Download CompTIA CSA+ Certification Exam.CS0-001.BrainDumps.2018-09-22.97q.tqb

Vendor: CompTIA
Exam Code: CS0-001
Exam Name: CompTIA CSA+ Certification Exam
Date: Sep 22, 2018
File Size: 2 MB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
A security analyst has created an image of a drive from an incident. Which of the following describes what the analyst should do NEXT? 
  1. The analyst should create a backup of the drive and then hash the drive.
  2. The analyst should begin analyzing the image and begin to report findings.
  3. The analyst should create a hash of the image and compare it to the original drive’s hash.
  4. The analyst should create a chain of custody document and notify stakeholders.
Correct answer: C
Question 2
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered for the username: 0xbfff601a. 
Which of the following attacks may be occurring?
  1. Buffer overflow attack
  2. Man-in-the-middle attack
  3. Smurf attack
  4. Format string attack
  5. Denial of service attack
Correct answer: D
Question 3
External users are reporting that a web application is slow and frequently times out when attempting to submit information. 
Which of the following software development best practices would have helped prevent this issue?
  1. Stress testing
  2. Regression testing
  3. Input validation
  4. Fuzzing
Correct answer: A
Question 4
After completing a vulnerability scan, the following output was noted:
  
Which of the following vulnerabilities has been identified?
  1. PKI transfer vulnerability.
  2. Active Directory encryption vulnerability.
  3. Web application cryptography vulnerability.
  4. VPN tunnel vulnerability.
Correct answer: C
Question 5
A security analyst is adding input to the incident response communication plan. A company officer has suggested that if a data breach occurs, only affected parties should be notified to keep an incident from becoming a media headline. Which of the following should the analyst recommend to the company officer?
  1. The first responder should contact law enforcement upon confirmation of a security incident in order for a forensics team to preserve chain of custody.
  2. Guidance from laws and regulations should be considered when deciding who must be notified in order to avoid fines and judgements from non-compliance.
  3. An externally hosted website should be prepared in advance to ensure that when an incident occurs victims have timely access to notifications from a non- 
    compromised recourse.
  4. The HR department should have information security personnel who are involved in the investigation of the incident sign non-disclosure agreements so the 
    company cannot be held liable for customer data that might be viewed during an investigation.
Correct answer: A
Question 6
A company has recently launched a new billing invoice website for a few key vendors. The cybersecurity analyst is receiving calls that the website is performing slowly and the pages sometimes time out. The analyst notices the website is receiving millions of requests, causing the service to become unavailable. 
Which of the following can be implemented to maintain the availability of the website?
  1. VPN
  2. Honeypot
  3. Whitelisting
  4. DMZ
  5. MAC filtering
Correct answer: C
Question 7
A cybersecurity analyst has received the laptop of a user who recently left the company. The analyst types ‘history’ into the prompt, and sees this line of code in the 
latest bash history:
  
This concerns the analyst because this subnet should not be known to users within the company. 
Which of the following describes what this code has done on the network?
  1. Performed a ping sweep of the Class C network.
  2. Performed a half open SYB scan on the network.
  3. Sent 255 ping packets to each host on the network.
  4. Sequentially sent an ICMP echo reply to the Class C network.
Correct answer: A
Question 8
Due to new regulations, a company has decided to institute an organizational vulnerability management program and assign the function to the security team. 
Which of the following frameworks would BEST support the program? (Select two.)
  1. COBIT
  2. NIST
  3. ISO 27000 series
  4. ITIL
  5. OWASP
Correct answer: BD
Question 9
A system administrator recently deployed and verified the installation of a critical patch issued by the company’s primary OS vendor. This patch was supposed to remedy a vulnerability that would allow an adversary to remotely execute code from over the network. However, the administrator just ran a vulnerability assessment of networked systems, and each of them still reported having the same vulnerability. Which of the following is the MOST likely explanation for this?
  1. The administrator entered the wrong IP range for the assessment.
  2. The administrator did not wait long enough after applying the patch to run the assessment.
  3. The patch did not remediate the vulnerability.
  4. The vulnerability assessment returned false positives.
Correct answer: C
Question 10
An incident response report indicates a virus was introduced through a remote host that was connected to corporate resources. A cybersecurity analyst has been 
asked for a recommendation to solve this issue. Which of the following should be applied? 
  1. MAC
  2. TAP
  3. NAC
  4. ACL
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!