New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Last Attempt CS0-001 Questions

Page: 10 / 17
Total 455 questions

CompTIA CSA+ Certification Exam Questions and Answers

Question 37

An organization wants to perform network scans to Identify active hosts and vulnerabilities. Management places the highest priority on scans that mimic how an attack would progress. Iftime and resources allow, subsequent scans can be performed using different techniques and methods. Which of the following scan types and sequences would BEST suit the organization's requirements?

Options:

A.

Norvcredentialed scans followed by credentialed scans

B.

Credentialed scans followed by compliance scans

C.

Compliance scans followed by credentialed scans

D.

Compliance scans followed by non-credentialed scans

Question 38

A cyber incident response team finds a vulnerability on a company website that allowed an attacker to inject malicious code into its web application. There have been numerous unsuspecting users visiting the infected page, and the malicious code executed on the victim’s browser has led to stolen cookies, hijacked sessions, malware execution, and bypassed access control. Which of the following exploits is the attacker conducting on the company’s website?

Options:

A.

Logic bomb

B.

Rootkit

C.

Privilege escalation

D.

Cross-site scripting

Question 39

A company uses a managed IDS system, and a security analyst has noticed a large volume of brute force password attacks originating from a single IP address. The analyst put in a ticket with the IDS provider, but no action was taken for 24 hours, and the attacks continued. Which of the following would be the BEST approach for the scenario described?

Options:

A.

Draft a new MOU to include response incentive fees.

B.

Reengineer the BPA to meet the organization’s needs.

C.

Modify the SLA to support organizational requirements.

D.

Implement an MOA to improve vendor responsiveness.

Question 40

The Chief Information Security Officer (CISO) has asked the security analyst to examine abnormally high processor utilization on a key server. The output below is from the company’s research and development (R&D) server.

Which of the following actions should the security analyst take FIRST?

Options:

A.

Initiate an investigation

B.

Isolate the R&D server

C.

Reimage the server

D.

Determine availability

Page: 10 / 17
Total 455 questions