Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

PDF CS0-001 Study Guide

Page: 16 / 16
Question 64

A security analyst is reviewing the following log after enabling key-based authentication.

Given the above information, which of the following steps should be performed NEXT to secure the system?

Options:

A.

Disable anonymous SSH logins.

B.

Disable password authentication for SSH.

C.

Disable SSHv1.

D.

Disable remote root SSH logins.

Question 65

You suspect that multiple unrelated security events have occurred on several nodes on a corporate network. You must review all logs and correlate events when necessary to discover each security event by clicking on each node. Only select corrective actions if the logs shown a security event that needs remediation. Drag and drop the appropriate corrective actions to mitigate the specific security event occurring on each affected device.

Instructions:

The Web Server, Database Server, IDS, Development PC, Accounting PC and Marketing PC are clickable. Some actions may not be required and each actions can only be used once per node. The corrective action order is not important. If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

Options:

Question 66

A cybersecurity analyst has received a report that multiple systems are experiencing slowness as a result of a DDoS attack. Which of the following would be the BEST action for the cybersecurity analyst to perform?

Options:

A.

Continue monitoring critical systems.

B.

Shut down all server interfaces.

C.

Inform management of the incident.

D.

Inform users regarding the affected systems.

Question 67

A technician receives a report that a user’s workstation is experiencing no network connectivity. The technician investigates and notices the patch cable running the back of the user’s VoIP phone is routed directly under the rolling chair and has been smashed flat over time.

Which of the following is the most likely cause of this issue?

Options:

A.

Cross-talk

B.

Electromagnetic interference

C.

Excessive collisions

D.

Split pairs

Page: 16 / 16
Exam Code: CS0-001
Exam Name: CompTIA CSA+ Certification Exam
Last Update: Apr 14, 2023
Questions: 455
CS0-001 pdf

CS0-001 PDF

$28  $80
CS0-001 Engine

CS0-001 Testing Engine

$33.25  $95
CS0-001 PDF + Engine

CS0-001 PDF + Testing Engine

$45.5  $130