Free CS0-002 Exam Braindumps

Pass your CompTIA Cybersecurity Analyst (CySA+) Certification Exam exam with these free Questions and Answers

Page 19 of 75
QUESTION 86

- (Exam Topic 1)
Which of the following technologies can be used to house the entropy keys for disk encryption on desktops and laptops?

  1. A. Self-encrypting drive
  2. B. Bus encryption
  3. C. TPM
  4. D. HSM

Correct Answer: A

QUESTION 87

- (Exam Topic 2)
A proposed network architecture requires systems to be separated from each other logically based on defined risk levels. Which of the following explains the reason why an architect would set up the network this way?

  1. A. To complicate the network and frustrate a potential malicious attacker
  2. B. To reduce the number of IP addresses that are used on the network
  3. C. To reduce the attack surface of those systems by segmenting the network based on risk
  4. D. To create a design that simplifies the supporting network

Correct Answer: C

QUESTION 88

- (Exam Topic 1)
A security analyst is investigating a malware infection that occurred on a Windows system. The system was not connected to a network and had no wireless capability Company policy prohibits using portable media or mobile storage The security analyst is trying to determine which user caused the malware to get onto the system Which of the following registry keys would MOST likely have this information?

  1. A. HKEY_USERS\<user SID>\Software\Microsoft\Windows\CurrentVersion\Run
  2. B. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  3. C. HKEY_USERS\\Software\Microsoft\Windows\explorer\MountPoints2
  4. D. HKEY_USERS\\Software\Microsoft\Internet Explorer\Typed URLs
  5. E. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\eventlog\System\iusb3hub

Correct Answer: E

QUESTION 89

- (Exam Topic 1)
The computer incident response team at a multinational company has determined that a breach of sensitive data has occurred in which a threat actor has compromised the organization’s email system. Per the incident response procedures, this breach requires notifying the board immediately. Which of the following would be the BEST method of communication?

  1. A. Post of the company blog
  2. B. Corporate-hosted encrypted email
  3. C. VoIP phone call
  4. D. Summary sent by certified mail
  5. E. Externally hosted instant message

Correct Answer: C

QUESTION 90

- (Exam Topic 2)
An organization is experiencing issues with emails that are being sent to external recipients Incoming emails to the organization are working fine. A security analyst receives the following screenshot ot email error from the help desk.
CS0-002 dumps exhibit
The analyst the checks the email server and sees many of the following messages in the logs. Error 550 - Message rejected
Which of the following is MOST likely the issue?

  1. A. The DMARC queue is full
  2. B. SPF is failing.
  3. C. Port 25 is not open.
  4. D. The DKIM private key has expired

Correct Answer: A

Page 19 of 75

Post your Comments and Discuss CompTIA CS0-002 exam with other Community members: