Free CS0-002 Exam Braindumps

Pass your CompTIA Cybersecurity Analyst (CySA+) Certification Exam exam with these free Questions and Answers

Page 18 of 75
QUESTION 81

- (Exam Topic 3)
A security analyst is running a tool against an executable of an unknown source. The Input supplied by the tool to the executable program and the output from the executable are shown below:
CS0-002 dumps exhibit
Which of the following should the analyst report after viewing this Information?

  1. A. A dynamic library that is needed by the executable a missing
  2. B. Input can be crafted to trigger an Infection attack in the executable
  3. C. The toot caused a buffer overflow in the executable's memory
  4. D. The executable attempted to execute a malicious command

Correct Answer: B

QUESTION 82

- (Exam Topic 2)
A threat intelligence analyst has received multiple reports that are suspected to be about the same advanced persistent threat. To which of the following steps in the intelligence cycle would this map?

  1. A. Dissemination
  2. B. Analysis
  3. C. Feedback
  4. D. Requirements
  5. E. Collection

Correct Answer: E

QUESTION 83

- (Exam Topic 2)
Following a recent security breach, a company decides to investigate account usage to ensure privileged accounts are only being utilized during typical business hours. During the investigation, a security analyst determines an account was consistently utilized in the middle of the night.
Which of the following actions should the analyst take NEXT?

  1. A. Initiate the incident response plan.
  2. B. Disable the privileged account
  3. C. Report the discrepancy to human resources.
  4. D. Review the activity with the user.

Correct Answer: A

QUESTION 84

- (Exam Topic 1)
As part of an exercise set up by the information security officer, the IT staff must move some of the network systems to an off-site facility and redeploy them for testing. All staff members must ensure their respective systems can power back up and match their gold image. If they find any inconsistencies, they must formally document the information.
Which of the following BEST describes this test?

  1. A. Walk through
  2. B. Full interruption
  3. C. Simulation
  4. D. Parallel

Correct Answer: C

QUESTION 85

- (Exam Topic 1)
A security analyst for a large financial institution is creating a threat model for a specific threat actor that is likely targeting an organization's financial assets.
Which of the following is the BEST example of the level of sophistication this threat actor is using?

  1. A. Social media accounts attributed to the threat actor
  2. B. Custom malware attributed to the threat actor from prior attacks
  3. C. Email addresses and phone numbers tied to the threat actor
  4. D. Network assets used in previous attacks attributed to the threat actor
  5. E. IP addresses used by the threat actor for command and control

Correct Answer: B

Page 18 of 75

Post your Comments and Discuss CompTIA CS0-002 exam with other Community members: