CompTIA CS0-002 CompTIA Cybersecurity Analyst (CySA+) Certification Exam Online Training
CompTIA CS0-002 Online Training
The questions for CS0-002 were last updated at Jan 07,2025.
- Exam Code: CS0-002
- Exam Name: CompTIA Cybersecurity Analyst (CySA+) Certification Exam
- Certification Provider: CompTIA
- Latest update: Jan 07,2025
Which of the following data security controls would work BEST to prevent real Pll from being used in an organization’s test cloud environment?
- A . Digital rights management
- B . Encryption
- C . Access control
- D . Data loss prevention
- E . Data masking
An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the organization’s production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer in operation. The analyst documents the activities and verifies these actions prevent remote exploitation of the vulnerability.
Which of the following would be the MOST appropriate to remediate the controller?
- A . Segment the network to constrain access to administrative interfaces.
- B . Replace the equipment that has third-party support.
- C . Remove the legacy hardware from the network.
- D . Install an IDS on the network between the switch and the legacy equipment.
Which of the following types of policies is used to regulate data storage on the network?
- A . Password
- B . Acceptable use
- C . Account management
- D . Retention
The security team at a large corporation is helping the payment-processing team to prepare for a regulatory compliance audit and meet the following objectives:
✑ Reduce the number of potential findings by the auditors.
✑ Limit the scope of the audit to only devices used by the payment-processing team for activities directly impacted by the regulations.
✑ Prevent the external-facing web infrastructure used by other teams from coming into scope.
✑ Limit the amount of exposure the company will face if the systems used by the payment-processing team are compromised.
Which of the following would be the MOST effective way for the security team to meet these objectives?
- A . Limit the permissions to prevent other employees from accessing data owned by the business unit.
- B . Segment the servers and systems used by the business unit from the rest of the network.
- C . Deploy patches to all servers and workstations across the entire organization.
- D . Implement full-disk encryption on the laptops used by employees of the payment-processing team.
A Chief Information Security Officer (CISO) wants to upgrade an organization’s security posture by improving proactive activities associated with attacks from internal and external threats.
Which of the following is the MOST proactive tool or technique that feeds incident response capabilities?
- A . Development of a hypothesis as part of threat hunting
- B . Log correlation, monitoring, and automated reporting through a SIEM platform
- C . Continuous compliance monitoring using SCAP dashboards
- D . Quarterly vulnerability scanning using credentialed scans
A security analyst is reviewing the logs from an internal chat server. The chat.log file is too large to review manually, so the analyst wants to create a shorter log file that only includes lines associated with a user demonstrating anomalous activity.
Below is a snippet of the log:
Which of the following commands would work BEST to achieve the desired result?
- A . grep -v chatter14 chat.log
- B . grep -i pythonfun chat.log
- C . grep -i javashark chat.log
- D . grep -v javashark chat.log
- E . grep -v pythonfun chat.log
- F . grep -i chatter14 chat.log
A proposed network architecture requires systems to be separated from each other logically based on defined risk levels.
Which of the following explains the reason why an architect would set up the network this way?
- A . To complicate the network and frustrate a potential malicious attacker
- B . To reduce the number of IP addresses that are used on the network
- C . To reduce the attack surface of those systems by segmenting the network based on risk
- D . To create a design that simplifies the supporting network
As a proactive threat-hunting technique, hunters must develop situational cases based on likely attack scenarios derived from the available threat intelligence information.
After forming the basis of the scenario, which of the following may the threat hunter construct to establish a framework for threat assessment?
- A . Critical asset list
- B . Threat vector
- C . Attack profile
- D . Hypothesis
A security analyst received a series of antivirus alerts from a workstation segment, and users reported ransomware messages. During lessons-learned activities, the analyst determines the antivirus was able to alert to abnormal behavior but did not stop this newest variant of ransomware.
Which of the following actions should be taken to BEST mitigate the effects of this type of threat in the future?
- A . Enabling application blacklisting
- B . Enabling sandboxing technology
- C . Purchasing cyber insurance
- D . Installing a firewall between the workstations and Internet
A security analyst is looking at the headers of a few emails that appear to be targeting all users at an organization:
Which of the following technologies would MOST likely be used to prevent this phishing attempt?
- A . DNSSEC
- B . DMARC
- C . STP
- D . S/IMAP
Thank you for this test, Greatful :):)