最新的CompTIA Cybersecurity Analyst (CySA+) Certification - CS0-001免費考試真題

問題1
A company has received the results of an external vulnerability scan from its approved scanning vendor. The company is required to remediate these vulnerabilities for clients within 72 hours of acknowledgement of the scan results.
Which of the following contract breaches would result if this remediation is not provided for clients within the time frame?

正確答案: B
問題2
A vulnerability scan returned the following results for a web server that hosts multiple wiki sites:
Apache-HTTPD-cve-2014-023: Apache HTTPD: mod_cgid denial of service CVE-2014-0231 Due to a flaw found in mog_cgid, a server using mod_cgid to host CGI scripts could be vulnerable to a DoS attack caused by a remote attacker who is exploiting a weakness in non-standard input, causing processes to hang indefinitely.

The security analyst has confirmed the server hosts standard CGI scripts for the wiki sites, does not have mod_cgid installed, is running Apache 2.2.22, and is not behind a WAF. The server is located in the DMZ, and the purpose of the server is to allow customers to add entries into a publicly accessible database.
Which of the following would be the MOST efficient way to address this finding?

正確答案: B
問題3
A security analyst discovers a network intrusion and quickly solves the problem by closing an unused port. Which of the following should be completed?

正確答案: B
問題4
A security analyst reported a cross-site request forgery vulnerability while reviewing a web application. Which of the following anti-forgery token implementation techniques would BEST help remediate the vulnerability without causing performance concerns?

正確答案: D
問題5
Which of the following systems would be at the GREATEST risk of compromise if found to have an open vulnerability associated with perfect forward secrecy?

正確答案: E
問題6
During a routine network scan, a security administrator discovered an unidentified service running on a new embedded and unmanaged HVAC controller, which is used to monitor the company's datacenter:

The enterprise monitoring service requires SNMP and SNMPTRAP connectivity to operate. Which of the following should the security administrator implement to harden the system?

正確答案: C
問題7
A threat intelligence analyst who works for a technology firm received this report from a vendor.
"There has been an intellectual property theft campaign executed against organizations in the technology industry. Indicators for this activity are unique to each intrusion. The information that appears to be targeted is R&D data. The data exfiltration appears to occur over months via uniform TTPs. Please execute a defensive operation regarding this attack vector." Which of the following combinations suggests how the threat should MOST likely be classified and the type of analysis that would be MOST helpful in protecting against this activity?

正確答案: C
問題8
Considering confidentiality and integrity, which of the following make servers more secure than desktops? (Select THREE).

正確答案: A,B,E
問題9
An analyst was investigating the attack that took place on the network. A user was able to access the system without proper authentication. Which of the following will the analyst recommend, related to management approaches, in order to control access? (Choose three.)

正確答案: B,C,E
問題10
Which of the following is the MOST secure method to perform dynamic analysis of malware that can sense when it is in a virtual environment?

正確答案: D
問題11
A security analyst has been asked to scan a subnet. During the scan, the following output was generated:

Based on the output above, which of the following is MOST likely?

正確答案: B
問題12
Which of the following stakeholders would need to be aware of an e-discovery notice received by the security office about an ongoing case within the manufacturing department?

正確答案: B
問題13
An organization is experiencing degradation of critical services and availability of critical external resources. Which of the following can be used to investigate the issue?

正確答案: B
問題14
An organization is conducting penetration testing to identify possible network vulnerabilities. The penetration tester has already identified active hosts in the network and is now scanning individual hosts to determine if any are running a web server. The output from the latest scan is shown below:

Which of the following commands would have generated the output above?

正確答案: A
問題15
An analyst has noticed unusual activities in the SIEM to a .cn domain name. Which of the following should the analyst use to identify the content of the traffic?

正確答案: D
問題16
A cybersecurity analyst has received a report that multiple systems are experiencing slowness as a result of a DDoS attack. Which of the following would be the BEST action for the cybersecurity analyst to perform?

正確答案: A
問題17
In comparison to non-industrial IT vendors, ICS equipment vendors generally:

正確答案: A

專業認證

PDFExamDumps模擬測試題具有最高的專業技術含量,只供具有相關專業知識的專家和學者學習和研究之用。

品質保證

該測試已取得試題持有者和第三方的授權,我們深信IT業的專業人員和經理人有能力保證被授權産品的質量。

輕松通過

如果妳使用PDFExamDumps題庫,您參加考試我們保證96%以上的通過率,壹次不過,退還購買費用!

免費試用

PDFExamDumps提供每種産品免費測試。在您決定購買之前,請試用DEMO,檢測可能存在的問題及試題質量和適用性。