Exam Logo

Comptia (CS0-002) Exam Questions And Answers page 6

Which of the following should a database administrator implement to BEST protect data from an untrusted server administrator?
Threat Management Cyber Incident Response
Which of the following BEST describes the primary role of a risk assessment as it relates to compliance with risk-based frameworks?
Compliance and Assessment
A company uses self-signed certificates when sending emails to recipients within the company. Users are calling the help desk because they are getting warnings when attempting to open emails sent by internal users. A security analyst checks the certificates and sees the following:

Issued to: [email protected]
Issued by: certServer.company.com
Valid from: 1/1/2020 to 1/1/2030

Which of the following should the security analyst conclude?
Threat Management Cybersecurity Tool Sets
An incident responder successfully acquired application binaries off a mobile device for later forensic analysis.

Which of the following should the analyst do NEXT?
Cyber Incident Response Cybersecurity Tool Sets
The management team assigned the following values to an inadvertent breach of privacy regulations during the original risk assessment:

• Probability = 25%
• Magnitude = $1,015 per record
• Total records = 10,000

Two breaches occurred during the fiscal year. The first compromised 35 records, and the second compromised 65 records. Which of the following is the value of the records that were compromised?
Compliance and Assessment
In web application scanning, static analysis refers to scanning:
Security Architecture and Tool Sets Cybersecurity Tool Sets
To prioritize the morning s work, an analyst is reviewing security alerts that have not yet been investigated. Which of the following assets should be investigated FIRST?
Cyber Incident Response Security Operations and Monitoring
An application server runs slowly and then triggers a high CPU alert. After investigating, a security analyst finds an unauthorized program is running on the server. The analyst reviews the application log below.


Which of the following conclusions is supported by the application log?
Threat Management Cyber Incident Response
A company has contracted with a software development vendor to design a web portal for customers to access a medical records database. Which of the following should the security analyst recommend to BEST control the unauthorized disclosure of sensitive data when sharing the development database with the vendor?
Cybersecurity Tool Sets Compliance and Assessment
A cybersecurity analyst is responding to an incident. The company s leadership team wants to attribute the incident to an attack group. Which of the following models would BEST apply to the situation?
Cyber Incident Response