Exam Logo

Comptia (CS0-002) Exam Questions And Answers page 30

Which of the following are components of the intelligence cycle? (Choose two.)
Threat Management Cybersecurity Tool Sets
As part of an exercise set up by the information security officer, the IT staff must move some of the network systems to an off-site facility and redeploy them for testing. All staff members must ensure their respective systems can power back up and match their gold image. If they find any inconsistencies, they must formally document the information.

Which of the following BEST describes this test?
Security Operations and Monitoring
A security analyst is reviewing the following DNS logs as part of security-monitoring activities:


Which of the following MOST likely occurred?
Security Operations and Monitoring
Which of the following technologies can be used to store digital certificates and is typically used in high-security implementations where integrity is paramount?
Threat Management Cybersecurity Tool Sets
Which of the following threat classifications would MOST likely use polymorphic code?
Threat Management
An organization is assessing risks so it can prioritize its mitigation actions. Following are the risks and their probability and impact:


Which of the following is the order of priority for risk mitigation from highest to lowest?
Threat Management Cyber Incident Response
A security analyst is reviewing the network security monitoring logs listed below:


Which of the following is the analyst MOST likely observing? (Choose two.)
Cyber Incident Response Security Operations and Monitoring
Which of the following BEST explains hardware root of trust?
Security Architecture and Tool Sets
A security analyst is scanning the network to determine if a critical security patch was applied to all systems in an enterprise. The organization has a very low tolerance for risk when it comes to resource availability. Which of the following is the BEST approach for configuring and scheduling the scan?
Security Operations and Monitoring
An analyst is searching a log for potential credit card leaks. The log stores all data encoded in hexadecimal. Which of the following commands will allow the security analyst to confirm the incident?
Security Operations and Monitoring