Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CS0-001 CompTIA Exam Lab Questions

Page: 10 / 16
Question 40

A technician receives an alert indicating an endpoint is beaconing to a suspect dynamic DNS domain. Which of the following countermeasures should be used to BEST protect the network in response to this alert? (Choose two.)

Options:

A.

Set up a sinkhole for that dynamic DNS domain to prevent communication.

B.

Isolate the infected endpoint to prevent the potential spread of malicious activity.

C.

Implement an internal honeypot to catch the malicious traffic and trace it.

D.

Perform a risk assessment and implement compensating controls.

E.

Ensure the IDS is active on the network segment where the endpoint resides.

Question 41

A security incident has been created after noticing unusual behavior from a Windows domain controller. The server administrator has discovered that a user logged in to the server with elevated permissions, but the user’s account does not follow the standard corporate naming scheme. There are also several other accounts in the administrators group that do not follow this naming scheme. Which of the following is the possible cause for this behavior and the BEST remediation step?

Options:

A.

The Windows Active Directory domain controller has not completed synchronization, and should force the domain controller to sync.

B.

The server has been compromised and should be removed from the network and cleaned before reintroducing it to the network.

C.

The server administrator created user accounts cloning the wrong user ID, and the accounts should be removed from administrators and placed in an employee group.

D.

The naming scheme allows for too many variations, and the account naming convention should be updates to enforce organizational policies.

Question 42

An organization has two environments: development and production. Development is where applications are developed with unit testing. The development environment has many configuration differences from the production environment. All applications are hosted on virtual machines. Vulnerability scans are performed against all systems before and after any application or configuration changes to any environment. Lately, vulnerability remediation activity has caused production applications to crash and behave unpredictably. Which of the following changes should be made to the current vulnerability management process?

Options:

A.

Create a third environment between development and production that mirrors production and tests all changes before deployment to the users

B.

Refine testing in the development environment to include fuzzing and user acceptance testing so applications are more stable before they migrate to production

C.

Create a second production environment by cloning the virtual machines, and if any stability problems occur, migrate users to the alternate production environment

D.

Refine testing in the production environment to include more exhaustive application stability testing while continuing to maintain the robust vulnerability remediation activities

Question 43

A security analyst has just completed a vulnerability scan of servers that support a business critical application that is managed by an outside vendor. The results of the scan indicate the devices are missing critical patches. Which of the following factors can inhibit remediation of these vulnerabilities? (Choose two.)

Options:

A.

Inappropriate data classifications

B.

SLAs with the supporting vendor

C.

Business process interruption

D.

Required sandbox testing

E.

Incomplete asset inventory

Page: 10 / 16
Exam Code: CS0-001
Exam Name: CompTIA CSA+ Certification Exam
Last Update: Apr 14, 2023
Questions: 455
CS0-001 pdf

CS0-001 PDF

$28  $80
CS0-001 Engine

CS0-001 Testing Engine

$33.25  $95
CS0-001 PDF + Engine

CS0-001 PDF + Testing Engine

$45.5  $130