CompTIA CySA+ CS0-002 Practice
Questions with correct Answers (A+
GRADED 100% VERIFIED)
A Cloud Access Security Broker is a piece of software that does which of the
following?
A. Introduces new vulnerabilities
B. Prices cloud services
C. Sits between your Cloud and on-premises deployments
D. Reduces security complexity - ANSWER: C
A company has been sued by a client concerned about his personal information after
a breach. The company would like to coordinate this process using the right channel.
Which entity would the company appoint to correspond with the aggrieved client?
A. Legal
B. Human resources
C. Law enforcement
D. Public relations - ANSWER: A
A critical vulnerability is between which range on CVSS?
A. 4.0-7.0
B. 3.9-5.0
C. 0.0-10.0
D. 9.0-10.0 - ANSWER: D
A cybersecurity analyst receives a phone call from an unknown person with the
number blocked on the caller ID. After starting conversation, the caller begins to
request sensitive information. Which of the following techniques is being applied?
A. Social engineering
B. Phishing
C. Impersonation
D. War dialing - ANSWER: A
A Honeypot has which of the following features? (Choose three)
A. Excludes any sensitive data
B. An easy target
C. Isolated from secure systems
D. Automatically blocks known attack vectors - ANSWER: ABC
,A junior network analyst is monitoring network usage when he notices a huge usage
on outbound network traffic. The traffic usage indicates a recent spiked bandwidth
that has not been recorded. How would the analyst categorize this information?
A. Employees downloading torrents
B. Timed out connections
C. Potential indicator of compromise
D. Packet loss - ANSWER: C
A security analyst has been asked to review permissions on accounts within Active
Directory to determine if they are appropriate to the user's role. During this process,
the analyst notices that a user from building maintenance is part of the Domain
Admin group. Which of the following does this indicate?
A. Cross-site scripting
B. Session hijack
C. Privilege escalation
D. Rootkit - ANSWER: C
A security analyst wants to capture data flowing in and out of a network. Which of the
following would MOST likely assist in achieving this goal?
A. Taking a screenshot.
B. Analyzing network traffic and logs.
C. Analyzing big data metadata.
D. Capturing system image. - ANSWER: B
A unique feature of a hybrid cloud is the combination of a private and public cloud.
True or false? - ANSWER: T
A username and password authentication scheme is considered "Multi-Factor
Authentication" because the username and password represent the two different
factors. True or false? - ANSWER: F
According to the NIST framework, what are the four objectives of incident response?
(Choose four)
A. Preparation
B. Classification
C. Containment, eradication, and recovery
D. Detection and analysis
E. Post-incident activity - ANSWER: ACDE
Account credentials should be encrypted both in-transit and at-rest by default. True
or false? - ANSWER: T
After a security breach, it was discovered that the attacker had gained access to the
network by using a brute-force attack against a service account with a password that
, was set to not expire, even though the account had a long, complex password.
Which of the following could be used to prevent similar attacks from being successful
in the future?
A. Complex password policies
B. Account lockout
C. Self-service password reset portal
D. Scheduled vulnerability scans - ANSWER: B
An actor with little to no knowledge of the tools they use to carry out an attack is
known as which of the following?
A. White hat
B. Black hat
C. Attack vector
D. Script kiddie - ANSWER: D
An attacker collects information about a target from sources such as LinkedIn,
Twitter, and the target's website. This form of reconnaissance is known as which of
the following?
A. Active reconnaissance
B. Passive reconnaissance
C. Native reconnaissance
D. None of the above options - ANSWER: B
An eFuse bit can only be written to a single time. True or false? - ANSWER: T
An incident response process is a methodology providing guidance on handling of
cyber threats and breaches. True or false? - ANSWER: T
Challenges for assuring mobile software include which of the following? (Choose
three)
A. Device Aesthetics
B. Connectivity
C. Physical Size
D. Limited Resources
E. User Education - ANSWER: BCD
DevSecOps means integrating security assurance into the entire DevOps process
and pipeline. True or false? - ANSWER: T
Documentation for software assurance come in which forms?
A. Standard Operating Procedures and Information Assurance Plans
B. Regulatory Oversight
C. Stackoverflow Queries
D. Continuous Integration / Continuous Deployment - ANSWER: A
Questions with correct Answers (A+
GRADED 100% VERIFIED)
A Cloud Access Security Broker is a piece of software that does which of the
following?
A. Introduces new vulnerabilities
B. Prices cloud services
C. Sits between your Cloud and on-premises deployments
D. Reduces security complexity - ANSWER: C
A company has been sued by a client concerned about his personal information after
a breach. The company would like to coordinate this process using the right channel.
Which entity would the company appoint to correspond with the aggrieved client?
A. Legal
B. Human resources
C. Law enforcement
D. Public relations - ANSWER: A
A critical vulnerability is between which range on CVSS?
A. 4.0-7.0
B. 3.9-5.0
C. 0.0-10.0
D. 9.0-10.0 - ANSWER: D
A cybersecurity analyst receives a phone call from an unknown person with the
number blocked on the caller ID. After starting conversation, the caller begins to
request sensitive information. Which of the following techniques is being applied?
A. Social engineering
B. Phishing
C. Impersonation
D. War dialing - ANSWER: A
A Honeypot has which of the following features? (Choose three)
A. Excludes any sensitive data
B. An easy target
C. Isolated from secure systems
D. Automatically blocks known attack vectors - ANSWER: ABC
,A junior network analyst is monitoring network usage when he notices a huge usage
on outbound network traffic. The traffic usage indicates a recent spiked bandwidth
that has not been recorded. How would the analyst categorize this information?
A. Employees downloading torrents
B. Timed out connections
C. Potential indicator of compromise
D. Packet loss - ANSWER: C
A security analyst has been asked to review permissions on accounts within Active
Directory to determine if they are appropriate to the user's role. During this process,
the analyst notices that a user from building maintenance is part of the Domain
Admin group. Which of the following does this indicate?
A. Cross-site scripting
B. Session hijack
C. Privilege escalation
D. Rootkit - ANSWER: C
A security analyst wants to capture data flowing in and out of a network. Which of the
following would MOST likely assist in achieving this goal?
A. Taking a screenshot.
B. Analyzing network traffic and logs.
C. Analyzing big data metadata.
D. Capturing system image. - ANSWER: B
A unique feature of a hybrid cloud is the combination of a private and public cloud.
True or false? - ANSWER: T
A username and password authentication scheme is considered "Multi-Factor
Authentication" because the username and password represent the two different
factors. True or false? - ANSWER: F
According to the NIST framework, what are the four objectives of incident response?
(Choose four)
A. Preparation
B. Classification
C. Containment, eradication, and recovery
D. Detection and analysis
E. Post-incident activity - ANSWER: ACDE
Account credentials should be encrypted both in-transit and at-rest by default. True
or false? - ANSWER: T
After a security breach, it was discovered that the attacker had gained access to the
network by using a brute-force attack against a service account with a password that
, was set to not expire, even though the account had a long, complex password.
Which of the following could be used to prevent similar attacks from being successful
in the future?
A. Complex password policies
B. Account lockout
C. Self-service password reset portal
D. Scheduled vulnerability scans - ANSWER: B
An actor with little to no knowledge of the tools they use to carry out an attack is
known as which of the following?
A. White hat
B. Black hat
C. Attack vector
D. Script kiddie - ANSWER: D
An attacker collects information about a target from sources such as LinkedIn,
Twitter, and the target's website. This form of reconnaissance is known as which of
the following?
A. Active reconnaissance
B. Passive reconnaissance
C. Native reconnaissance
D. None of the above options - ANSWER: B
An eFuse bit can only be written to a single time. True or false? - ANSWER: T
An incident response process is a methodology providing guidance on handling of
cyber threats and breaches. True or false? - ANSWER: T
Challenges for assuring mobile software include which of the following? (Choose
three)
A. Device Aesthetics
B. Connectivity
C. Physical Size
D. Limited Resources
E. User Education - ANSWER: BCD
DevSecOps means integrating security assurance into the entire DevOps process
and pipeline. True or false? - ANSWER: T
Documentation for software assurance come in which forms?
A. Standard Operating Procedures and Information Assurance Plans
B. Regulatory Oversight
C. Stackoverflow Queries
D. Continuous Integration / Continuous Deployment - ANSWER: A