[Free] 2019(Oct) EnsurePass CompTIA CS0-001 Dumps with VCE and PDF 11-20

Get Full Version of the Exam

Question No.11

File integrity monitoring states the following files have been changed without a written request or approved change. The following change has been made:

chmod 777 -Rv /usr

Which of the following may be occurring?

  1. The ownership pf /usr has been changed to the current user.

  2. Administrative functions have been locked from users.

  3. Administrative commands have been made world readable/writable.

  4. The ownership of/usr has been changed to the root user.

Correct Answer: C

Question No.12

As part of the SDLC, software developers are testing the security of a new web application by inputting large amounts of random data. Which of the following types of testing is being performed?

  1. Fuzzing

  2. Regression testing

  3. Stress testing

  4. Input validation

Correct Answer: A

Question No.13

A security analyst is creating baseline system images to remediate vulnerabilities found in different operating systems. Each image needs to be scanned before it is deployed. The security analyst must ensure the configurations match industry standard benchmarks and the process can be repeated frequently. Which of the following vulnerability options would BEST create the process requirements?

  1. Utilizing an operating system SCAP plugin

  2. Utilizing an authorized credential scan

  3. Utilizing a non-credential scan

  4. Utilizing a known malware plugin

Correct Answer: A

Question No.14

While a threat intelligence analyst was researching an indicator of compromise on a search engine, the web proxy generated an alert regarding the same indicator. The threat intelligence analyst states that related sites were not visited but were searched for in a search engine. Which of the following MOST likely happened in this situation?

  1. The analyst is not using the standard approved browser.

  2. The analyst accidently clicked a link related to the indicator.

  3. The analyst has prefetch enabled on the browser in use.

  4. The alert in unrelated to the analyst#39;s search.

Correct Answer: C

Question No.15

A cybersecurity analyst is completing an organization#39;s vulnerability report and wants it to reflect assets accurately. Which of the following items should be in the report?

  1. Processor utilization

  2. Virtual hosts

  3. Organizational governance

  4. Log disposition

  5. Asset isolation

Correct Answer: B

Question No.16

A security analyst is adding input to the incident response communication plan. A company officer has suggested that if a data breach occurs, only affected parties should be notified to keep an incident from becoming a media headline. Which of the following should the analyst recommend to the company officer?

  1. The first responder should contact law enforcement upon confirmation of a security incident in order for a forensics team to preserve chain of custody.

  2. Guidance from laws and regulations should be considered when deciding who must be notified in order to avoid fines and judgements from non-compliance.

  3. An externally hosted website should be prepared in advance to ensure that when an incident occurs victims have timely access to notifications from a non-compromised recourse.

  4. The HR department should have information security personnel who are involved in the investigation of the incident sign non-disclosure agreements so the company cannot be held liable for customer data that might be viewed during an investigation.

Correct Answer: A

Question No.17

An alert has been distributed throughout the information security community regarding a critical Apache vulnerability. Which of the following courses of action would ONLY identify the known vulnerability?

  1. Perform an unauthenticated vulnerability scan on all servers in the environment.

  2. Perform a scan for the specific vulnerability on all web servers.

  3. Perform a web vulnerability scan on all servers in the environment.

  4. Perform an authenticated scan on all web servers in the environment.

Correct Answer: B

Question No.18

After completing a vulnerability scan, the following output was noted:


Which of the following vulnerabilities has been identified?

  1. PKI transfer vulnerability.

  2. Active Directory encryption vulnerability.

  3. Web application cryptography vulnerability.

  4. VPN tunnel vulnerability.

Correct Answer: C

Question No.19

An organization uses Common Vulnerability Scoring System (CVSS) scores to prioritize remediation of vulnerabilities. Management wants to modify the priorities based on a difficulty factor so that vulnerabilities with lower CVSS scores may get a higher priority if they are easier to implement with less risk to system functionality. Management also wants to quantify the priority. Which of the following would achieve management#39;s objective?

  1. (CVSS Score) * Difficulty = PriorityWhere Difficulty is a range from 0.1 to 1.0 with 1.0 being easiest and lowest risk to implement

  2. (CVSS Score) * Difficulty = PriorityWhere Difficulty is a range from 1 to 5 with 1 being easiest and lowest risk to implement

  3. (CVSS Score) / Difficulty = PriorityWhere Difficulty is a range from 1 to 10 with 10 being easiest and lowest risk to implement

  4. ((CVSS Score) * 2) / Difficulty = PriorityWhere CVSS Score is weighted and Difficulty is a range from 1 to 5 with 5 being easiest and lowest risk to implement

Correct Answer: C

Question No.20

After reviewing the following packet, a cybersecurity analyst has discovered an unauthorized service is running on a company#39;s computer.


Which of the following ACLs, if implemented, will prevent further access ONLY to the unauthorized service and will not impact other services?



C. DENY IP HOST192.168.1.10 HOST EQ 3389


Correct Answer: A

Get Full Version of the Exam
CS0-001 Dumps
CS0-001 VCE and PDF