CompTIA CS0-001 Exam Practice Questions (P. 3)
- Full Access (416 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
An analyst was tasked with providing recommendations of technologies that are PKI X.509 compliant for a variety of secure functions. Which of the following technologies meet the compatibility requirement? (Choose three.)
send
light_mode
delete
Question #22
After completing a vulnerability scan, the following output was noted:

Which of the following vulnerabilities has been identified?

Which of the following vulnerabilities has been identified?
- APKI transfer vulnerability.
- BActive Directory encryption vulnerability.
- CWeb application cryptography vulnerability.
- DVPN tunnel vulnerability.
Correct Answer:
C
C
send
light_mode
delete
Question #23
A security analyst is adding input to the incident response communication plan. A company officer has suggested that if a data breach occurs, only affected parties should be notified to keep an incident from becoming a media headline. Which of the following should the analyst recommend to the company officer?
- AThe first responder should contact law enforcement upon confirmation of a security incident in order for a forensics team to preserve chain of custody.
- BGuidance from laws and regulations should be considered when deciding who must be notified in order to avoid fines and judgements from non-compliance.
- CAn externally hosted website should be prepared in advance to ensure that when an incident occurs victims have timely access to notifications from a non- compromised recourse.
- DThe HR department should have information security personnel who are involved in the investigation of the incident sign non-disclosure agreements so the company cannot be held liable for customer data that might be viewed during an investigation.
Correct Answer:
A
A
send
light_mode
delete
Question #24
A company has recently launched a new billing invoice website for a few key vendors. The cybersecurity analyst is receiving calls that the website is performing slowly and the pages sometimes time out. The analyst notices the website is receiving millions of requests, causing the service to become unavailable. Which of the following can be implemented to maintain the availability of the website?
send
light_mode
delete
Question #25
A cybersecurity analyst has received the laptop of a user who recently left the company. The analyst types "˜history' into the prompt, and sees this line of code in the latest bash history:

This concerns the analyst because this subnet should not be known to users within the company. Which of the following describes what this code has done on the network?

This concerns the analyst because this subnet should not be known to users within the company. Which of the following describes what this code has done on the network?
- APerformed a ping sweep of the Class C network.
- BPerformed a half open SYB scan on the network.
- CSent 255 ping packets to each host on the network.
- DSequentially sent an ICMP echo reply to the Class C network.
Correct Answer:
A
A
send
light_mode
delete
Question #26
A security audit revealed that port 389 has been used instead of 636 when connecting to LDAP for the authentication of users. The remediation recommended by the audit was to switch the port to 636 wherever technically possible. Which of the following is the BEST response?
- ACorrect the audit. This finding is a well-known false positive; the services that typically run on 389 and 636 are identical.
- BChange all devices and servers that support it to 636, as encrypted services run by default on 636.
- CChange all devices and servers that support it to 636, as 389 is a reserved port that requires root access and can expose the server to privilege escalation attacks.
- DCorrect the audit. This finding is accurate, but the correct remediation is to update encryption keys on each of the servers to match port 636.
Correct Answer:
B
B
send
light_mode
delete
Question #27
A security analyst is reviewing IDS logs and notices the following entry:

Which of the following attacks is occurring?

Which of the following attacks is occurring?
- ACross-site scripting
- BHeader manipulation
- CSQL injection
- DXML injection
Correct Answer:
C
C
send
light_mode
delete
Question #28
A company that is hiring a penetration tester wants to exclude social engineering from the list of authorized activities. Which of the following documents should include these details?
- AAcceptable use policy
- BService level agreement
- CRules of engagement
- DMemorandum of understanding
- EMaster service agreement
Correct Answer:
C
C
send
light_mode
delete
Question #29
A reverse engineer was analyzing malware found on a retailer's network and found code extracting track data in memory. Which of the following threats did the engineer MOST likely uncover?
send
light_mode
delete
Question #30
Due to new regulations, a company has decided to institute an organizational vulnerability management program and assign the function to the security team.
Which of the following frameworks would BEST support the program? (Choose two.)
Which of the following frameworks would BEST support the program? (Choose two.)
send
light_mode
delete
All Pages