CS0-002 Dumps

CS0-002 Free Practice Test

CompTIA CS0-002: CompTIA Cybersecurity Analyst (CySA+) Certification Exam

QUESTION 156

A security analyst is reviewing a web application. If an unauthenticated user tries to access a page in the application, the user is redirected to the login page. After successful authentication, the user is then redirected back to the original page. Some users have reported receiving phishing emails with a link that takes them to the application login page but then redirects to a fake login page after successful authentication.
Which of the following will remediate this software vulnerability?

Correct Answer: D

QUESTION 157

A security administrator needs to create an IDS rule to alert on FTP login attempts by root. Which of the following rules is the BEST solution?
CS0-002 dumps exhibit

Correct Answer: B

QUESTION 158

A system’s authority to operate (ATO) is set to expire in four days. Because of other activities and limited staffing, the organization has neglected to start reauthentication activities until now. The cybersecurity group just performed a vulnerability scan with the partial set of results shown below:
CS0-002 dumps exhibit
Based on the scenario and the output from the vulnerability scan, which of the following should the security team do with this finding?

Correct Answer: A

QUESTION 159

A cybersecurity analyst is supporting an incident response effort via threat intelligence. Which of the following is the analyst MOST likely executing?

Correct Answer: A

QUESTION 160

A large software company wants to move «s source control and deployment pipelines into a cloud-computing environment. Due to the nature of the business management determines the recovery time objective needs to be within one hour. Which of the following strategies would put the company in the BEST position to achieve the desired recovery time?

Correct Answer: A