Comptia (CS0-002) Exam Questions And Answers page 27
Which of the following is the BEST way to gather patch information on a specific server?
Event Viewer
Custom script
SCAP software
Security Operations and Monitoring
Data spillage occurred when an employee accidentally emailed a sensitive file to an external recipient.
Which of the following controls would have MOST likely prevented this incident?
Which of the following controls would have MOST likely prevented this incident?
SSO
DLP
WAF
VDI
Threat Management
Cybersecurity Tool Sets
Which attacks can be prevented with output encoding?
Single Choice
Which of the following attacks can be prevented by using output encoding?
Server-side request forgery
Cross-site scripting
SQL injection
Command injection
Cross-site request forgery
Directory traversal
Threat Management
An information security analyst is compiling data from a recent penetration test and reviews the following output:
The analyst wants to obtain more information about the web-based services that are running on the target.
Which of the following commands would MOST likely provide the needed information?
The analyst wants to obtain more information about the web-based services that are running on the target.
Which of the following commands would MOST likely provide the needed information?
ping -t 10.79.95.173.rdns.datacenters.com
telnet 10.79.95.173 443
ftpd 10.79.95.173.rdns.datacenters.com 443
tracert 10.79.95.173
Security Architecture and Tool Sets
Security Operations and Monitoring
When investigating a compromised system, a security analyst finds the following script in the /tmp directory:
Which of the following attacks is this script attempting, and how can it be mitigated?
Which of the following attacks is this script attempting, and how can it be mitigated?
This is a password-hijacking attack, and it can be mitigated by using strong encryption protocols.
This is a password-spraying attack, and it can be mitigated by using multifactor authentication.
This is a password-dictionary attack, and it can be mitigated by forcing password changes every 30 days.
This is a credential-stuffing attack, and it can be mitigated by using multistep authentication.
Cyber Incident Response
To validate local system-hardening requirements, which of the following types of vulnerability scans would work BEST to verify the scanned device meets security policies?
SCAP
SAST
DAST
DACS
Security Operations and Monitoring
A development team is testing a new application release. The team needs to import existing client PHI data records from the production environment to the test environment to test accuracy and functionality.
Which of the following would BEST protect the sensitivity of this data while still allowing the team to perform the testing?
Which of the following would BEST protect the sensitivity of this data while still allowing the team to perform the testing?
Deidentification
Encoding
Encryption
Watermarking
Cybersecurity Tool Sets
Compliance and Assessment
The threat intelligence department recently learned of an advanced persistent threat that is leveraging a new strain of malware, exploiting a system router. The company currently uses the same device mentioned in the threat report. Which of the following configuration changes would BEST improve the organization s security posture?
Implement an IPS rule that contains content for the malware variant and patch the routers to protect against the vulnerability
Implement an IDS rule that contains the IP addresses from the advanced persistent threat and patch the routers to protect against the vulnerability
Implement an IPS rule that contains the IP addresses from the advanced persistent threat and patch the routers to protect against the vulnerability
Implement an IDS rule that contains content for the malware variant and patch the routers to protect against the vulnerability
Threat Management
Cyber Incident Response
Which of the following will allow different cloud instances to share various types of data with a minimal amount of complexity?
Reverse engineering
Application log collectors
Workflow orchestration
API integration
Scripting
Security Operations and Monitoring
An organization is moving its infrastructure to the cloud in an effort to meet the budget and reduce staffing requirements. The organization has three environments: development, testing, and production. These environments have interdependencies but must remain relatively segmented.
Which of the following methods would BEST secure the company's infrastructure and be the simplest to manage and maintain?
Which of the following methods would BEST secure the company's infrastructure and be the simplest to manage and maintain?
Create three separate cloud accounts for each environment. Configure account peering and security rules to allow access to and from each environment.
Create one cloud account with one VPC for all environments. Purchase a virtual firewall and create granular security rules.
Create one cloud account and three separate VPCs for each environment. Create security rules to allow access to and from each environment.
Create three separate cloud accounts for each environment and a single core account for network services. Route all traffic through the core account.
Cybersecurity Tool Sets
Security Operations and Monitoring
Comments