CompTIA CS0-002 CompTIA Cybersecurity Analyst (CySA+) Certification Exam Online Training
CompTIA CS0-002 Online Training
The questions for CS0-002 were last updated at Jan 06,2025.
- Exam Code: CS0-002
- Exam Name: CompTIA Cybersecurity Analyst (CySA+) Certification Exam
- Certification Provider: CompTIA
- Latest update: Jan 06,2025
A small electronics company decides to use a contractor to assist with the development of a new FPGA-based device. Several of the development phases will occur off-site at the contractor’s labs.
Which of the following is the main concern a security analyst should have with this arrangement?
- A . Making multiple trips between development sites increases the chance of physical damage to the FPGAs.
- B . Moving the FPGAs between development sites will lessen the time that is available for security testing.
- C . Development phases occurring at multiple sites may produce change management issues.
- D . FPGA applications are easily cloned, increasing the possibility of intellectual property theft.
An organization wants to move non-essential services into a cloud computing environment. Management has a cost focus and would like to achieve a recovery time objective of 12 hours.
Which of the following cloud recovery strategies would work BEST to attain the desired outcome?
- A . Duplicate all services in another instance and load balance between the instances.
- B . Establish a hot site with active replication to another region within the same cloud provider.
- C . Set up a warm disaster recovery site with the same cloud provider in a different region
- D . Configure the systems with a cold site at another cloud provider that can be used for failover.
During an investigation, an analyst discovers the following rule in an executive’s email client:
IF * TO <[email protected]> THEN mailto: <[email protected]>
SELECT FROM ‘sent’ THEN DELETE FROM <[email protected]>
The executive is not aware of this rule.
Which of the following should the analyst do FIRST to evaluate the potential impact of this security incident?
- A . Check the server logs to evaluate which emails were sent to <[email protected]>
- B . Use the SIEM to correlate logging events from the email server and the domain server
- C . Remove the rule from the email client and change the password
- D . Recommend that management implement SPF and DKIM
A security analyst is supporting an embedded software team.
Which of the following is the BEST recommendation to ensure proper error handling at runtime?
- A . Perform static code analysis.
- B . Require application fuzzing.
- C . Enforce input validation
- D . Perform a code review
Because some clients have reported unauthorized activity on their accounts, a security analyst is reviewing network packet captures from the company’s API server.
A portion of a capture file is shown below:
POST /services/v1_0/Public/Members.svc/soap <s:Envelope+xmlns:s="http://schemas.s/soap/envelope/"><s:Body><GetIPLocation+xmlns="http://tempuri.org/">
<request+xmlns:a="http://schemas.somesite.org"+xmlns:i="http://www.w3.org/2001/XMLSchema-instance"></s:Body></s:Envelope> 192.168.1.22 –api.somesite.com 200 0 1006 1001 0 192.168.1.22
POST /services/v1_0/Public/Members.svc/soap <<a:Password>Password123</a:Password><a:ResetPasswordToken+i:nil="true"/> <a:ShouldImpersonatedAuthenticationBePopulated+i:nil="true"/><a:Username>[email protected]</a:Username></request></Login></s:Body></s:Envelope> 192.168.5.66 –api.somesite.com 200 0 11558 1712 2024 192.168.4.89
POST /services/v1_0/Public/Members.svc/soap <s:Envelope+xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetIPLocation+xmlns="http://tempuri.org/"> <a:IPAddress>516.7.446.605</a:IPAddress><a:ZipCode+i:nil="true"/></request></GetIPLocation></s:Body></s:Envelope> 192.168.1.22 –api.somesite.com 200 0 1003 1011 307 192.168.1.22
POST /services/v1_0/Public/Members.svc/soap <s:Envelope+xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><IsLoggedIn+xmlns="http://tempuri.org/"> <request+xmlns:a="http://schemas.datacontract.org/2004/07/somesite.web+xmlns:i="http://www.w3.org/2001/XMLSchema-instance"><a:Authentication> <a:ApiToken>kmL4krg2CwwWBan5BReGv5Djb7syxXTNKcWFuSjd</a:ApiToken><a:ImpersonateUserId>0</a:ImpersonateUserId><a:LocationId>161222</a:LocationId> <a:NetworkId>4</a:NetworkId><a:ProviderId>”1=1</a:ProviderId><a:UserId>13026046</a:UserId></a:Authentication></request></IsLoggedIn></s:Body></s:Envelope> 192.168.5.66 –api.somesite.com 200 0 1378 1209 48 192.168.4.89
Which of the following MOST likely explains how the clients’ accounts were compromised?
- A . The clients’ authentication tokens were impersonated and replayed.
- B . The clients’ usernames and passwords were transmitted in cleartext.
- C . An XSS scripting attack was carried out on the server.
- D . A SQL injection attack was carried out on the server.
A security analyst is auditing firewall rules with the goal of scanning some known ports to check the firewall’s behavior and responses.
The analyst executes the following commands:
The analyst then compares the following results for port 22:
nmap returns “Closed”
hping3 returns “flags=RA”
Which of the following BEST describes the firewall rule?
- A . DNAT C-to-destination 1.1.1.1:3000
- B . REJECT with C-tcp-reset
- C . LOG C-log-tcp-sequence
- D . DROP
A security analyst recently used Arachni to perform a vulnerability assessment of a newly developed web application.
The analyst is concerned about the following output:
Which of the following is the MOST likely reason for this vulnerability?
- A . The developer set input validation protection on the specific field of search.aspx.
- B . The developer did not set proper cross-site scripting protections in the header.
- C . The developer did not implement default protections in the web application build.
- D . The developer did not set proper cross-site request forgery protections.
A cybersecurity analyst needs to rearchitect the network using a firewall and a VPN server to achieve the highest level of security.
To BEST complete this task, the analyst should place the:
- A . firewall behind the VPN server
- B . VPN server parallel to the firewall
- C . VPN server behind the firewall
- D . VPN on the firewall
Which of the following technologies can be used to house the entropy keys for task encryption on desktops and laptops?
- A . Self-encrypting drive
- B . Bus encryption
- C . TPM
- D . HSM
When attempting to do a stealth scan against a system that does not respond to ping, which of the following Nmap commands BEST accomplishes that goal?
- A . nmap CsA CO <system> -noping
- B . nmap CsT CO <system> -P0
- C . nmap CsS CO <system> -P0
- D . nmap CsQ CO <system> -P0
Thank you for this test, Greatful :):)