Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CompTIA CS0-002 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following is the BEST way to gather patch information on a specific server?

Options:
A.

Event Viewer

B.

Custom script

C.

SCAP software

D.

CI/CD

CompTIA CS0-002 Premium Access
Questions 12

An analyst Is reviewing a web developer's workstation for potential compromise. While examining the workstation's hosts file, the analyst observes the following:

CS0-002 Question 12

Which of the following hosts file entries should the analyst use for further investigation?

Options:
A.

::1

B.

127.0.0.1

C.

192.168.3.249

D.

198.51.100.5

Questions 13

While monitoring the information security notification mailbox, a security analyst notices several emails were repotted as spam. Which of the following should the analyst do FIRST?

Options:
A.

Block the sender In the email gateway.

B.

Delete the email from the company's email servers.

C.

Ask the sender to stop sending messages.

D.

Review the message in a secure environment.

Questions 14

A social media company is planning an acquisition. Prior to the purchase, the Chief Security Officer (CSO) would like a full report to gain a better understanding of the prospective company's cybersecurity posture and to identify risks in the supply chain. Which of the following will best support the CSO's objective?

Options:
A.

Third-party assessment

B.

Memorandum of understanding

C.

Non-disclosure agreement

D.

Software source authenticity

Questions 15

Which of the following is a reason for correctly identifying APTs that might be targeting an organization?

Options:
A.

APTs' passion for social justice will make them ongoing and motivated attackers.

B.

APTs utilize methods and technologies differently than other threats

C.

APTs are primarily focused on financial gam and are widely available over the internet.

D.

APTs lack sophisticated methods, but their dedication makes them persistent.

Questions 16

An organization implemented an extensive firewall access-control blocklist to prevent internal network ranges from communicating with a list of IP addresses of known command-and-control domains A security analyst wants to reduce the load on the firewall. Which of the following can the analyst implement to achieve similar protection and reduce the load on the firewall?

Options:
A.

A DLP system

B.

DNS sinkholing

C.

IP address allow list

D.

An inline IDS

Questions 17

A security officer needs to find the most cost-effective solution to the current data privacy and protection gap found in the last security assessment Which of the following is the BEST recommendation?

Options:
A.

Require users to sign NDAs

B.

Create a data minimization plan.

C.

Add access control requirements

D.

Implement a data loss prevention solution

Questions 18

In SIEM software, a security analysis selected some changes to hash signatures from monitored files during the night followed by SMB brute-force attacks against the file servers Based on this behavior, which of the following actions should be taken FIRST to prevent a more serious compromise?

Options:
A.

Fully segregate the affected servers physically in a network segment, apart from the production network.

B.

Collect the network traffic during the day to understand if the same activity is also occurring during business hours

C.

Check the hash signatures, comparing them with malware databases to verify if the files are infected.

D.

Collect all the files that have changed and compare them with the previous baseline

Questions 19

A security analyst discovers the company's website is vulnerable to cross-site scripting. Which of the following solutions will best remedy the vulnerability?

Options:
A.

Prepared statements

B.

Server-side input validation

C.

Client-side input encoding

D.

Disabled JavaScript filtering

Questions 20

Which of following allows Secure Boot to be enabled?

Options:
A.

eFuse

B.

UEFI

C.

MSM

D.

PAM