[Free] 2018(Jan) Dumps4cert Passguide CompTIA CS0-001 Dumps with VCE and PDF 1-10

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan CompTIA Official New Released CS0-001
100% Free Download! 100% Pass Guaranteed!

CompTIA CSA Certification Exam

Question No: 1

Which of the following BEST describes the offensive participants in a tabletop exercise?

  1. Red team

  2. Blue team

  3. System administrators

  4. Security analysts

  5. Operations team

Answer: A

Question No: 2

A recent vulnerability scan found four vulnerabilities on an organization’s public Internet- facing IP addresses. Prioritizing in order to reduce the risk of a breach to the organization, which of the following should be remediated FIRST?

  1. A cipher that is known to be cryptographically weak.

  2. A website using a self-signed SSL certificate.

  3. A buffer overflow that allows remote code execution.

  4. An HTTP response that reveals an internal IP address.

Answer: C

Question No: 3

A security analyst is reviewing the following log after enabling key-based authentication.

Dumps4Cert 2018 PDF and VCE

Given the above information, which of the following steps should be performed NEXT to secure the system?

  1. Disable anonymous SSH logins.

  2. Disable password authentication for SSH.

  3. Disable SSHv1.

  4. Disable remote root SSH logins.

Answer: B

Question No: 4

In order to meet regulatory compliance objectives for the storage of PHI, vulnerability scans must be conducted on a continuous basis. The last completed scan of the network returned 5,682 possible vulnerabilities. The Chief Information Officer (CIO) would like to establish a remediation plan to resolve all known issues. Which of the following is the BEST way to proceed?

  1. Attempt to identify all false positives and exceptions, and then resolve all remaining items.

  2. Hold off on additional scanning until the current list of vulnerabilities have been resolved.

  3. Place assets that handle PHI in a sandbox environment, and then resolve all vulnerabilities.

  4. Reduce the scan to items identified as critical in the asset inventory, and resolve these issues first.

Answer: D

Question No: 5

Which of the following items represents a document that includes detailed information on when an incident was detected, how impactful the incident was, and how it was remediated, in addition to incident response effectiveness and any identified gaps needing improvement?

  1. Forensic analysis report

  2. Chain of custody report

  3. Trends analysis report

  4. Lessons learned report

Answer: A

Question No: 6

A security analyst received a compromised workstation. The workstation’s hard drive may contain evidence of criminal activities. Which of the following is the FIRST thing the analyst must do to ensure the integrity of the hard drive while performing the analysis?

  1. Make a copy of the hard drive.

  2. Use write blockers.

  3. Runrm -Rcommand to create a hash.

  4. Install it on a different machine and explore the content.

Answer: B

Question No: 7

A threat intelligence analyst who works for a technology firm received this report from a vendor.

“There has been an intellectual property theft campaign executed against organizations in the technology industry. Indicators for this activity are unique to each intrusion. The information that appears to be targeted is Ramp;D data. The data exfiltration appears to occur over months via uniform TTPs. Please execute a defensive operation regarding this attack vector.”

Which of the following combinations suggests how the threat should MOST likely be classified and the type of analysis that would be MOST helpful in protecting against this activity?

  1. Polymorphic malware and secure code analysis

  2. Insider threat and indicator analysis

  3. APT and behavioral analysis

  4. Ransomware and encryption

Answer: B

Question No: 8

A cybersecurity analyst has received a report that multiple systems are experiencing slowness as a result of a DDoS attack. Which of the following would be the BEST action for the cybersecurity analyst to perform?

  1. Continue monitoring critical systems.

  2. Shut down all server interfaces.

  3. Inform management of the incident.

  4. Inform users regarding the affected systems.

Answer: C

Question No: 9

A cybersecurity professional typed in a URL and discovered the admin panel for the e- commerce application is accessible over the open web with the default password. Which of the following is the MOST secure solution to remediate this vulnerability?

  1. Rename the URL to a more obscure name, whitelist all corporate IP blocks, and require two-factor authentication.

  2. Change the default password, whitelist specific source IP addresses, and require two- factor authentication.

  3. Whitelist all corporate IP blocks, require an alphanumeric passphrase for the default password, and require two-factor authentication.

  4. Change the username and default password, whitelist specific source IP addresses, and require two-factor authentication.

Answer: D

Question No: 10

After reviewing the following packet, a cybersecurity analyst has discovered an

unauthorized service is running on a company’s computer.

Dumps4Cert 2018 PDF and VCE

Which of the following ACLs, if implemented, will prevent further access ONLY to the unauthorized service and will not impact other services?



C. DENY IP HOST192.168.1.10 HOST EQ 3389


Answer: A

100% Dumps4cert Free Download!
Download Free Demo:CS0-001 Demo PDF
100% Dumps4cert Free Guaranteed!
CS0-001 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.