Exam Details

  • Exam Code
    :CS0-002
  • Exam Name
    :CompTIA Cybersecurity Analyst (CySA+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1059 Q&As
  • Last Updated
    :Apr 09, 2025

CompTIA CompTIA Certifications CS0-002 Questions & Answers

  • Question 921:

    A new on-premises application server was recently installed on the network. Remote access to the server was enabled for vendor support on required ports, but recent security reports show large amounts of data are being sent to various unauthorized networks through those ports. Which of the following configuration changes must be implemented to resolve this security issue while still allowing remote vendor access?

    A. Apply a firewall application server rule.

    B. Whitelist the application server.

    C. Sandbox the application server.

    D. Enable port security.

    E. Block the unauthorized networks.

  • Question 922:

    An organization wants to move non-essential services into a cloud computing environment. Management has a cost focus and would like to achieve a recovery time objective of 12 hours. Which of the following cloud recovery strategies would work BEST to attain the desired outcome?

    A. Duplicate all services in another instance and load balance between the instances.

    B. Establish a hot site with active replication to another region within the same cloud provider.

    C. Set up a warm disaster recovery site with the same cloud provider in a different region

    D. Configure the systems with a cold site at another cloud provider that can be used for failover.

  • Question 923:

    A security analyst discovers accounts in sensitive SaaS-based systems are not being removed in a timely manner when an employee leaves the organization To BEST resolve the issue, the organization should implement:

    A. federated authentication

    B. role-based access control.

    C. manual account reviews

    D. multifactor authentication.

  • Question 924:

    As a proactive threat-hunting technique, hunters must develop situational cases based on likely attack scenarios derived from the available threat intelligence information. After forming the basis of the scenario, which of the following may the threat hunter construct to establish a framework for threat assessment?

    A. Critical asset list

    B. Threat vector

    C. Attack profile

    D. Hypothesis

  • Question 925:

    A small organization has proprietary software that is used internally. The system has not been well maintained and cannot be updated with the rest of the environment

    Which of the following is the BEST solution?

    A. Virtualize the system and decommission the physical machine.

    B. Remove it from the network and require air gapping.

    C. Only allow access to the system via a jumpbox

    D. Implement MFA on the specific system.

  • Question 926:

    Which of the following attacks can be prevented by using output encoding?

    A. Server-side request forgery

    B. Cross-site scripting

    C. SQL injection

    D. Command injection

    E. Cross-site request forgery

    F. Directory traversal

  • Question 927:

    A security analyst is responding to an incident on a web server on the company network that is making a large number of outbound requests over DNS

    Which of the following is the FIRST step the analyst should take to evaluate this potential indicator of compromise'?

    A. Run an anti-malware scan on the system to detect and eradicate the current threat

    B. Start a network capture on the system to look into the DNS requests to validate command and control traffic.

    C. Shut down the system to prevent further degradation of the company network

    D. Reimage the machine to remove the threat completely and get back to a normal running state.

    E. Isolate the system on the network to ensure it cannot access other systems while evaluation is underway.

  • Question 928:

    A security analyst conducted a risk assessment on an organization's wireless network and identified a high-risk element in the implementation of data confidentially protection. Which of the following is the BEST technical security control to mitigate this risk?

    A. Switch to RADIUS technology

    B. Switch to TACACS+ technology.

    C. Switch to 802 IX technology

    D. Switch to the WPA2 protocol.

  • Question 929:

    A developer wrote a script to make names and other Pll data unidentifiable before loading a database export into the testing system Which of the following describes the type of control that is being used?

    A. Data encoding

    B. Data masking

    C. Data loss prevention

    D. Data classification

  • Question 930:

    A security analyst receives an alert that highly sensitive information has left the company's network Upon investigation, the analyst discovers an outside IP range has had connections from three servers more than 100 times m the past month. The affected servers are virtual machines

    Which of the following is the BEST course of action?

    A. Shut down the servers as soon as possible, move them to a clean environment, restart, run a vulnerability scanner to find weaknesses determine the root cause, remediate, and report

    B. Report the data exfiltration to management take the affected servers offline, conduct an antivirus scan, remediate all threats found, and return the servers to service.

    C. Disconnect the affected servers from the network, use the virtual machine console to access the systems, determine which information has left the network, find the security weakness, and remediate

    D. Determine if any other servers have been affected, snapshot any servers found, determine the vector that was used to allow the data exfiltration. fix any vulnerabilities, remediate, and report.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CS0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.