CS0-002 無料問題集「CompTIA Cybersecurity Analyst (CySA+) Certification」

A security analyst is investigating a data leak on a corporate website. The attacker was able to dump data by sending a crafted HTTP request with the following payload:

Which of the following systems would most likely have logs with details regarding the threat actor's requests?

解説: (JPNTest メンバーにのみ表示されます)
An organization supports a large number of remote users. Which of the following is the best option to protect the data on the remote users' laptops?

解説: (JPNTest メンバーにのみ表示されます)
You are a penetration tester who is reviewing the system hardening guidelines for a company. Hardening guidelines indicate the following.
There must be one primary server or service per device.
Only default port should be used
Non- secure protocols should be disabled.
The corporate internet presence should be placed in a protected subnet
Instructions :
Using the available tools, discover devices on the corporate network and the services running on these devices.
You must determine
ip address of each device
The primary server or service each device
The protocols that should be disabled based on the hardening guidelines

Answer below images

Which of the following BEST describes how logging and monitoring work when entering into a public cloud relationship with a service provider?

解説: (JPNTest メンバーにのみ表示されます)
A vulnerability scanner has identified an out-of-support database software version running on a server. The software update will take six to nine months to complete. The management team has agreed to a one-year extended support contract with the software vendor. Which of the following BEST describes the risk treatment in this scenario?

解説: (JPNTest メンバーにのみ表示されます)
Given the Nmap request below:

Which of the following actions will an attacker be able to initiate directly against this host?

解説: (JPNTest メンバーにのみ表示されます)
A digital forensics investigator works from duplicate images to preserve the integrity of the original evidence. Which of the following types of media are most volatile and should be preserved? (Select two).

正解:C、D 解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
While reviewing abnormal user activity, a security analyst notices a user has the following fileshare activities:

Which of the following should the analyst do first?

解説: (JPNTest メンバーにのみ表示されます)
A cybersecurity analyst needs to Implement controls that will reduce the attack surface of a web server. Which of the following is the best proactive control?

解説: (JPNTest メンバーにのみ表示されます)
An application must pass a vulnerability assessment to move to the next gate. Consequently, any security issues that are found must be remediated prior to the next gate. Which of the following best describes the method for end-to-end vulnerability assessment?

解説: (JPNTest メンバーにのみ表示されます)
A manufacturing company has joined the information sharing and analysis center for its sector. As a benefit, the company will receive structured loC data contributed by other members. Which of the following best describes the utility of this data?

解説: (JPNTest メンバーにのみ表示されます)
A cyber-security analyst is implementing a new network configuration on an existing network access layer to prevent possible physical attacks. Which of the following BEST describes a solution that would apply and cause fewer issues during the deployment phase?

解説: (JPNTest メンバーにのみ表示されます)
An organization has specific technical nsk mitigation configurations that must be implemented before a new server can be approved for production Several critical servers were recently deployed with the antivirus missing unnecessary ports disabled and insufficient password complexity Which of the following should the analyst recommend to prevent a recurrence of this risk exposure?

解説: (JPNTest メンバーにのみ表示されます)
A code review reveals a web application is using lime-based cookies for session management. This is a security concern because lime-based cookies are easy to:

解説: (JPNTest メンバーにのみ表示されます)
A security administrator needs to provide access from partners to an Isolated laboratory network inside an organization that meets the following requirements:
* The partners' PCs must not connect directly to the laboratory network.
* The tools the partners need to access while on the laboratory network must be available to all partners
* The partners must be able to run analyses on the laboratory network, which may take hours to complete Which of the following capabilities will MOST likely meet the security objectives of the request?

解説: (JPNTest メンバーにのみ表示されます)
A company experienced a security compromise due to the inappropriate disposal of one of its hardware appliances. Sensitive information stored on the hardware appliance was not removed prior to disposal. Which of the following is the BEST manner in which to dispose of the hardware appliance?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following are the most likely reasons to include reporting processes when updating an incident response plan after a breach? (Select two).

正解:B、C 解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A security analyst responds to a series of events surrounding sporadic bandwidth consumption from an endpoint device. The security analyst then identifies the following additional details:
* Bursts of network utilization occur approximately every seven days.
* The content being transferred appears to be encrypted or obfuscated.
* A separate but persistent outbound TCP connection from the host to infrastructure in a third-party cloud is in place.
* The HDD utilization on the device grows by 10GB to 12GB over the course of every seven days.
* Single file sizes are 10GB.
Which of the following describes the most likely cause of the issue?

解説: (JPNTest メンバーにのみ表示されます)

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡