CySA+ Certification

Here you have the best CompTIA CS0-001 practice exam questions

  • You have 277 total questions to study from
  • Each page has 5 questions, making a total of 56 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on December 18, 2024
Question 1 of 277

SIMULATION -

The developers recently deployed new code to three web servers. A daily automated external device scan report shows server vulnerabilities that are failing items according to PCI DSS.

If the vulnerability is not valid, the analyst must take the proper steps to get the scan clean.

If the vulnerability is valid, the analyst must remediate the finding.

After reviewing the information provided in the network diagram, select the STEP 2 tab to complete the simulation by selecting the correct Validation Result and

Remediation Action for each server listed using the drop-down options.

Instructions -

STEP 1: Review the information provided in the network diagram.

STEP 2: Given the scenario, determine which remediation action is required to address the vulnerability.

If at any time you would like to bring back the initial state of the simulation, please select the Reset All button.

    Correct Answer:

    To properly address the vulnerabilities of the web servers based on the scan reports and logs provided, follow these steps for each server listed below: WEB_SERVER01 has a vulnerability due to the cleartext transmission of sensitive information, which allows anyone to read the information by gaining access to the communication channel. This is a valid issue, which is a True Positive. The appropriate remediation action is to encrypt the entire session to prevent the transmission of data in cleartext. WEB_SERVER02 has a vulnerability related to sensitive cookies in HTTPS sessions without the 'Secure' attribute, which could lead to session sidejacking. Upon inspection of the logs, the 'Secure' attribute is not set for some cookies, thus, this is a valid issue, representing a True Positive. The remediation action required here is to encrypt all session cookies by setting the 'Secure' attribute, ensuring cookies are only sent over secure connections. WEB_SERVER03 is flagged for a low-severity vulnerability involving an untrusted SSL/TLS server certificate signed by an untrusted or unknown certification authority. The logs reveal that the certificate in use is self-signed. This is a valid issue, a True Positive, and the proper remediation action is to request a certificate from a public Certificate Authority (CA) to replace the self-signed certificate. Following these validation results and remediation actions will address the identified vulnerabilities effectively.

Question 2 of 277

DRAG DROP -

You suspect that multiple unrelated security events have occurred on several nodes on a corporate network. You must review all logs and correlate events when necessary to discover each security event by clicking on each node. Only select corrective actions if the logs shown a security event that needs remediation. Drag and drop the appropriate corrective actions to mitigate the specific security event occurring on each affected device.

Instructions:

The Web Server, Database Server, IDS, Development PC, Accounting PC and Marketing PC are clickable. Some actions may not be required and each actions can only be used once per node. The corrective action order is not important. If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the

Next button to continue.

Select and Place:

    Correct Answer:

Question 3 of 277

HOTSPOT -

A security analyst suspects that a workstation may be beaconing to a command and control server. Inspect the logs from the company's web proxy server and the firewall to determine the best course of action to take in order to neutralize the threat with minimum impact to the organization.

Instructions:

Modify the firewall ACL, using the Firewall ACL form to mitigate the issue.

If at any time you would like to bring back the initial state of the simulation, please select the Reset All button.

Hot Area:

    Correct Answer:

Question 4 of 277

Which of the following BEST describes the offensive participants in a tabletop exercise?

    Correct Answer: A

    The offensive participants in a tabletop exercise are best described as the Red team. The Red team is responsible for simulating attacks against the organization's systems and infrastructure to test the effectiveness of the defensive measures and response strategies.

Question 5 of 277

After analyzing and correlating activity from multiple sensors, the security analyst has determined a group from a high-risk country is responsible for a sophisticated breach of the company network and continuous administration of targeted attacks for the past three months. Until now, the attacks went unnoticed.

This is an example of:

    Correct Answer: B

    An advanced persistent threat (APT) is a type of network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The goal of the intruder is usually to steal data rather than to cause damage to the network or organization. In this case, the security analyst's determination that a group from a high-risk country has been continuously managing targeted attacks for the past three months without detection strongly suggests the presence of an APT.