Exam Logo

Comptia (CS0-002) Exam Questions And Answers page 34

An information security analyst is working with a data owner to identify the appropriate controls to preserve the confidentiality of data within an enterprise environment. One of the primary concerns is exfiltration of data by malicious insiders. Which of the following controls is the MOST appropriate to mitigate risks?
Threat Management Cyber Incident Response
An analyst wants to identify hosts that are connecting to the external FTP servers and what, if any, passwords are being used. Which of the following commands should the analyst use?
Security Architecture and Tool Sets Compliance and Assessment
Which of the following session management techniques will help to prevent a session identifier from being stolen via an XSS attack?
Threat Management Security Operations and Monitoring
A security analyst is handling an incident in which ransomware has encrypted the disks of several company workstations. Which of the following would work BEST to prevent this type of incident in the future?
Cyber Incident Response Security Architecture and Tool Sets
For machine learning to be applied effectively toward security analysis automation, it requires __________.
Security Architecture and Tool Sets Cybersecurity Tool Sets
A security analyst reviews SIEM logs and discovers the following error event:


Which of the following environments does the analyst need to examine to continue troubleshooting the event?
Security Operations and Monitoring
A storage area network (SAN) was inadvertently powered off while power maintenance was being performed in a datacenter. None of the systems should have lost all power during the maintenance. Upon review, it is discovered that a SAN administrator moved a power plug when testing the SAN's fault notification features.

Which of the following should be done to prevent this issue from reoccurring?
Threat Management Security Operations and Monitoring
A company s security officer needs to implement geographical IP blocks for nation-state actors from a foreign country. On which of the following should the blocks be implemented?
Threat Management