Exam Details

  • Exam Code
    :CS0-002
  • Exam Name
    :CompTIA Cybersecurity Analyst (CySA+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1059 Q&As
  • Last Updated
    :Apr 09, 2025

CompTIA CompTIA Certifications CS0-002 Questions & Answers

  • Question 931:

    A security analyst is investigating a compromised Linux server. The analyst issues the ps command and receives the following output.

    Which of the following commands should the administrator run NEXT to further analyze the compromised system?

    A. strace /proc/1301

    B. rpm -V openash-server

    C. /bin/la -1 /proc/1301/exe

    D. kill -9 1301

  • Question 932:

    Which of the following technologies can be used to house the entropy keys for disk encryption on desktops and laptops?

    A. Self-encrypting drive

    B. Bus encryption

    C. TPM

    D. HSM

  • Question 933:

    A security analyst is investigating a malware infection that occurred on a Windows system. The system was not connected to a network and had no wireless capability Company policy prohibits using portable media or mobile storage The security analyst is trying to determine which user caused the malware to get onto the system

    Which of the following registry keys would MOST likely have this information?

    A. HKEY_USERS\\Software\Microsoft\Windows\CurrentVersion\Run

    B. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

    C. HKEY_USERS\\Software\Microsoft\Windows\explorer\MountPoints2

    D. HKEY_USERS\\Software\Microsoft\Internet Explorer\Typed URLs

    E. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\eventlog\System\iusb3hub

  • Question 934:

    Which of the following MOST accurately describes an HSM?

    A. An HSM is a low-cost solution for encryption.

    B. An HSM can be networked based or a removable USB

    C. An HSM is slower at encrypting than software

    D. An HSM is explicitly used for MFA

  • Question 935:

    A security analyst is investigating malicious traffic from an internal system that attempted to download proxy avoidance software as identified from the firewall logs but the destination IP is blocked and not captured. Which of the following should the analyst do?

    A. Shut down the computer

    B. Capture live data using Wireshark

    C. Take a snapshot

    D. Determine if DNS logging is enabled.

    E. Review the network logs.

  • Question 936:

    A security analyst was alerted to a tile integrity monitoring event based on a change to the vhost- paymonts .conf file The output of the diff command against the known-good backup reads as follows:

    SecRule ARGS:Card "@rx ([0-9]+" "id:123456,pass,capture,proxy:https://10.0.0.128/% (matched_var),nolog,noauditlog"

    Which of the following MOST likely occurred?

    A. The file was altered to accept payments without charging the cards

    B. The file was altered to avoid logging credit card information

    C. The file was altered to verify the card numbers are valid.

    D. The file was altered to harvest credit card numbers

  • Question 937:

    A security analyst recently discovered two unauthorized hosts on the campus's wireless network segment from a man-m-the-middle attack .The security analyst also verified that privileges were not escalated, and the two devices did not gain access to other network devices

    Which of the following would BEST mitigate and improve the security posture of the wireless network for this type of attack?

    A. Enable MAC filtering on the wireless router and suggest a stronger encryption for the wireless network,

    B. Change the SSID, strengthen the passcode, and implement MAC filtering on the wireless router.

    C. Enable MAC filtering on the wireless router and create a whitelist that allows devices on the network

    D. Conduct a wireless survey to determine if the wireless strength needs to be reduced.

  • Question 938:

    Risk management wants IT to implement a solution that will permit an analyst to intercept, execute, and analyze potentially malicious files that are downloaded from the Internet. Which of the following would BEST provide this solution?

    A. File fingerprinting

    B. Decomposition of malware

    C. Risk evaluation

    D. Sandboxing

  • Question 939:

    Joe, a penetration tester, used a professional directory to identify a network administrator and ID administrator for a client's company. Joe then emailed the network administrator, identifying himself as the ID administrator, and asked for a current password as part of a security exercise. Which of the following techniques were used in this scenario?

    A. Enumeration and OS fingerprinting

    B. Email harvesting and host scanning

    C. Social media profiling and phishing

    D. Network and host scanning

  • Question 940:

    A web developer wants to create a new web part within the company website that aggregates sales from individual team sites. A cybersecurity analyst wants to ensure security measurements are implemented during this process. Which of the following remediation actions should the analyst take to implement a vulnerability management process?

    A. Personnel training

    B. Vulnerability scan

    C. Change management

    D. Sandboxing

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CS0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.