Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Changed CS0-001 Exam Questions

Page: 7 / 16
Question 28

Following the development of a company's new online application, a security analyst Is brought In to test the site's security before going live. The analyst Is given the following URL and credentials:

htt ps://app.com pany.com/Guest User ID: UserBob Password: S#7h&sh*g

After logging In, the URL changes to the following, and the system displays a screen with graphs of various data points:

https;//opp.company.corn/User/dashboard.php?view=grophs

Which of the following Is the BEST choice for a reasonable test of circumventing the site's security?

Options:

A.

Try different combinations of credentials and passwords.

B.

Use the browser's 'View Source" feature to see the underlying HTML.

C.

Browse explicitly to the URL https://app.company.com/Admln.

D.

Alter the URL parameters to dashboard.php?view=charts.

Question 29

Joe, a user, is unable to launch an application on his laptop, which he typically uses on a daily basis. Joe informs a security analyst of the issue. After an online database comparison, the security analyst checks the SIEM and notices alerts indicating certain .txt and .dll files are blocked. Which of the following tools would generate these logs?

Options:

A.

Antivirus

B.

HIPS

C.

Firewall

D.

Proxy

Question 30

The help desk informed a security analyst of a trend that is beginning to develop regarding a suspicious email that has been reported by multiple users. The analyst has determined the email includes an attachment named invoice.zip that contains the following files:

Locky.js

xerty.ini

xerty.lib

Further analysis indicates that when the .zip file is opened, it is installing a new version of ransomware on the devices. Which of the following should be done FIRST to prevent data on the company NAS from being encrypted by infected devices?

Options:

A.

Disable access to the company VPN.

B.

Move the files from the NAS to a cloud-based storage solution.

C.

Set permissions on file shares to read-only.

D.

Add the URL included in the .js file to the company’s web proxy filter.

Question 31

A security analyst is performing ongoing scanning and continuous monitoring of the corporate datacenter. Over time, these scans are repeatedly showing susceptibility to the same vulnerabilities and an increase in new vulnerabilities on a specific group of servers that are clustered to run the same application. Which of the following vulnerability management processes should be implemented?

Options:

A.

Frequent server scanning

B.

Automated report generation

C.

Group policy modification

D.

Regular patch application

Page: 7 / 16
Exam Code: CS0-001
Exam Name: CompTIA CSA+ Certification Exam
Last Update: Apr 14, 2023
Questions: 455
CS0-001 pdf

CS0-001 PDF

$28  $80
CS0-001 Engine

CS0-001 Testing Engine

$33.25  $95
CS0-001 PDF + Engine

CS0-001 PDF + Testing Engine

$45.5  $130