[Free] 2018(Jan) EnsurePass Dumpsleader CompTIA CS0-001 Dumps with VCE and PDF 41-50

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan CompTIA Official New Released CS0-001
100% Free Download! 100% Pass Guaranteed!

CompTIA CSA Certification Exam

Question No: 41

A company wants to update its acceptable use policy (AUP) to ensure it relates to the

newly implemented password standard, which requires sponsored authentication of guest wireless devices. Which of the following is MOST likely to be incorporated in the AUP?

  1. Sponsored guest passwords must be at least ten characters in length and contain a symbol.

  2. The corporate network should have a wireless infrastructure that uses open authentication standards.

  3. Guests using the wireless network should provide valid identification when registering their wireless devices.

  4. The network should authenticate all guest users using 802.1x backed by a RADIUS or LDAP server.

Answer: C

Question No: 42

A vulnerability scan has returned the following information:

Ensurepass 2018 PDF and VCE

Which of the following describes the meaning of these results?

  1. There is an unknown bug in a Lotus server with no Bugtraq ID.

  2. Connecting to the host using a null session allows enumeration of share names.

  3. Trend Micro has a known exploit that must be resolved or patched.

  4. No CVE is present, so it is a false positive caused by Lotus running on a Windows server.

Answer: B

Question No: 43

An HR employee began having issues with a device becoming unresponsive after attempting to open an email attachment. When informed, the security analyst became suspicious of the situation, even though there was not any unusual behavior on the IDS or any alerts from the antivirus software. Which of the following BEST describes the type of threat in this situation?

  1. Packet of death

  2. Zero-day malware

  3. PII exfiltration

  4. Known virus

Answer: B

Question No: 44

Company A permits visiting business partners from Company B to utilize Ethernet ports available in Company A’s conference rooms. This access is provided to allow partners the ability to establish VPNs back to Company B’s network. The security architect for Company A wants to ensure partners from Company B are able to gain direct Internet access from available ports only, while Company A employees can gain access to the Company A internal network from those same ports. Which of the following can be employed to allow this?

  1. ACL

  2. SIEM

  3. MAC

  4. NAC

  5. SAML

Answer: A

Question No: 45

A system administrator who was using an account with elevated privileges deleted a large amount of log files generated by a virtual hypervisor in order to free up disk space. These log files are needed by the security team to analyze the health of the virtual machines.

Which of the following compensating controls would help prevent this from reoccurring? (Select two.)

  1. Succession planning

  2. Separation of duties

  3. Mandatory vacation

  4. Personnel training

  5. Job rotation

Answer: B

Question No: 46

A threat intelligence feed has posted an alert stating there is a critical vulnerability in the kernel. Unfortunately, the company’s asset inventory is not current. Which of the following techniques would a cybersecurity analyst perform to find all affected servers within an organization?

  1. A manual log review from data sent to syslog

  2. An OS fingerprinting scan across all hosts

  3. A packet capture of data traversing the server network

  4. A service discovery scan on the network

Answer: B

Question No: 47

An analyst wants to use a command line tool to identify open ports and running services on a host along with the application that is associated with those services and port. Which of the following should the analyst use?

  1. Wireshark

  2. Qualys

  3. netstat

  4. nmap

  5. ping

Answer: C

Question No: 48

A cybersecurity analyst traced the source of an attack to compromised user credentials. Log analysis revealed that the attacker successfully authenticated from an unauthorized foreign country. Management asked the security analyst to research and implement a solution to help mitigate attacks based on compromised passwords. Which of the following should the analyst implement?

  1. Self-service password reset

  2. Single sign-on

  3. Context-based authentication

  4. Password complexity

Answer: C

Question No: 49

After scanning the main company’s website with the OWASP ZAP tool, a cybersecurity analyst is reviewing the following warning:

Ensurepass 2018 PDF and VCE

The analyst reviews a snippet of the offending code:

Ensurepass 2018 PDF and VCE

Which of the following is the BEST course of action based on the above warning and code snippet?

  1. The analyst should implement a scanner exception for the false positive.

  2. The system administrator should disable SSL and implement TLS.

  3. The developer should review the code and implement a code fix.

  4. The organization should update the browser GPO to resolve the issue.

Answer: D

Question No: 50

As part of an upcoming engagement for a client, an analyst is configuring a penetration testing application to ensure the scan complies with information defined in the SOW. Which of the following types of information should be considered based on information traditionally found in the SOW? (Select two.)

  1. Timing of the scan

  2. Contents of the executive summary report

  3. Excluded hosts

  4. Maintenance windows

  5. IPS configuration

  6. Incident response policies

Answer: A,C

100% Ensurepass Free Download!
Download Free Demo:CS0-001 Demo PDF
100% Ensurepass Free Guaranteed!
CS0-001 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.