CompTIA CS0-002 CompTIA Cybersecurity Analyst (CySA+) Certification Exam Online Training
CompTIA CS0-002 Online Training
The questions for CS0-002 were last updated at Jan 07,2025.
- Exam Code: CS0-002
- Exam Name: CompTIA Cybersecurity Analyst (CySA+) Certification Exam
- Certification Provider: CompTIA
- Latest update: Jan 07,2025
The Chief Information Officer (CIO) of a large healthcare institution is concerned about all machines having direct access to sensitive patient information.
Which of the following should the security analyst implement to BEST mitigate the risk of sensitive data exposure?
- A . A cloud access service broker system
- B . NAC to ensure minimum standards are met
- C . MFA on all workstations
- D . Network segmentation
Ransomware is identified on a company’s network that affects both Windows and MAC hosts. The command and control channel for encryption for this variant uses TCP ports from 11000 to 65000. The channel goes to good1. Iholdbadkeys.com, which resolves to IP address 72.172.16.2.
Which of the following is the MOST effective way to prevent any newly infected systems from actually encrypting the data on connected network drives while causing the least disruption to normal Internet traffic?
- A . Block all outbound traffic to web host good1 iholdbadkeys.com at the border gateway.
- B . Block all outbound TCP connections to IP host address 172.172.16.2 at the border gateway.
- C . Block all outbound traffic on TCP ports 11000 to 65000 at the border gateway.
- D . Block all outbound traffic on TCP ports 11000 to 65000 to IP host address 172.172.16.2 at the border gateway.
During a routine log review, a security analyst has found the following commands that cannot be identified from the Bash history log on the root user.
Which of the following commands should the analyst investigate FIRST?
- A . Line 1
- B . Line 2
- C . Line 3
- D . Line 4
- E . Line 5
- F . Line 6
A company’s senior human resources administrator left for another position, and the assistant administrator was promoted into the senior position. On the official start day, the new senior administrator planned to ask for extended access permissions but noticed the permissions were automatically granted on that day.
Which of the following describes the access management policy in place at the company?
- A . Mandatory-based
- B . Host-based
- C . Federated access
- D . Role-based
A company recently experienced a break-in whereby a number of hardware assets were stolen through unauthorized access at the back of the building.
Which of the following would BEST prevent this type of theft from occurring in the future?
- A . Motion detection
- B . Perimeter fencing
- C . Monitored security cameras
- D . Badged entry
Which of the following sets of attributes BEST illustrates the characteristics of an insider threat from a security perspective?
- A . Unauthorized, unintentional, benign
- B . Unauthorized, intentional, malicious
- C . Authorized, intentional, malicious
- D . Authorized, unintentional, benign
An analyst needs to provide a recommendation that will allow a custom-developed application to have full access to the system’s processors and peripherals but still be contained securely from other applications that will be developed.
Which of the following is the BEST technology for the analyst to recommend?
- A . Software-based drive encryption
- B . Hardware security module
- C . Unified Extensible Firmware Interface
- D . Trusted execution environment
An organization developed a comprehensive incident response policy. Executive management approved the policy and its associated procedures.
Which of the following activities would be MOST beneficial to evaluate personnel’s familiarity with incident response procedures?
- A . A simulated breach scenario involving the incident response team
- B . Completion of annual information security awareness training by all employees
- C . Tabletop activities involving business continuity team members
- D . Completion of lessons-learned documentation by the computer security incident response team
- E . External and internal penetration testing by a third party
A company just chose a global software company based in Europe to implement a new supply chain management solution.
Which of the following would be the MAIN concern of the company?
- A . Violating national security policy
- B . Packet injection
- C . Loss of intellectual property
- D . International labor laws
A security analyst receives an alert to expect increased and highly advanced cyberattacks originating from a foreign country that recently had sanctions implemented.
Which of the following describes the type of threat actors that should concern the security analyst?
- A . Hacktivist
- B . Organized crime
- C . Insider threat
- D . Nation-state
Thank you for this test, Greatful :):)