CompTIA CS0-002 CompTIA Cybersecurity Analyst (CySA+) Certification Exam Online Training
CompTIA CS0-002 Online Training
The questions for CS0-002 were last updated at Jan 06,2025.
- Exam Code: CS0-002
- Exam Name: CompTIA Cybersecurity Analyst (CySA+) Certification Exam
- Certification Provider: CompTIA
- Latest update: Jan 06,2025
An analyst is reviewing the following code output of a vulnerability scan:
Which of the following types of vulnerabilities does this MOST likely represent?
- A . A insecure direct object reference vulnerability
- B . An HTTP response split vulnerability
- C . A credential bypass vulnerability
- D . A XSS vulnerability
A user receives a potentially malicious email that contains spelling errors and a PDF document. A security analyst reviews the email and decides to download the attachment to a Linux sandbox for review.
Which of the following commands would MOST likely indicate if the email is malicious?
- A . sha256sum ~/Desktop/file.pdf
- B . file ~/Desktop/file.pdf
- C . strings ~/Desktop/file.pdf | grep "<script"
- D . cat < ~/Desktop/file.pdf | grep -i .exe
A security analyst is reviewing the following web server log:
Which of the following BEST describes the issue?
- A . Directory traversal exploit
- B . Cross-site scripting
- C . SQL injection
- D . Cross-site request forgery
A remote code execution vulnerability was discovered in the RDP. An organization currently uses RDP for remote access to a portion of its VDI environment. The analyst verified network-level authentication is enabled.
Which of the following is the BEST remediation for this vulnerability?
- A . Verify the latest endpoint-protection signature is in place.
- B . Verify the corresponding patch for the vulnerability is installed^
- C . Verify the system logs do not contain indicator of compromise.
- D . Verify the threat intelligence feed is updated with the latest solutions
A company recently experienced financial fraud, which included shared passwords being compromised and improper levels of access being granted. The company has asked a security analyst to help improve its controls.
Which of the following will MOST likely help the security analyst develop better controls?
- A . An evidence summarization
- B . An indicator of compromise
- C . An incident response plan
- D . A lessons-learned report
Understanding attack vectors and integrating intelligence sources are important components of:
- A . proactive threat hunting
- B . risk management compliance.
- C . a vulnerability management plan.
- D . an incident response plan.
An information security analyst is working with a data owner to identify the appropriate controls to preserve the confidentiality of data within an enterprise environment One of the primary concerns is exfiltration of data by malicious insiders.
Which of the following controls is the MOST appropriate to mitigate risks?
- A . Data deduplication
- B . OS fingerprinting
- C . Digital watermarking
- D . Data loss prevention
Joe, a penetration tester, used a professional directory to identify a network administrator and ID administrator for a client’s company. Joe then emailed the network administrator, identifying himself as the ID administrator, and asked for a current password as part of a security exercise.
Which of the following techniques were used in this scenario?
- A . Enumeration and OS fingerprinting
- B . Email harvesting and host scanning
- C . Social media profiling and phishing
- D . Network and host scanning
An analyst wants to identify hosts that are connecting to the external FTP servers and what, if any, passwords are being used.
Which of the following commands should the analyst use?
- A . tcpdump CX dst port 21
- B . ftp ftp.server Cp 21
- C . nmap Co ftp.server Cp 21
- D . telnet ftp.server 21
A security analyst needs to assess the web server versions on a list of hosts to determine which are running a vulnerable version of the software and output that list into an XML file named webserverlist.xml. The host list is provided in a file named webserverlist.txt.
Which of the following Nmap commands would BEST accomplish this goal?
- A . nmap -iL webserverlist.txt -sC -p 443 -oX webserverlist.xml
- B . nmap -iL webserverlist.txt -sV -p 443 -oX webserverlist.xml
- C . nmap -iL webserverlist.txt -F -p 443 -oX webserverlist.xml
- D . nmap –takefile webserverlist.txt –outputfileasXML webserverlist.xml Cscanports 443
Thank you for this test, Greatful :):)