CS0-002 Dumps

CS0-002 Free Practice Test

CompTIA CS0-002: CompTIA Cybersecurity Analyst (CySA+) Certification Exam

QUESTION 171

An analyst performs a routine scan of a host using Nmap and receives the following output:
CS0-002 dumps exhibit
Which of the following should the analyst investigate FIRST?

Correct Answer: C

QUESTION 172

A system is experiencing noticeably slow response times, and users are being locked out frequently. An analyst asked for the system security plan and found the system comprises two servers: an application server in the DMZ and a database server inside the trusted domain. Which of the following should be performed NEXT to investigate the availability issue?

Correct Answer: C

QUESTION 173

A development team uses open-source software and follows an Agile methodology with two-week sprints. Last month, the security team filed a bug for an insecure version of a common library. The DevOps team updated the library on the server, and then the security team rescanned the server to verify it was no longer vulnerable. This month, the security team found the same vulnerability on the server.
Which of the following should be done to correct the cause of the vulnerability?

Correct Answer: B

QUESTION 174

An organization suspects it has had a breach, and it is trying to determine the potential impact. The organization knows the following:
CS0-002 dumps exhibit The source of the breach is linked to an IP located in a foreign country.
CS0-002 dumps exhibit The breach is isolated to the research and development servers.
CS0-002 dumps exhibit The hash values of the data before and after the breach are unchanged.
CS0-002 dumps exhibit The affected servers were regularly patched, and a recent scan showed no vulnerabilities.
Which of the following conclusions can be drawn with respect to the threat and impact? (Choose two.)

Correct Answer: BD

QUESTION 175

A web-based front end for a business intelligence application uses pass-through authentication to authenticate users The application then uses a service account, to perform queries and look up data m a database A security analyst discovers employees are accessing data sets they have not been authorized to use. Which of the following will fix the cause of the issue?

Correct Answer: B