CS0-001 Dumps

CS0-001 Free Practice Test

CompTIA CS0-001: CompTIA CSA+ Certification Exam

QUESTION 11

- (Exam Topic 1)
The help desk informed a security analyst of a trend that is beginning to develop regarding a suspicious email that has been reported by multiple users. The analyst has determined the email includes an attachment named invoice.zip that contains the following files:
Locky.js xerty.ini xerty.lib
Further analysis indicates that when the .zip file is opened, it is installing a new version of ransomware on the devices. Which of the following should be done FIRST to prevent data on the company NAS from being encrypted by infected devices?

Correct Answer: B

QUESTION 12

- (Exam Topic 2)
An organization has recently experienced a data breach A forensic analysis. On formed the attacker found a legacy web server that had not been used in over a year and was not regularly patched After a discussion with the security team, management decided to initiate a program of network reconnaissance and penetration testing They want to start the process by scanning the network for active hosts and open pods Which of the following tools is BEST suited for this job?

Correct Answer: B

QUESTION 13

- (Exam Topic 2)
During a review of security controls, an analyst was able to connect to an external, unsecured FTP server from a workstation. The analyst was troubleshooting and reviewed the ACLs of the segment firewall the workstation is connected to:
<>

Correct Answer: A

QUESTION 14

- (Exam Topic 1)
An HR employee began having issues with a device becoming unresponsive after attempting to open an email attachment. When informed, the security analyst became suspicious of the situation, even though there was not any unusual behavior on the IDS or any alerts from the antivirus software. Which of the following BEST describes the type of threat in this situation?

Correct Answer: B

QUESTION 15

- (Exam Topic 2)
An analyst is troubleshooting a PC that is experiencing high processor and memory consumption. Investigation reveals the following processes are running on the system:
< > >< > >< > >< > >Which of the following tools should the analyst utilize to determine the rogue process?

Correct Answer: C