Exam Details

  • Exam Code
    :CS0-002
  • Exam Name
    :CompTIA Cybersecurity Analyst (CySA+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1059 Q&As
  • Last Updated
    :Apr 17, 2025

CompTIA CompTIA Certifications CS0-002 Questions & Answers

  • Question 821:

    A cybersecurity analyst is researching operational data to develop a script that will detect the presence of a threat on corporate assets. Which of the following contains the most useful information to produce this script?

    A. API documentation

    B. Protocol analysis captures

    C. MITRE ATTandCK reports

    D. OpenloC files

  • Question 822:

    Given the output below:

    #nmap 7.70 scan initiated Tues, Feb 8 12:34:56 2022 as: nmap -v -Pn -p 80,8000,443 -- script http-* -oA server.out 192.168.220.42

    Which of the following is being performed?

    A. Cross-site scripting

    B. Local file inclusion attack

    C. Log4] check

    D. Web server enumeration

  • Question 823:

    A security analyst needs to automate the incident response process for malware infections. When the following logs are generated, an alert email should automatically be sent within 30 minutes:

    Which of the following is the best way for the analyst to automate alert generation?

    A. Deploy a signature-based IDS

    B. Install a UEBA-capable antivirus

    C. Implement email protection with SPF

    D. Create a custom rule on a SIEM

  • Question 824:

    A company's threat team has been reviewing recent security incidents and looking for a common theme. The team discovered the incidents were caused by incorrect configurations on the impacted systems. The issues were reported to support teams, but no action was taken. Which of the following is the next step the company should take to ensure any future issues are remediated?

    A. Require support teams to develop a corrective control that ensures security failures are addressed once they are identified.

    B. Require support teams to develop a preventive control that ensures new systems are built with the required security configurations.

    C. Require support teams to develop a detective control that ensures they continuously assess systems for configuration errors.

    D. Require support teams to develop a managerial control that ensures systems have a documented configuration baseline.

  • Question 825:

    Which of the following describes the difference between intentional and unintentional insider threats'?

    A. Their access levels will be different

    B. The risk factor will be the same

    C. Their behavior will be different

    D. The rate of occurrence will be the same

  • Question 826:

    A security analyst is logged on to a jump server to audit the system configuration and status. The organization's policies for access to and configuration of the jump server include the following:

    No network access is allowed to the internet.

    SSH is only for management of the server.

    Users must utilize their own accounts, with no direct login as an administrator.

    Unnecessary services must be disabled.

    The analyst runs netstar with elevated permissions and receives the following output:

    Which of the following policies does the server violate?

    A. Unnecessary services must be disabled.

    B. SSH is only for management of the server.

    C. No network access is allowed to the internet.

    D. Users must utilize their own accounts, with no direct login as an administrator.

  • Question 827:

    Which of the following is the greatest security concern regarding ICS?

    A. The involved systems are generally hard to identify.

    B. The systems are configured for automatic updates, leading to device failure.

    C. The systems are oftentimes air gapped, leading to fileless malware attacks.

    D. Issues on the systems cannot be reversed without rebuilding the systems.

  • Question 828:

    The management team has asked a senior security engineer to explore DLP security solutions for the company's growing use of cloud-based storage. Which of the following is an appropriate solution to control the sensitive data that is being stored in the cloud?

    A. NAC

    B. IPS

    C. CASB

    D. WAF

  • Question 829:

    A code review reveals a web application is using lime-based cookies for session management. This is a security concern because lime-based cookies are easy to:

    A. parameterize.

    B. decode.

    C. guess.

    D. decrypt.

  • Question 830:

    While reviewing system logs, a network administrator discovers the following entry:

    Which of the following occurred?

    A. An attempt was made to access a remote workstation.

    B. The PsExec services failed to execute.

    C. A remote shell failed to open.

    D. A user was trying to download a password file from a remote system.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CS0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.