CompTIA CySA+CS0-002 – Question160

As part of the senior leadership team's ongoing risk management activities, the Chief Information Security Officer has tasked a security analyst with coordinating the right training and testing methodology to respond to new business initiatives or significant changes to existing ones. The management team wants to examine a new business process that would use existing infrastructure to process and store sensitive data. Which of the following would be appropriate for the security analyst to coordinate?

A.
A black-box penetration testing engagement
B. A tabletop exercise
C. Threat modeling
D. A business impact analysis

Correct Answer: B

CompTIA CySA+CS0-002 – Question159

During an incident, it is determined that a customer database containing email addresses, first names, and last names was exfiltrated. Which of the following should the security analyst do NEXT?

A.
Consult with the legal department for regulatory impact.
B. Encrypt the database with available tools.
C. Email the customers to inform them of the breach.
D. Follow the incident communications process.

Correct Answer: A

CompTIA CySA+CS0-002 – Question158

A company offers a hardware security appliance to customers that provides remote administration of a device on the customer's network. Customers are not authorized to alter the configuration. The company deployed a software process to manage unauthorized changes to the appliance, log them, and forward them to a central repository for evaluation. Which of the following processes is the company using to ensure the appliance is not altered from its original configured state?

A.
CI/CD
B. Software assurance
C. Anti-tamper
D. Change management

Correct Answer: D

CompTIA CySA+CS0-002 – Question157

A small business does not have enough staff in the accounting department to segregate duties. The comptroller writes the checks for the business and reconciles them against the ledger. To ensure there is no fraud occurring, the business conducts quarterly reviews in which a different officer in the business compares all the cleared checks against the ledger. Which of the following BEST describes this type of control?

A.
Deterrent
B. Preventive
C. Compensating
D. Detective

Correct Answer: C

CompTIA CySA+CS0-002 – Question156

A company's security team recently discovered a number of workstations that are at the end of life. The workstation vendor informs the team that the product is no longer supported, and patches are no longer available. The company is not prepared to cease its use of these workstations. Which of the following would be the BEST method to protect these workstations from threats?

A.
Deploy whitelisting to the identified workstations to limit the attack surface.
B. Determine the system process criticality and document it.
C. Isolate the workstations and air gap them when it is feasible.
D. Increase security monitoring on the workstations.

Correct Answer: C

CompTIA CySA+CS0-002 – Question155

A security analyst needs to reduce the overall attack surface. Which of the following infrastructure changes should the analyst recommend?

A.
Implement a honeypot.
B. Air gap sensitive systems.
C. Increase the network segmentation.
D. Implement a cloud-based architecture.

Correct Answer: B

CompTIA CySA+CS0-002 – Question154

A small electronics company decides to use a contractor to assist with the development of a new FPGA-based device. Several of the development phases will occur off-site at the contractor's labs. Which of the following is the main concern a security analyst should have with this arrangement?

A.
Making multiple trips between development sites increases the chance of physical damage to the FPGAs.
B. Moving the FPGAs between development sites will lessen the time that is available for security testing.
C. Development phases occurring at multiple sites may produce change management issues.
D. FPGA applications are easily cloned, increasing the possibility of intellectual property theft.

Correct Answer: D

CompTIA CySA+CS0-002 – Question153

A security team has begun updating the risk management plan, incident response plan, and system security plan to ensure compliance with security review guidelines. Which of the following can be executed by internal managers to simulate and validate the proposed changes?

A.
Internal management review
B. Control assessment
C. Tabletop exercise
D. Peer review

Correct Answer: A

CompTIA CySA+CS0-002 – Question152

During a forensic investigation, a security analyst reviews some Session Initiation Protocol packets that came from a suspicious IP address. Law enforcement requires access to a VoIP call that originated from the suspicious IP address. Which of the following should the analyst use to accomplish this task?

A.
Wireshark
B. iptables
C. Tcp dump
D. Net flow

Correct Answer: A

CompTIA CySA+CS0-002 – Question151

A Chief Information Security Officer (CISO) is concerned developers have too much visibility into customer data. Which of the following controls should be implemented to BEST address these concerns?

A.
Data masking
B. Data loss prevention
C. Data minimization
D. Data sovereignty

Correct Answer: A