Free CS0-002 Exam Braindumps

Pass your CompTIA Cybersecurity Analyst (CySA+) Certification Exam exam with these free Questions and Answers

Page 9 of 75
QUESTION 36

- (Exam Topic 1)
A security analyst at a technology solutions firm has uncovered the same vulnerabilities on a vulnerability scan for a long period of time. The vulnerabilities are on systems that are dedicated to the firm's largest client. Which of the following is MOST likely inhibiting the remediation efforts?

  1. A. The parties have an MOU between them that could prevent shutting down the systems
  2. B. There is a potential disruption of the vendor-client relationship
  3. C. Patches for the vulnerabilities have not been fully tested by the software vendor
  4. D. There is an SLA with the client that allows very little downtime

Correct Answer: D

QUESTION 37

- (Exam Topic 3)
Which of the following types of controls defines placing an ACL on a file folder?

  1. A. Technical control
  2. B. Confidentiality control
  3. C. Managerial control
  4. D. Operational control

Correct Answer: A
"Technical controls enforce confidentiality, integrity, and availability in the digital space. Examples of technical security controls include firewall rules, access control lists, intrusion prevention systems, and encryption."

QUESTION 38

- (Exam Topic 3)
A security team has begun updating the risk management plan incident response plan and system security plan to ensure compliance with secunty review guidelines Which of the (olowing can be executed by internal managers to simulate and validate the proposed changes'?

  1. A. Internal management review
  2. B. Control assessment
  3. C. Tabletop exercise
  4. D. Peer review

Correct Answer: B

QUESTION 39

- (Exam Topic 2)
Which of the following technologies can be used to store digital certificates and is typically used in highsecurity implementations where integrity is paramount?

  1. A. HSM
  2. B. eFuse
  3. C. UEFI
  4. D. Self-encrypting drive

Correct Answer: A

QUESTION 40

- (Exam Topic 2)
A cybersecurity analyst is establishing a threat hunting and intelligence group at a growing organization. Which of the following is a collaborative resource that would MOST likely be used for this purpose?

  1. A. Scrum
  2. B. loC feeds
  3. C. ISAC
  4. D. VSS scores

Correct Answer: B

Page 9 of 75

Post your Comments and Discuss CompTIA CS0-002 exam with other Community members: