Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA CS0-002 Practice Exam with Questions & Answers | Set: 8

Questions 71

A security analyst is reviewing a firewall usage report that contains traffic generated over the last 30 minutes in order to locate unusual traffic patterns:

CS0-002 Question 71

Which of the following source IP addresses does the analyst need to investigate further?

Options:
A.

10.18.76.179

B.

10.50.180.49

C.

192.168.48.147

D.

192.168.100.5

CompTIA CS0-002 Premium Access
Questions 72

At which of the following phases of the SDLC shoukJ security FIRST be involved?

Options:
A.

Design

B.

Maintenance

C.

Implementation

D.

Analysis

E.

Planning

F.

Testing

Questions 73

A security analyst is investigating a reported phishing attempt that was received by many users throughout the company The text of one of the emails is shown below:

CS0-002 Question 73

Office 365 User.

It looks like you account has been locked out Please click this link and follow the pfompts to restore access

Regards.

Security Team

Due to the size of the company and the high storage requirements, the company does not log DNS requests or perform packet captures of network traffic, but rt does log network flow data Which of the following commands will the analyst most likely execute NEXT?

Options:
A.

telnet office365.com 25

B.

tracert 122.167.40.119

C.

curl <a href="http://">http://</a> accountfix-office365.com/login. php

D.

nslookup accountfix-office365.com

Questions 74

A security analyst is monitoring a company's network traffic and finds ping requests going to accounting and human resources servers from a SQL server. Upon investigation, the analyst discovers a technician responded to potential network connectivity issues. Which of the following is the best way for the security analyst to respond?

Options:
A.

Report this activity as a false positive, as the activity is legitimate.

B.

Isolate the system and begin a forensic investigation to determine what was compromised.

C.

Recommend network segmentation to the management team as a way to secure the various environments.

D.

Implement host-based firewalls on all systems to prevent ping sweeps in the future.

Questions 75

A security analyst is supporting an embedded software team. Which of the following is the best recommendation to ensure proper error handling at runtime?

Options:
A.

Perform static code analysis.

B.

Require application fuzzing.

C.

Enforce input validation.

D.

Perform a code review.

Questions 76

An organization is developing software to match customers' expectations. Before the software goes into production, it must meet the following quality assurance guidelines

• Uncover all the software vulnerabilities.

• Safeguard the interest of the software's end users.

• Reduce the likelihood that a defective program will enter production.

• Preserve the Interests of me software producer

Which of me following should be performed FIRST?

Options:
A.

Run source code against the latest OWASP vulnerabilities.

B.

Document the life-cycle changes that look place.

C.

Ensure verification and vacation took place during each phase.

D.

Store the source code in a s oftware escrow.

E.

Conduct a static analysis of the code.

Questions 77

A security analyst notices the following proxy log entries:

CS0-002 Question 77

Which of the following is the user attempting to do based on the log entries?

Options:
A.

Use a DoS attack on external hosts.

B.

Exfiltrate data.

C.

Scan the network.

D.

Relay email.

Questions 78

A financial organization has offices located globally. Per the organization’s policies and procedures, all executives who conduct Business overseas must have their mobile devices checked for malicious software or evidence of tempering upon their return. The information security department oversees the process, and no executive has had a device compromised. The Chief information Security Officer wants to Implement an additional safeguard to protect the organization's data. Which of the following controls would work BEST to protect the privacy of the data if a device is stolen?

Options:
A.

Implement a mobile device wiping solution for use if a device is lost or stolen.

B.

Install a DLP solution to track data now

C.

Install an encryption solution on all mobile devices.

D.

Train employees to report a lost or stolen laptop to the security department immediately

Questions 79

A security analyst is reviewing the network security monitoring logs listed below:

CS0-002 Question 79

Which of the following is the analyst most likely observing? (Select two).

Options:
A.

10.1.1.128 sent potential malicious traffic to the web server.

B.

10.1.1.128 sent malicious requests, and the alert is a false positive

C.

10.1.1.129 successfully exploited a vulnerability on the web server

D.

10.1.1.129 sent potential malicious requests to the web server

E.

10.1.1.129 can determine mat port 443 is being used

F.

10.1.1.130 can potentially obtain information about the PHP version

Questions 80

A security analyst is investigating a compromised Linux server. The analyst issues the ps command and receives the following output:

CS0-002 Question 80

Which of the following commands should the administrator run next to further analyze the compromised system?

Options:
A.

gbd /proc/1301

B.

rpm -V openssh-server

C.

/bin/Is -1 /proc/1301/exe

D.

kill -9 1301