CompTIA CS0-002 CompTIA Cybersecurity Analyst (CySA+) Exam Practice Test

Page: 1 / 14
Total 372 questions
Question 1

A cybersecurity analyst inspects DNS logs on a regular basis to identify possible IOCs that are not triggered by known signatures. The analyst reviews the following log snippet:

Which of the following should the analyst do next based on the information reviewed?



Question 2

An organization is required to be able to consume multiple threat feeds simultaneously and to provide actionable intelligence to various teams. The organization would also like to be able to leverage the intelligence to enrich security event dat

a. Which of the following functions would most likely help the security analyst meet the organization's requirements?



Question 3

A security analyst implemented a solution that would analyze the attacks that the organization's firewalls failed to prevent. The analyst used the existing systems to enact the solution and executed the following command:

$ sudo nc ---1 ---v ---e maildaemon.py 25 > caplog.txt

Which of the following solutions did the analyst implement?



Question 4

An analyst is coordinating with the management team and collecting several terabytes of data to analyze using advanced mathematical techniques in order to find patterns and correlations in events and activities. Which of the following describes what the analyst is doing?



Question 5

A network appliance manufacturer is building a new generation of devices and would like to include chipset security improvements. The management team wants the security team to implement a method to prevent security weaknesses that could be reintroduced by downgrading the firmware version on the chipset. Which of the following would meet this objective?



Question 6

An organization wants to implement controls for protecting private information at rest. Which of the following would meet the organization's need?



Question 7

A company is setting up a small, remote office to support five to ten employees. The company's home office is in a different city, where the company uses a cloud service provider for its business applications and a local server to host its dat

a. To provide shared access from the remote office to the local server and the business applications, which of the following would be the easiest and most secure solution?



Page:    1 / 14   
Total 372 questions