CompTIA CySA+CS0-002 – Question140

During the security assessment of a new application, a tester attempts to log in to the application but receives the following message: incorrect password for given username. Which of the following can the tester recommend to decrease the likelihood that a malicious attacker will receive helpful information?

A.
Set the web page to redirect to an application support page when a bad password is entered.
B. Disable error messaging for authentication.
C. Recognize that error messaging does not provide confirmation of the correct element of authentication.
D. Avoid using password-based authentication for the application.

Correct Answer: C

CompTIA CySA+CS0-002 – Question139

A company's application development has been outsourced to a third-party development team. Based on the SLA, the development team must follow industry best practices for secure coding. Which of the following is the BEST way to verify this agreement?

A.
Input validation
B. Security regression testing
C. Application fuzzing
D. User acceptance testing
E. Stress testing

Correct Answer: D

CompTIA CySA+CS0-002 – Question138

After detecting possible malicious external scanning, an internal vulnerability scan was performed, and a critical server was found with an outdated version of JBoss. A legacy application that is running depends on that version of JBoss. Which of the following actions should be taken FIRST to prevent server compromise and business disruption at the same time?

A.
Make a backup of the server and update the JBoss server that is running on it.
B. Contact the vendor for the legacy application and request an updated version.
C. Create a proper DMZ for outdated components and segregate the JBoss server.
D. Apply virtualization over the server, using the new platform to provide the JBoss service for the legacy application as an external service.

Correct Answer: C

CompTIA CySA+CS0-002 – Question137

Which of the following BEST explains the function of trusted firmware updates as they relate to hardware assurance?

A.
Trusted firmware updates provide organizations with development, compilation, remote access, and customization for embedded devices.
B. Trusted firmware updates provide organizations with security specifications, open-source libraries, and custom tools for embedded devices.
C. Trusted firmware updates provide organizations with remote code execution, distribution, maintenance, and extended warranties for embedded devices.
D. Trusted firmware updates provide organizations with secure code signing, distribution, installation, and attestation for embedded devices.

Correct Answer: D

CompTIA CySA+CS0-002 – Question135

A cybersecurity analyst is implementing a new network configuration on an existing network access layer to prevent possible physical attacks. Which of the following BEST describes a solution that would apply and cause fewer issues during the deployment phase?

A.
Implement port security with one MAC address per network port of the switch.
B. Deploy network address protection with DHCP and dynamic VLANs
C. Configure 802.1X and EAPOL across the network.
D. Implement software-defined networking and security groups for isolation.

Correct Answer: A

CompTIA CySA+CS0-002 – Question133

An organization is developing software to match customers' expectations. Before the software goes into production, it must meet the following quality assurance guidelines:
Uncover all the software vulnerabilities.
Safeguard the interest of the software's end users.
Reduce the likelihood that a defective program will enter production.
Preserve the interests of the software producer.
Which of the following should be performed FIRST?

A.
Run source code against the latest OWASP vulnerabilities.
B. Document the life-cycle changes that took place.
C. Ensure verification and validation took place during each phase.
D. Store the source code in a software escrow.
E. Conduct a static analysis of the code.

Correct Answer: E

CompTIA CySA+CS0-002 – Question132

A team of security analysts has been alerted to potential malware activity. The initial examination indicates one of the affected workstations is beaconing on TCP port 80 to five IP addresses and attempting to spread across the network over port 445. Which of the following should be the team's NEXT step during the detection phase of this response process?

A.
Escalate the incident to management, who will then engage the network infrastructure team to keep them informed.
B. Depending on system criticality, remove each affected device from the network by disabling wired and wireless connections.
C. Engage the engineering team to block SMB traffic internally and outbound HTTP traffic to the five IP addresses.
D. Identify potentially affected systems by creating a correlation search in the SIEM based on the network traffic.

Correct Answer: C

CompTIA CySA+CS0-002 – Question131

A Chief Information Security Officer has asked for a list of hosts that have critical and high-severity findings as referenced in the CVE database. Which of the following tools would produce the assessment output needed to satisfy this request?

A.
Nessus
B. Nikto
C. Fuzzer
D. Wireshark
E. Prowler

Correct Answer: A