Download CompTIA CSA+ Certification Exam.CS0-001.BrainDumps.2018-05-02.82q.tqb

Vendor: CompTIA
Exam Code: CS0-001
Exam Name: CompTIA CSA+ Certification Exam
Date: May 02, 2018
File Size: 1 MB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
A cybersecurity analyst is conducting a security test to ensure that information regarding the web server is protected from disclosure. The cybersecurity analyst requested an HTML file from the web server, and the response came back as follows:
  
 
Which of the following actions should be taken to remediate this security issue?
  1. Set “Allowlatescanning” to 1 in the URLScan.ini configuration file.
  2. Set “Removeserverheader” to 1 in the URLScan.ini configuration file.
  3. Set “Enablelogging” to 0 in the URLScan.ini configuration file.
  4. Set “Perprocesslogging” to 1 in the URLScan.ini configuration file.
Correct answer: B
Explanation:
ref: http://www.acunetix.com/blog/articles/configure-web-server-disclose-identity/
ref: http://www.acunetix.com/blog/articles/configure-web-server-disclose-identity/
Question 2
An analyst has initiated an assessment of an organization’s security posture. As a part of this review, the analyst would like to determine how much information about the organization is exposed externally. Which of the following techniques would BEST help the analyst accomplish this goal? (Select two.)
  1. Fingerprinting
  2. DNS query log reviews
  3. Banner grabbing
  4. Internet searches
  5. Intranet portal reviews
  6. Sourcing social network sites
  7. Technical control audits
Correct answer: AF
Question 3
A cybersecurity professional typed in a URL and discovered the admin panel for the e-commerce application is accessible over the open web with the default password. Which of the following is the MOST secure solution to remediate this vulnerability?
  1. Rename the URL to a more obscure name, whitelist all corporate IP blocks, and require two-factor authentication.
  2. Change the default password, whitelist specific source IP addresses, and require two-factor authentication.
  3. Whitelist all corporate IP blocks, require an alphanumeric passphrase for the default password, and require two-factor authentication.
  4. Change the username and default password, whitelist specific source IP addresses, and require two-factor authentication.
Correct answer: D
Question 4
An organization is requesting the development of a disaster recovery plan. The organization has grown and so has its infrastructure. Documentation, policies, and procedures do not exist. Which of the following steps should be taken to assist in the development of the disaster recovery plan?
  1. Conduct a risk assessment.
  2. Develop a data retention policy.
  3. Execute vulnerability scanning.
  4. Identify assets.
Correct answer: D
Question 5
A company wants to update its acceptable use policy (AUP) to ensure it relates to the newly implemented password standard, which requires sponsored authentication of guest wireless devices. Which of the following is MOST likely to be incorporated in the AUP?
  1. Sponsored guest passwords must be at least ten characters in length and contain a symbol.
  2. The corporate network should have a wireless infrastructure that uses open authentication standards.
  3. Guests using the wireless network should provide valid identification when registering their wireless devices.
  4. The network should authenticate all guest users using 802.1x backed by a RADIUS or LDAP server.
Correct answer: C
Question 6
An analyst was tasked with providing recommendations of technologies that are PKI X.509 compliant for a variety of secure functions. Which of the following technologies meet the compatibility requirement? (Select three.)
  1. 3DES
  2. AES
  3. IDEA
  4. PKCS
  5. PGP
  6. SSL/TLS
  7. TEMPEST
Correct answer: BDF
Question 7
After completing a vulnerability scan, the following output was noted:
  
 
Which of the following vulnerabilities has been identified?
  1. PKI transfer vulnerability.
  2. Active Directory encryption vulnerability.
  3. Web application cryptography vulnerability.
  4. VPN tunnel vulnerability.
Correct answer: C
Question 8
A security analyst is adding input to the incident response communication plan. A company officer has suggested that if a data breach occurs, only affected parties should be notified to keep an incident from becoming a media headline. Which of the following should the analyst recommend to the company officer?
  1. The first responder should contact law enforcement upon confirmation of a security incident in order for a forensics team to preserve chain of custody.
  2. Guidance from laws and regulations should be considered when deciding who must be notified in order to avoid fines and judgements from non-compliance.
  3. An externally hosted website should be prepared in advance to ensure that when an incident occurs victims have timely access to notifications from a non-compromised recourse.
  4. The HR department should have information security personnel who are involved in the investigation of the incident sign non-disclosure agreements so the company cannot be held liable for customer data that might be viewed during an investigation.
Correct answer: A
Question 9
A company has recently launched a new billing invoice website for a few key vendors. The cybersecurity analyst is receiving calls that the website is performing slowly and the pages sometimes time out. The analyst notices the website is receiving millions of requests, causing the service to become unavailable. Which of the following can be implemented to maintain the availability of the website?
  1. VPN
  2. Honeypot
  3. Whitelisting
  4. DMZ
  5. MAC filtering
Correct answer: C
Question 10
A cybersecurity analyst has received the laptop of a user who recently left the company. The analyst types ‘history’ into the prompt, and sees this line of code in the latest bash history:
  
 
This concerns the analyst because this subnet should not be known to users within the company. Which of the following describes what this code has done on the network?
  1. Performed a ping sweep of the Class C network.
  2. Performed a half open SYB scan on the network.
  3. Sent 255 ping packets to each host on the network.
  4. Sequentially sent an ICMP echo reply to the Class C network.
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!