Download CompTIA CSA+ Certification Exam.CS0-001.Lead2Pass.2019-01-31.157q.tqb

Vendor: CompTIA
Exam Code: CS0-001
Exam Name: CompTIA CSA+ Certification Exam
Date: Jan 31, 2019
File Size: 4 MB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
A recent vulnerability scan found four vulnerabilities on an organization’s public Internet-facing IP addresses. Prioritizing in order to reduce the risk of a breach to the organization, which of the following should be remediated FIRST?
  1. A cipher that is known to be cryptographically weak.
  2. A website using a self-signed SSL certificate.
  3. A buffer overflow that allows remote code execution.
  4. An HTTP response that reveals an internal IP address.
Correct answer: C
Question 2
A security professional is analyzing the results of a network utilization report. The report includes the following information:
  
Which of the following servers needs further investigation?
  1. hr.dbprod.01
  2. R&D.file.srvr.01
  3. mrktg.file.srvr.02
  4. web.srvr.03
Correct answer: A
Question 3
A cybersecurity analyst has several SIEM event logs to review for possible APT activity. The analyst was given several items that include lists of indicators for both IP addresses and domains. Which of the following actions is the BEST approach for the analyst to perform?
  1. Use the IP addresses to search through the event logs.
  2. Analyze the trends of the events while manually reviewing to see if any of the indicators match.
  3. Create an advanced query that includes all of the indicators, and review any of the matches.
  4. Scan for vulnerabilities with exploits known to have been used by an APT.
Correct answer: B
Question 4
A system administrator has reviewed the following output:
  
Which of the following can a system administrator infer from the above output?
  1. The company email server is running a non-standard port.
  2. The company email server has been compromised.
  3. The company is running a vulnerable SSH server.
  4. The company web server has been compromised.
Correct answer: A
Question 5
An analyst has received unusual alerts on the SIEM dashboard. The analyst wants to get payloads that the hackers are sending toward the target systems without impacting the business operation. Which of the following should the analyst implement?
  1. Honeypot
  2. Jump box
  3. Sandboxing
  4. Virtualization
Correct answer: A
Question 6
An analyst finds that unpatched servers have undetected vulnerabilities because the vulnerability scanner does not have the latest set of signatures. Management directed the security team to have personnel update the scanners with the latest signatures at least 24 hours before conducting any scans, but the outcome is unchanged. Which of the following is the BEST logical control to address the failure?
  1. Configure a script to automatically update the scanning tool.
  2. Manually validate that the existing update is being performed.
  3. Test vulnerability remediation in a sandbox before deploying.
  4. Configure vulnerability scans to run in credentialed mode.
Correct answer: A
Question 7
A cybersecurity analyst has received an alert that well-known “call home” messages are continuously observed by network sensors at the network boundary. The proxy firewall successfully drops the messages. After determining the alert was a true positive, which of the following represents the MOST likely cause?
  1. Attackers are running reconnaissance on company resources.
  2. An outside command and control system is attempting to reach an infected system.
  3. An insider is trying to exfiltrate information to a remote network.
  4. Malware is running on a company system.
Correct answer: B
Question 8
Which of the following items represents a document that includes detailed information on when an incident was detected, how impactful the incident was, and how it was remediated, in addition to incident response effectiveness and any identified gaps needing improvement?
  1. Forensic analysis report
  2. Chain of custody report
  3. Trends analysis report
  4. Lessons learned report
Correct answer: D
Question 9
After scanning the main company’s website with the OWASP ZAP tool, a cybersecurity analyst is reviewing the following warning:
  
The analyst reviews a snippet of the offending code:
  
 
Which of the following is the BEST course of action based on the above warning and code snippet?
  1. The analyst should implement a scanner exception for the false positive.
  2. The system administrator should disable SSL and implement TLS.
  3. The developer should review the code and implement a code fix.
  4. The organization should update the browser GPO to resolve the issue.
Correct answer: D
Question 10
An alert has been distributed throughout the information security community regarding a critical Apache vulnerability. Which of the following courses of action would ONLY identify the known vulnerability?
  1. Perform an unauthenticated vulnerability scan on all servers in the environment.
  2. Perform a scan for the specific vulnerability on all web servers.
  3. Perform a web vulnerability scan on all servers in the environment.
  4. Perform an authenticated scan on all web servers in the environment.
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!