New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CS0-001 CompTIA Exam Lab Questions

Page: 12 / 17
Total 455 questions

CompTIA CSA+ Certification Exam Questions and Answers

Question 45

An organization has two environments: development and production. Development is where applications are developed with unit testing. The development environment has many configuration differences from the production environment. All applications are hosted on virtual machines. Vulnerability scans are performed against all systems before and after any application or configuration changes to any environment. Lately, vulnerability remediation activity has caused production applications to crash and behave unpredictably. Which of the following changes should be made to the current vulnerability management process?

Options:

A.

Create a third environment between development and production that mirrors production and tests all changes before deployment to the users

B.

Refine testing in the development environment to include fuzzing and user acceptance testing so applications are more stable before they migrate to production

C.

Create a second production environment by cloning the virtual machines, and if any stability problems occur, migrate users to the alternate production environment

D.

Refine testing in the production environment to include more exhaustive application stability testing while continuing to maintain the robust vulnerability remediation activities

Question 46

An analyst received a forensically sound copy of an employee’s hard drive. The employee’s manager suspects inappropriate images may have been deleted from the hard drive. Which of the following could help the analyst recover the deleted evidence?

Options:

A.

File hashing utility

B.

File timestamps

C.

File carving tool

D.

File analysis tool

Question 47

A company invested ten percent of its entire annual budget in security technologies. The Chief Information Officer (CIO) is convinced that, without this investment, the company will risk being the next victim of the same cyber attack its competitor experienced three months ago. However, despite this investment, users are sharing their usernames and passwords with their coworkers to get their jobs done. Which of the following will eliminate the risk introduced by this practice?

Options:

A.

Invest in and implement a solution to ensure non-repudiation

B.

Force a daily password change

C.

Send an email asking users not to share their credentials

D.

Run a report on all users sharing their credentials and alert their managers of further actions

Question 48

A security analyst is reviewing logs and discovers that a company-owned computer issued to an employee is generating many alerts and warnings. The analyst continues to review the log events and discovers that a non-company-owned device from a different, unknown IP address is generating the same events. The analyst informs the manager of these findings, and the manager explains that these activities are already known and part of an ongoing events. Given this scenario, which of the following roles are the analyst, the employee, and the manager filling?

Options:

A.

The analyst is red team.The employee is blue team.The manager is white team.

B.

The analyst is white team.The employee is red team.The manager is blue team.

C.

The analyst is red team.The employee is white team.The manager is blue team.

D.

The analyst is blue team.The employee is red team.The manager is white team.

Page: 12 / 17
Total 455 questions