Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA CS0-002 Practice Exam with Questions & Answers | Set: 9

Questions 81

A company frequently expenences issues with credential stuffing attacks Which of the following is the BEST control to help prevent these attacks from being successful?

Options:
A.

SIEM

B.

IDS

C.

MFA

D.

TLS

CompTIA CS0-002 Premium Access
Questions 82

Which of the following describes the difference between intentional and unintentional insider threats'?

Options:
A.

Their access levels will be different

B.

The risk factor will be the same

C.

Their behavior will be different

D.

The rate of occurrence will be the same

Questions 83

Which of the following SCAP standards provides standardization tor measuring and describing the seventy of security-related software flaws?

Options:
A.

OVAL

B.

CVSS

C.

CVE

D.

CCE

Questions 84

A security analyst is reviewing the following DNS logs as part of security-monitoring activities:

FROM 192.168.1.20 A www.google.com 67.43.45.22

FROM 192.168.1.20 AAAA www.google.com 2006:67:AD:1FAB::102

FROM 192.168.1.43 A www.mail.com 193.56.221.99

FROM 192.168.1.2 A www.company.com 241.23.22.11

FROM 192.168.1.211 A www.uewiryfajfchfaerwfj.co 32.56.32.122

FROM 192.168.1.106 A www.whatsmyip.com 102.45.33.53

FROM 192.168.1.93 ARAA www.nbc.com 2002:10:976::1

FROM 192.168.1.78 A www.comptia.org 122.10.31.87

Which of the following most likely occurred?

Options:
A.

The attack used an algorithm to generate command and control information dynamically.

B.

The attack attempted to contact <a href="www.google.com">www.google.com</a> to verify internet connectivity.

C.

The attack used encryption to obfuscate the payload and bypass detection by an IDS.

D.

The attack caused an internal host to connect to a command and control server.

Questions 85

An organization is adopting loT devices at an increasing rate and will need to account for firmware updates in its vulnerability management programs. Despite the number of devices being deployed, the organization has only focused on software patches so far. leaving hardware-related weaknesses open to compromise. Which of the following best practices will help the organization to track and deploy trusted firmware updates as part of its vulnerability management programs?

Options:
A.

Utilize threat intelligence to guide risk evaluation activities and implement critical updates after proper testing.

B.

Apply all firmware updates as soon as they are released to mitigate the risk of compromise.

C.

Determine an annual patch cadence to ensure all patching occurs at the same time.

D.

Implement an automated solution that detects when vendors release firmware updates and immediately deploy updates to production.

Questions 86

When investigating a report of a system compromise, a security analyst views the following /var/log/secure log file:

CS0-002 Question 86

Which of the following can the analyst conclude from viewing the log file?

Options:
A.

The comptia user knows the sudo password.

B.

The comptia user executed the sudo su command.

C.

The comptia user knows the root password.

D.

The comptia user added himself or herself to the /etc/sudoers file.

Questions 87

A security officer needs to find the most cost-effective solution to the current data privacy and protection gap found in the last security assessment. Which of the following is the BEST recommendation?

Options:
A.

Require users to sign NDAs

B.

Create a data minimization plan.

C.

Add access control requirements.

D.

Implement a data loss prevention solution.

Questions 88

A security analyst is reviewing the following server statistics:

CS0-002 Question 88

Which of the following is MOST likely occurring?

Options:
A.

Race condition

B.

Privilege escalation

C.

Resource exhaustion

D.

VM escape

Questions 89

An analyst is reviewing the output from some recent network enumeration activities. The following entry relates to a target on the network:

CS0-002 Question 89

Based on the above output, which Of the following tools or techniques is MOST likely being used?

Options:
A.

Web application firewall

B.

Port triggering

C.

Intrusion prevention system

D.

Port isolation

E.

Port address translation

Questions 90

A security engineer is reviewing security products that identify malicious actions by users as part of a company's insider threat program. Which of the following is the most appropriate product category for this purpose?

Options:
A.

SCAP

B.

SOAR

C.

UEBA

D.

WAF