Exam Logo

Comptia (CS0-002) Exam Questions And Answers page 27

Which of the following is the BEST way to gather patch information on a specific server?
Security Operations and Monitoring
Data spillage occurred when an employee accidentally emailed a sensitive file to an external recipient.

Which of the following controls would have MOST likely prevented this incident?
Threat Management Cybersecurity Tool Sets
Which of the following attacks can be prevented by using output encoding?
Threat Management
An information security analyst is compiling data from a recent penetration test and reviews the following output:


The analyst wants to obtain more information about the web-based services that are running on the target.

Which of the following commands would MOST likely provide the needed information?
Security Architecture and Tool Sets Security Operations and Monitoring
When investigating a compromised system, a security analyst finds the following script in the /tmp directory:


Which of the following attacks is this script attempting, and how can it be mitigated?
Cyber Incident Response
To validate local system-hardening requirements, which of the following types of vulnerability scans would work BEST to verify the scanned device meets security policies?
Security Operations and Monitoring
A development team is testing a new application release. The team needs to import existing client PHI data records from the production environment to the test environment to test accuracy and functionality.

Which of the following would BEST protect the sensitivity of this data while still allowing the team to perform the testing?
Cybersecurity Tool Sets Compliance and Assessment
The threat intelligence department recently learned of an advanced persistent threat that is leveraging a new strain of malware, exploiting a system router. The company currently uses the same device mentioned in the threat report. Which of the following configuration changes would BEST improve the organization s security posture?
Threat Management Cyber Incident Response
Which of the following will allow different cloud instances to share various types of data with a minimal amount of complexity?
Security Operations and Monitoring
An organization is moving its infrastructure to the cloud in an effort to meet the budget and reduce staffing requirements. The organization has three environments: development, testing, and production. These environments have interdependencies but must remain relatively segmented.

Which of the following methods would BEST secure the company's infrastructure and be the simplest to manage and maintain?
Cybersecurity Tool Sets Security Operations and Monitoring