Free CS0-002 Exam Braindumps

Pass your CompTIA Cybersecurity Analyst (CySA+) Certification Exam exam with these free Questions and Answers

Page 16 of 75
QUESTION 71

- (Exam Topic 3)
Which of the following is MOST dangerous to the client environment during a vulnerability assessment penetration test?

  1. A. There is a longer period of time to assess the environment.
  2. B. The testing is outside the contractual scope
  3. C. There is a shorter period of time to assess the environment
  4. D. No status reports are included with the assessment.

Correct Answer: B

QUESTION 72

- (Exam Topic 2)
A company’s change management team has asked a security analyst to review a potential change to the email server before it is released into production. The analyst reviews the following change request:
CS0-002 dumps exhibit
Which of the following is the MOST likely reason for the change?

  1. A. To reject email from servers that are not listed in the SPF record
  2. B. To reject email from email addresses that are not digitally signed.
  3. C. To accept email to the company’s domain.
  4. D. To reject email from users who are not authenticated to the network.

Correct Answer: A

QUESTION 73

- (Exam Topic 1)
A security manager has asked an analyst to provide feedback on the results of a penetration lest. After reviewing the results the manager requests information regarding the possible exploitation of vulnerabilities Much of the following information data points would be MOST useful for the analyst to provide to the security manager who would then communicate the risk factors to senior management? (Select TWO)

  1. A. Probability
  2. B. Adversary capability
  3. C. Attack vector
  4. D. Impact
  5. E. Classification
  6. F. Indicators of compromise

Correct Answer: AD

QUESTION 74

- (Exam Topic 1)
A Chief Information Security Officer (CISO) wants to upgrade an organization's security posture by improving proactive activities associated with attacks from internal and external threats.
Which of the following is the MOST proactive tool or technique that feeds incident response capabilities?

  1. A. Development of a hypothesis as part of threat hunting
  2. B. Log correlation, monitoring, and automated reporting through a SIEM platform
  3. C. Continuous compliance monitoring using SCAP dashboards
  4. D. Quarterly vulnerability scanning using credentialed scans

Correct Answer: A

QUESTION 75

- (Exam Topic 3)
Which of the following factors would determine the regulations placed on data under data sovereignty laws?

  1. A. What the company intends to do with the data it owns
  2. B. The company's data security policy
  3. C. The type of data the company stores
  4. D. The data laws of the country in which the company is located

Correct Answer: D

Page 16 of 75

Post your Comments and Discuss CompTIA CS0-002 exam with other Community members: