New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CompTIA CySA+ CS0-001 Exam Dumps

Page: 3 / 17
Total 455 questions

CompTIA CSA+ Certification Exam Questions and Answers

Question 9

A cybersecurity analyst traced the source of an attack to compromised user credentials. Log analysis revealed that the attacker successfully authenticated from an unauthorized foreign country. Management asked the security analyst to research and implement a solution to help mitigate attacks based on compromised passwords. Which of the following should the analyst implement?

Options:

A.

Self-service password reset

B.

Single sign-on

C.

Context-based authentication

D.

Password complexity

Question 10

A university wants to increase the security posture of its network by implementing vulnerability scans of both centrally managed and student/employee laptops. The solution should be able to scale, provide minimum false positives and high accuracy of results, and be centrally managed through an enterprise console. Which of the following scanning topologies is BEST suited for this environment?

Options:

A.

A passive scanning engine located at the core of the network infrastructure

B.

A combination of cloud-based and server-based scanning engines

C.

A combination of server-based and agent-based scanning engines

D.

An active scanning engine installed on the enterprise console

Question 11

You suspect that multiple unrelated security events have occurred on several nodes on a corporate network. You must review all logs and correlate events when necessary to discover each security event by clicking on each node. Only select corrective actions if the logs shown a security event that needs remediation. Drag and drop the appropriate corrective actions to mitigate the specific security event occurring on each affected device.

Instructions:

The Web Server, Database Server, IDS, Development PC, Accounting PC and Marketing PC are clickable. Some actions may not be required and each actions can only be used once per node. The corrective action order is not important. If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

Options:

Question 12

Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?

Options:

A.

Blue team training exercises

B.

Technical control reviews

C.

White team training exercises

D.

Operational control reviews

Page: 3 / 17
Total 455 questions