CompTIA CySA+ CS0-002 Practice Questions

studied byStudied by 5 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 111

112 Terms

1
A cybersecurity analyst receives a phone call from an unknown person with the number blocked on the caller ID. After starting conversation, the caller begins to request sensitive information. Which of the following techniques is being applied?A. Social engineeringB. PhishingC. ImpersonationD. War dialing
A
New cards
2
Which of the following is the main benefit of sharing incident details with partner organizations or external trusted parties during the incident response process?A. It facilitates releasing incident results, findings and resolution to the media and all appropriate government agenciesB. It shortens the incident life cycle by allowing others to document incident details and prepare reports.C. It enhances the response process, as others may be able to recognize the observed behavior and provide valuable insight.D. It allows the security analyst to defer incident-handling activities until all parties agree on how to proceed with analysis.
C
New cards
3
The security analyst determined that an email containing a malicious attachment was sent to several employees within the company, and it was not stopped by any of the email filtering devices. An incident was declared. During the investigation, it was determined that most users deleted the email, but one specific user executed the attachment. Based on the details gathered, which of the following actions should the security analyst perform NEXT?A. Obtain a copy of the email with the malicious attachment. Execute the file on another user's machine and observe the behavior. Document all findings.B. Acquire a full backup of the affected machine. Reimage the machine and then restore from the full backup.C. Take the affected machine off the network. Review local event logs looking for activity and processes related to unknown or unauthorized software.D. Take possession of the machine. Apply the latest OS updates and firmware. Discuss the problem with the user and return the machine.
C
New cards
4
Which of the following tools should a cybersecurity analyst use to verify the integrity of a forensic image before and after an investigation?A. stringsB. sha1sumC. fileD. ddE. gzip
B
New cards
5
Given the following logs:Aug 18 11:00:57 comptia sshd[5657]: Failed password for root from 10.10.10.192 port 38980 ssh2Aug 18 23:08:26 comptia sshd[5768]: Failed password for root from 18.70.0.160 port 38156 ssh2Aug 18 23:08:30 comptia sshd[5770]: Failed password for admin from 18.70.0.160 port 38556 ssh2Aug 18 23:08:34 comptia sshd[5772]: Failed password for invalid user asterisk from 18.70.0.160 port 38864 ssh2Aug 18 23:08:38 comptia sshd[5774]: Failed password for invalid user sjobeck from 10.10.1.16 port 39157 ssh2Aug 18 23:08:42 comptia sshd[5776]: Failed password for root from 18.70.0.160 port 39467 ssh2
Which of the following can be suspected?A. An unauthorized user is trying to gain access from 10.10.10.192.B. An authorized user is trying to gain access from 10.10.10.192.C. An authorized user is trying to gain access from 18.70.0.160.D. An unauthorized user is trying to gain access from 18.70.0.160.
D
New cards
6
A security analyst has been asked to review permissions on accounts within Active Directory to determine if they are appropriate to the user's role. During this process, the analyst notices that a user from building maintenance is part of the Domain Admin group. Which of the following does this indicate?A. Cross-site scriptingB. Session hijackC. Privilege escalationD. Rootkit
C
New cards
7
In the last six months, a company is seeing an increase in credential-harvesting attacks. The latest victim was the chief executive officer (CEO). Which of the following countermeasures will render the attack ineffective?A. Use a complex password according to the company policy.B. Implement an intrusion-prevention system.C. Isolate the CEO's computer in a higher security zone.D. Implement multifactor authentication.
D
New cards
8
After a security breach, it was discovered that the attacker had gained access to the network by using a brute-force attack against a service account with a password that was set to not expire, even though the account had a long, complex password. Which of the following could be used to prevent similar attacks from being successful in the future?A. Complex password policiesB. Account lockoutC. Self-service password reset portalD. Scheduled vulnerability scans
B
New cards
9
A security analyst wants to capture data flowing in and out of a network. Which of the following would MOST likely assist in achieving this goal?A. Taking a screenshot.B. Analyzing network traffic and logs.C. Analyzing big data metadata.D. Capturing system image.
B
New cards
10
There are reports that hackers are using home thermostats to ping a national service provider without the provider's knowledge. Which of the following attacks is occurring from these devices?A. IoTB. DDoSC. MITMD. MIMO
B
New cards
11
Which of the following is the purpose of a SIEM solution?A. To provide real-time security analysis and alerts generated within the security system.B. To provide occasional updates on global security breachesC. To act as an attack vectorD. To act as an intrusion prevention system
A
New cards
12
An actor with little to no knowledge of the tools they use to carry out an attack is known as which of the following?A. White hatB. Black hatC. Attack vectorD. Script kiddie
D
New cards
13
Which one of the following does NOT accurately portray the attributes of an Advanced Persistent Threat (APT) attack?A. They often exploit unknown vulnerabilitiesB. They typically use freely available attacking tools to cut down on costs.C. They target large or government organizationD. They use sophisticated means to gain access to highly valued resources
B
New cards
14
Which of the following are the Security intelligence data elements that assure quality of the data? (Choose three)A. AccuracyB. ProprietaryC. RelevanceD. Timeliness
ACD
New cards
15
The process of combing through collected data to gather relevant and accurate intelligence data is referred to as \_____ according to the intelligence cycle.A. CollectionB. DisseminationC. FeedbackD. Analysis
D
New cards
16
Which of the following ports would you close if your sever does not host any DNS services?A. 22B. 53C. 443D. 80
B
New cards
17
The Security team advises that there's a server running a legacy software supported by some of the applications within the organization. Upon review, management realizes the potential loss from the risk isn't great enough to warrant spending money to avoid it. This form of response is known as which of the following?A. Compensation ControlB. Risk acceptanceC. Risk avoidanceD. Remediation
B
New cards
18
A critical vulnerability is between which range on CVSS?A. 4.0-7.0B. 3.9-5.0C. 0.0-10.0D. 9.0-10.0
D
New cards
19
An attacker collects information about a target from sources such as LinkedIn, Twitter, and the target's website. This form of reconnaissance is known as which of the following?A. Active reconnaissanceB. Passive reconnaissanceC. Native reconnaissanceD. None of the above options
B
New cards
20
When defining a scope to scan, which of the following should you use? (Choose two)A. An IP rangeB. A gatewayC. A single IPD. A subnet mask only
AC
New cards
21
Which of the following is NOT a factor that can inhibit remediation?A. Legacy SystemsB. SLAC. MOUD. Employment Contract
D
New cards
22
Which of the following will define a scope to scan? Choose two.A. 192.168.10.1B. 192.168.88.1/24C. 127.0.0.1D. 169.254.10.1
AB
New cards
23
Your company is requesting you to assess the extent to which a client's data was compromised in an incident. What analysis are you required to perform?A. MOUB. IIAC. SLAD. PII
B
New cards
24
Which of the following would be used to de-authenticate devices connected to a wireless access point?A. -0B. -cC. 5D. -a
A
New cards
25
To prevent memory compromise and subsequent overflow attacks in operating systems, which OS feature must be available?A. UEFIB. Boot SecurityC. HIPSD. ASLR
D
New cards
26
Which firewall option would allow an administrator to permit an application into an organization's network?A. WhitelistingB. FilteringC. Port SecurityD. Blacklisting
A
New cards
27
The command "Mac Address Sticky" uses physical addresses to restrict and provide network access to the device. True or false?
T
New cards
28
Which of the following is a threat associated with operating in the cloud?A. Unsecure-Wi-FiB. Malicious insiderC. BluejackingD. Evil Twin
B
New cards
29
Which of the following practices are likely to put corporate systems at risk?A. CIAB. PatchingC. MDMD. BYOD
D
New cards
30
A unique feature of a hybrid cloud is the combination of a private and public cloud. True or false?
T
New cards
31
Which mobile security standard allows an organization to manage mobile devices?A. MDMB. BYODC. SSHD. CAN bus
A
New cards
32
Which of the following are fundamentals of MFA? (Choose three)A. Something you have, such a one time pinB. Something you know, such as a passwordC. Something you do, such as a sportD. Something you are, such as biometrics
ABD
New cards
33
In which of the following can the attacker use ARP Poisoning to compromise systems?A. LANB. BluetoothC. WAND. None of the above
A
New cards
34
Locking is an effective mitigative measure again race condition attacks. True or false?
T
New cards
35
You are informed that the recently hired junior accountant within your organization has had her device compromised after clicking on a link within an email that was seemingly sent from the head of accounting department. What type of attack would the junior accountant been a victim of?A. Phishing attackB. SQL InjectionC. DDOS attackD. MITM attack
A
New cards
36
Which security concerns are more easily implemented in the cloud? (Choose three)A. Data localityB. Physical securityC. CustomizationD. Regulatory complianceE. API access
BDE
New cards
37
A Cloud Access Security Broker is a piece of software that does which of the following?A. Introduces new vulnerabilitiesB. Prices cloud servicesC. Sits between your Cloud and on-premises deploymentsD. Reduces security complexity
C
New cards
38
Hardware IDs (such as serial numbers) are often tagged onto assets by which method?A. A handwritten logB. They're notC. A physical tag or stickerD. An external database
C
New cards
39
Good change management includes which of the following features? (Choose three)A. Change identificationB. Regulatory reportingC. Life-cycle trackingD. ReviewE. A shared spreadsheet
ACD
New cards
40
Network segmentation can mitigate the risk of a vulnerability spreading beyond its initial attack vector. True or false?
T
New cards
41
Which architecture represents a cloud deployment that's isolated from other public users of that same cloud infrastructure?A. FirewallB. Virtual private clouds (VPC)C. Serverless computingD. Software-defined networking (SDN)
B
New cards
42
Server virtualization introduces security vulnerabilities by sharing underlying hardware with other virtual machines. True or false?
F
New cards
43
Which feature of a system is shared by all containers running on that system?A. Memory spaceB. Disk spaceC. Operating system kernelD. Network ports
C
New cards
44
Which important access control feature is used by both RBAC and ABAC?A. Permissions assigned to rolesB. Permissions assigned directly to usersC. Principle of Least PrivilegeD. Permissions derived from attributes
C
New cards
45
Account credentials should be encrypted both in-transit and at-rest by default. True or false?
T
New cards
46
A username and password authentication scheme is considered "Multi-Factor Authentication" because the username and password represent the two different factors. True or false?
F
New cards
47
A Honeypot has which of the following features? (Choose three)A. Excludes any sensitive dataB. An easy targetC. Isolated from secure systemsD. Automatically blocks known attack vectors
ABC
New cards
48
Documentation for software assurance come in which forms?A. Standard Operating Procedures and Information Assurance PlansB. Regulatory OversightC. Stackoverflow QueriesD. Continuous Integration / Continuous Deployment
A
New cards
49
Challenges for assuring mobile software include which of the following? (Choose three)A. Device AestheticsB. ConnectivityC. Physical SizeD. Limited ResourcesE. User Education
BCD
New cards
50
Web applications are often exposed over the public internet and this introduces additional security concerns. True or false?
T
New cards
51
Which trait is mostly unique to firmware?A. Publicly availableB. Deployed on the WebC. Easily assuredD. Tight coupling to the hardware
D
New cards
52
Which stage of the SDLC should Software Assurance be introduced at?A. Every stageB. DesignC. TestingD. Deployment
A
New cards
53
DevSecOps means integrating security assurance into the entire DevOps process and pipeline. True or false?
T
New cards
54
Which testing is the most discrete form of testing and often automated as part of a CI/CD pipeline?A. Unit TestingB. Integration TestingC. User Acceptance TestingD. Penetration Testing
A
New cards
55
You should classify all data input sources as which of the following?A. Trusted or UntrustedB. Public or PrivateC. High or LowD. Internal or External
A
New cards
56
Secure credentials are stored in which form?A. With two-way encryptionB. They're never storedC. Plain textD. Salted and Hashed
D
New cards
57
SAST tools can review your code while it's executing to identify flaws or vulnerabilities. True or false?
F
New cards
58
Pros of dynamic analysis tools include which of the following? (Choose three)A. Provides a real-use viewB. Are simple to configure and useC. Have a limited variety in optionsD. Captures information at a discrete levelE. Identifies distinct flaws from SAST
ADE
New cards
59
SAML relies on which format for data transfer?A. XMLB. Speech-to-TextC. CSVD. JSON
A
New cards
60
Which type of Root of Trust is hardwired into the PCB or system board of a system?A. USB DongleB. Certificate AuthorityC. TPMD. HSM
C
New cards
61
An eFuse bit can only be written to a single time. True or false?
T
New cards
62
UEFI provides the necessary functionality for which system level process?A. Secure BootB. Boot LoadersC. BIOSD. Anti-virus software
A
New cards
63
Which boot process validates each successive piece of software as they start and halts if invalid software is discovered?A. Measured BootB. UEFIC. Secure BootD. Bus Encryption
C
New cards
64
Which types of data are TEEs used to secure? (Choose three)A. DRM ControlsB. Payment/PCI DataC. Virus or Malware DefinitionsD. Biometric DataE. OS Versioning
ABD
New cards
65
Match the two types of keys with their purpose.1. User password to unlock the drive2. Private key used to secure data
A. Authentication KeyB. Data Encryption Key
AB
New cards
66
Which of the following would be a part of heuristic analysis? (Choose two)A. Code analysis of unexecuted filesB. Observing patterns in attack vectors on an institutionC. Observing code execution in a sandboxD. Noting relationships between network traffic and malware
AC
New cards
67
Which type of security log would be most useful in order to determine the centrally cached web sites?A. Syslog Server logB. Windows Security Event LogC. Proxy Server SyslogD. Proxy Server Log
D
New cards
68
Which command-line tool is used to send the results of an onscreen command to a text file?A. \>B. |C. \D. <
A
New cards
69
Which of the following is the most basic initial function of a SIEM system?A. Correlation via rulesB. Log aggregation dashboardC. Artificial IntelligenceD. Security Orchestration and Automation Response
B
New cards
70
Which log is associated with tracking both successful and failed authentication attempts on a Linux operating system?A. auth.logB. faillogC. security event logD. syslog
A
New cards
71
Which type of network analysis decodes the content of packets to see the application data moving through the network?A. Flow AnalysisB. DNS AnalysisC. Protocol AnalysisD. Packet Analysis
D
New cards
72
Which form of email security infrastructure specifically focuses on digital signatures of outbound email from a mail server?A. DNSB. DMARCC. DKIMD. SPF
C
New cards
73
Which type of email-related concern escalates most of the other security concerns?A. Embedded linksB. Forwarder redirectionC. Social engineeringD. Attachments
C
New cards
74
Which type of impact is best described as the impact to the data within a company?A. LocalB. OrganizationalC. TotalD. Immediate
A
New cards
75
Which permissions would let someone view and launch a file that used memory triggering a CPU process? (Choose two)A. DeleteB. PermissionsC. ReadD. WriteE. Execute
CE
New cards
76
Which of the following are the best candidates for a blacklist? (Choose two)A. FirewallsB. Network ACLsC. MalwareD. Malicious traffic patternsE. Permissions
CD
New cards
77
Regarding firewall passwords, which of the following typically cause the greatest vulnerabilities? (Choose two)A. Config filesB. UpdatesC. ZonesD. DefaultsE. Rules
AD
New cards
78
When IPS traffic is allowed through to the network when it should have been blocked, it's referred to as which of the following?A. False negativeB. False positiveC. Out-of-band enforcementD. Baseline
A
New cards
79
Which of the following are likely areas of management in a Data Loss Prevention system? (Choose three)A. PrintingB. PermissionsC. EmailD. SoftwareE. User Authentication
ACD
New cards
80
Which location is typical for an EDR agent installation?A. FirewallB. Virtual ServerC. RouterD. Switch
B
New cards
81
Which element of a NAC topology best describes a layer 2 switch?A. Authentication ServerB. SupplicantC. Internet of ThingsD. Authenticator
D
New cards
82
Which security infrastructure element is added in order to redirect endpoints to a new destination?A. SinkholeB. SandboxC. HoneynetD. Honeypot
A
New cards
83
Which of the following is the most valuable resource in proactive threat management?A. FirewallsB. PeopleC. Artificial IntelligenceD. Intrusion Detection Systems
B
New cards
84
Why do we need to learn about current threats in order to develop an accurate hypothesis to investigate? (Choose three)A. ProceduresB. PoliciesC. TitlesD. TechniquesE. Tactics
ADE
New cards
85
Which type of advanced persistent threat actor is known for having large resources and wanting to affect disruption in a foreign country?A. HacktivistB. Cyber CriminalC. Nation StateD. Cyber-Terrorist
C
New cards
86
Order the threat hunting step appropriately.A. Envision the AttackB. Keep LearningC. Look for AttacksD. Know Thyself
DACB
New cards
87
Which of the following is associated most with network controls rather than endpoint controls?A. Change defaultsB. Deny all ports and protocolsC. ContainerizationD. Desired State Configuration
B
New cards
88
Which of the following is the most valid definition of an attack vector?A. A method of attackB. Exploited vulnerabilitiesC. Agents of potential harm to an enterpriseD. Malware
A
New cards
89
Which of the following is the most accurate description of a system that gathers vast quantities of data through neural networks?A. Machine LearningB. Artificial IntelligenceC. Deep LearningD. Natural Intelligence
C
New cards
90
Which security protocol is associated with public key infrastructure (PKI) as it applies to automation?A. Common Platform Enumeration (CPE)B. Extensible Configuration Checklist Description Format (XCCDF)C. Trust Model for Security Automation Data (TMSAD)D. Open Vulnerability Language (OVAL)
C
New cards
91
Which of the following is an element of Security Orchestration Automation and Response (SOAR)? (Choose two)A. Perform action steps with integrated systemsB. Examine log for patternsC. Collect incoming data streamsD. Capture network traffic
AC
New cards
92
How do APIs allow for better security automation?A. Provide a language for scriptingB. Ensure automatic updatesC. Identify end usersD. Read and write to software systems configurations and data
D
New cards
93
Which of the following enables malware detection software to quickly recognize new variants of a strain of malware? (Choose two)A. Centralized malware databasesB. String hashesC. File hashesD. Deep learning
BD
New cards
94
You're a security analyst wanting to incorporate third-party up-to-date security information into the context of machine learning that's already using content from your SIEM. Which process should be used?A. Data DeduplicationB. Data EnrichmentC. Data MiningD. Data Cleansing
B
New cards
95
Which of the following is the best description of a methodology involving regular small incremental changes over the lifespan of a piece of software?A. Continuous DeliveryB. Continuous IntegrationC. Continuous DeploymentD. Security Automation
B
New cards
96
An incident response process is a methodology providing guidance on handling of cyber threats and breaches. True or false?
T
New cards
97
According to the NIST framework, what are the four objectives of incident response? (Choose four)A. PreparationB. ClassificationC. Containment, eradication, and recoveryD. Detection and analysisE. Post-incident activity
ACDE
New cards
98
A junior network analyst is monitoring network usage when he notices a huge usage on outbound network traffic. The traffic usage indicates a recent spiked bandwidth that has not been recorded. How would the analyst categorize this information?A. Employees downloading torrentsB. Timed out connectionsC. Potential indicator of compromiseD. Packet loss
C
New cards
99
Which of the following are categories of alerts? Choose all that apply.A. InformationalB. PartialC. MediumD. Critical
ACD
New cards
100
Which of the following is NOT a post incident activity?A. Lesson learned reportB. Incident response planningC. Evidence retentionD. Incident summary report
B
New cards

Explore top notes

note Note
studied byStudied by 12 people
732 days ago
5.0(1)
note Note
studied byStudied by 114 people
922 days ago
4.7(3)
note Note
studied byStudied by 3 people
776 days ago
5.0(1)
note Note
studied byStudied by 1390 people
714 days ago
4.3(7)
note Note
studied byStudied by 7 people
140 days ago
5.0(1)
note Note
studied byStudied by 37 people
168 days ago
5.0(2)
note Note
studied byStudied by 1 person
42 days ago
5.0(1)
note Note
studied byStudied by 30 people
972 days ago
4.5(2)

Explore top flashcards

flashcards Flashcard (95)
studied byStudied by 4 people
34 days ago
5.0(1)
flashcards Flashcard (150)
studied byStudied by 171 people
386 days ago
5.0(1)
flashcards Flashcard (47)
studied byStudied by 19 people
326 days ago
5.0(1)
flashcards Flashcard (36)
studied byStudied by 1 person
498 days ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 11 people
483 days ago
5.0(2)
flashcards Flashcard (80)
studied byStudied by 69 people
409 days ago
5.0(1)
flashcards Flashcard (39)
studied byStudied by 3 people
726 days ago
5.0(1)
flashcards Flashcard (21)
studied byStudied by 55 people
204 days ago
5.0(1)
robot