CompTIA CS0-002 Online Training
The questions for CS0-002 were last updated at Jan 05,2025.
- Exam Code: CS0-002
- Exam Name: CompTIA Cybersecurity Analyst (CySA+) Certification Exam
- Certification Provider: CompTIA
- Latest update: Jan 05,2025
While analyzing network traffic, a security analyst discovers several computers on the network are connecting to a malicious domain that was blocked by a DNS sinkhole. A new private IP range is now visible, but no change requests were made to add it.
Which of the following is the BEST solution for the security analyst to implement?
- A . Block the domain IP at the firewall.
- B . Blacklist the new subnet
- C . Create an IPS rule.
- D . Apply network access control.
A security analyst has a sample of malicious software and needs to know what the sample does. The analyst runs the sample in a carefully controlled and monitored virtual machine to observe the software behavior.
Which of the following malware analysis approaches is this?
- A . White box testing
- B . Fuzzing
- C . Sandboxing
- D . Static code analysis
A security analyst is generating a list of recommendations for the company’s insecure API.
Which of the following is the BEST parameter mitigation rec?
- A . Implement parameterized queries.
- B . Use effective authentication and authorization methods.
- C . Validate all incoming data.
- D . Use TLs for all data exchanges.
The steering committee for information security management annually reviews the security incident register for the organization to look for trends and systematic issues. The steering committee wants to rank the risks based on past incidents to improve the security program for next year Below is the incident register for the organization.
Which of the following should the organization consider investing in FIRST due to the potential impact of availability?
- A . Hire a managed service provider to help with vulnerability management
- B . Build a warm site in case of system outages
- C . Invest in a failover and redundant system, as necessary
- D . Hire additional staff for the IT department to assist with vulnerability management and log review
Which of the following technologies can be used to house the entropy keys for disk encryption on desktops and laptops?
- A . Self-encrypting drive
- B . Bus encryption
- C . TPM
- D . HSM
During an incident investigation, a security analyst acquired a malicious file that was used as a backdoor but was not detected by the antivirus application. After performing a reverse-engineering procedure, the analyst found that part of the code was obfuscated to avoid signature detection.
Which of the following types of instructions should the analyst use to understand how the malware was obfuscated and to help deobfuscate it?
- A . MOV
- B . ADD
- C . XOR
- D . SUB
- E . MOVL
A user’s computer has been running slowly when the user tries to access web pages.
A security analyst runs the command netstat -aon from the command line and receives the following output:
Which of the following lines indicates the computer may be compromised?
- A . Line 1
- B . Line 2
- C . Line 3
- D . Line 4
- E . Line 5
- F . Line 6
An information security analyst is reviewing backup data sets as part of a project focused on eliminating archival data sets.
Which of the following should be considered FIRST prior to disposing of the electronic data?
- A . Sanitization policy
- B . Data sovereignty
- C . Encryption policy
- D . Retention standards
A security analyst is investigating a system compromise. The analyst verities the system was up to date on OS patches at the time of the compromise.
Which of the following describes the type of vulnerability that was MOST likely expiated?
- A . Insider threat
- B . Buffer overflow
- C . Advanced persistent threat
- D . Zero day
Which of the following would MOST likely be included in the incident response procedure after a security breach of customer PII?
- A . Human resources
- B . Public relations
- C . Marketing
- D . Internal network operations center
Thank you for this test, Greatful :):)