CompTIA CySA+CS0-002 – Question110

An information security analyst discovered a virtual machine server was compromised by an attacker. Which of the following should be the FIRST steps to confirm and respond to the incident? (Choose two.)

A.
Pause the virtual machine.
B. Shut down the virtual machine.
C. Take a snapshot of the virtual machine.
D. Remove the NIC from the virtual machine.
E. Review host hypervisor log of the virtual machine.
F. Execute a migration of the virtual machine.

Correct Answer: CD

CompTIA CySA+CS0-002 – Question109

An executive assistant wants to onboard a new cloud-based product to help with business analytics and dashboarding. Which of the following would be the BEST integration option for this service?

A.
Manually log in to the service and upload data files on a regular basis.
B. Have the internal development team script connectivity and file transfers to the new service.
C. Create a dedicated SFTP site and schedule transfers to ensure file transport security.
D. Utilize the cloud product's API for supported and ongoing integrations.

Correct Answer: D

CompTIA CySA+CS0-002 – Question108

A cybersecurity analyst needs to rearchitect the network using a firewall and a VPN server to achieve the highest level of security. To BEST complete this task, the analyst should place the:

A.
firewall behind the VPN server.
B. VPN server parallel to the firewall
C. VPN server behind the firewall.
D. VPN on the firewall.

Correct Answer: D

CompTIA CySA+CS0-002 – Question107

Which of the following is MOST important when developing a threat hunting program?

A.
Understanding penetration testing techniques
B. Understanding how to build correlation rules within a SIEM
C. Understanding security software technologies
D. Understanding assets and categories of assets

Correct Answer: D

CompTIA CySA+CS0-002 – Question106

The help desk is having difficulty keeping up with all onboarding and offboarding requests. Managers often submit requests for new users at the last minute, causing the help desk to scramble to create accounts across many different interconnected systems. Which of the following solutions would work BEST to assist the help desk with the onboarding and offboarding process while protecting the company's assets?

A.
MFA
B. CASB
C. SSO
D. RBAC

Correct Answer: C

CompTIA CySA+CS0-002 – Question105

A security analyst reviews the following aggregated output from an Nmap scan and the border firewall ACL:

Which of the following should the analyst reconfigure to BEST reduce organizational risk while maintaining current functionality?

A.
PC1
B. PC2
C. Server1
D. Server2
E. Firewall

Correct Answer: B

CompTIA CySA+CS0-002 – Question104

A security analyst reviews a recent network capture and notices encrypted inbound traffic on TCP port 465 was coming into the company's network from a database server. Which of the following will the security analyst MOST likely identify as the reason for the traffic on this port?

A.
The server is configured to communicate on the secure database standard listener port.
B. Someone has configured an unauthorized SMTP application over SSL.
C. A connection from the database to the web front end is communicating on the port.
D. The server is receiving a secure connection using the new TLS 1.3 standard.

Correct Answer: B

CompTIA CySA+CS0-002 – Question103

A security analyst needs to provide the development team with secure connectivity from the corporate network to a three-tier cloud environment. The developers require access to servers in all three tiers in order to perform various configuration tasks. Which of the following technologies should the analyst implement to provide secure transport?

A.
CASB
B. VPC
C. Federation
D. VPN

Correct Answer: B

CompTIA CySA+CS0-002 – Question101

A cybersecurity analyst is establishing a threat-hunting and intelligence group at a growing organization. Which of the following is a collaborative resource that would MOST likely be used for this purpose?

A.
IoC feeds
B. CVSS scores
C. Scrum
D. ISAC

Correct Answer: A