Free CS0-002 Exam Braindumps

Pass your CompTIA Cybersecurity Analyst (CySA+) Certification Exam exam with these free Questions and Answers

Page 7 of 75
QUESTION 26

- (Exam Topic 3)
During an incident response procedure, a security analyst collects a hard drive to analyze a possible vector of compromise. There is a Linux swap partition on the hard drive that needs to be checked. Which of the following, should the analyst use to extract human-readable content from the partition?

  1. A. strings
  2. B. head
  3. C. fsstat
  4. D. dd

Correct Answer: A

QUESTION 27

- (Exam Topic 1)
It is important to parameterize queries to prevent:

  1. A. the execution of unauthorized actions against a database.
  2. B. a memory overflow that executes code with elevated privileges.
  3. C. the esrtablishment of a web shell that would allow unauthorized access.
  4. D. the queries from using an outdated library with security vulnerabilities.

Correct Answer: A
Reference: https://stackoverflow.com/QUESTION NO:s/4712037/what-is-parameterized-query

QUESTION 28

- (Exam Topic 2)
A security analyst needs to obtain the footprint of the network. The footprint must identify the following information;
• TCP and UDP services running on a targeted system
• Types of operating systems and versions
• Specific applications and versions
Which of the following tools should the analyst use to obtain the data?

  1. A. ZAP
  2. B. Nmap
  3. C. Prowler
  4. D. Reaver

Correct Answer: B

QUESTION 29

- (Exam Topic 3)
A company's legal and accounting teams have decided it would be more cost-effective to offload the risks of data storage to a third party. The IT management team has decided to implement a cloud model and has asked the security team for recommendations. Which of the following will allow all data to be kept on the third-party network?

  1. A. VDI
  2. B. SaaS
  3. C. CASB
  4. D. FaaS

Correct Answer: B
Which of the follawing activities is designed to handle a control failure that leads to a breach?
© Risk assessment
© Incident management
© Root cause analysis
© Vulnerability management Software as a Service (SaaS)
-Provides all the hardware, operating system, software, and applications needed for a complete application service to be delivered
-Cloud service providers are responsible for the security of the platform and infrastructure
-Consumers are responsible for application security, account provisioning, and authorizations
Cloud Access Security Broker (CASB)
- Enterprise management software designed to mediate access to cloud services by users across all types of devices
Single sign-on
Malware and rogue device detection Monitor/audit user activity
Mitigate data exfiltration
- Cloud Access Service Brokers provide visibility into how clients and another network nodes use cloud services
Forward Proxy Reverse Proxy API

QUESTION 30

- (Exam Topic 1)
Which of the following would MOST likely be included in the incident response procedure after a security breach of customer PII?

  1. A. Human resources
  2. B. Public relations
  3. C. Marketing
  4. D. Internal network operations center

Correct Answer: B

Page 7 of 75

Post your Comments and Discuss CompTIA CS0-002 exam with other Community members: