New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CompTIA CySA+ Changed CS0-001 Questions

Page: 11 / 17
Total 455 questions

CompTIA CSA+ Certification Exam Questions and Answers

Question 41

A security analyst Is reviewing the overnight authentication activity and sees the following set of logs from last evening:

Which of the following should the analyst do NEXT?

Options:

A.

Ask the help desk to contact Diane Mayfair for a password reset.

B.

Fallow up with the Chief Financial Officer (CFO) regarding his login issues

C.

Check lays for activities by the dmeyfair account

D.

Contact Doug Smith lo set up an account in the system.

Question 42

The board of directors made the decision to adopt a cloud-first strategy. The current security infrastructure was designed for on-premise implementation. A critical application that is subject to the Federal Information Security Management Act (FISMA) of 2002 compliance has been identified as a candidate for a hybrid cloud deployment model. Which of the following should be conducted FIRST?

Options:

A.

Develop a request for proposal.

B.

Perform a risk assessment.

C.

Review current security controls.

D.

Review the SLA for FISMA compliance.

Question 43

Risk management wants IT to implement a solution that will permit an analyst to intercept, execute, and analyze potentially malicious files that are downloaded from the Internet.

Which of the following would BEST provide this solution?

Options:

A.

File fingerprinting

B.

Decomposition of malware

C.

Risk evaluation

D.

Sandboxing

Question 44

An organization subscribes to multiple third-party security intelligence feeds. It receives a notification from one of these feeds indicating a zero-day malware attack is impacting the SQL server prior to SP 2. The notification also indicates that infected systems attempt to communicate to external IP addresses on port 2718 to download additional payload. After consulting with the organization’s database administrator, it is determined that there are several SQL servers that are still on SP 1, and none of the SQL servers would normally communicate over port 2718. Which of the following is the BEST mitigation step to implement until the SQL servers can be upgraded to SP 2 with minimal impact to the network?

Options:

A.

Create alert rules on the IDS for all outbound traffic on port 2718 from the IP addresses if the SQL servers running SQL SP 1

B.

On the organization’s firewalls, create a new rule that blocks outbound traffic on port 2718 from the IP addresses of the servers running SQL SP 1

C.

Place all the SQL servers running SP 1 on a separate subnet On the firewalls, create a new rule blocking connections to destination addresses external to the organization’s network

D.

On the SQL servers running SP 1, install vulnerability scanning software

Page: 11 / 17
Total 455 questions