PassLeader released the NEWEST CompTIA CS0-001 exam dumps recently! Both CS0-001 VCE dumps and CS0-001 PDF dumps are available on PassLeader, either CS0-001 VCE dumps or CS0-001 PDF dumps have the NEWEST CS0-001 exam questions in it, they will help you passing CompTIA CS0-001 exam easily! You can download the valid CS0-001 dumps VCE and PDF from PassLeader here: https://www.passleader.com/cs0-001.html (252 Q&As Dumps –> 321 Q&As Dumps –> 373 Q&As Dumps –> 421 Q&As Dumps)
Also, previewing the NEWEST PassLeader CS0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpaXd6TXJ4T3ItSDQ (More SIMULATION questions, Drag and Drop questions, Hotspot questions)
NEW QUESTION 200
A security analyst begins to notice the CPU utilization from a sinkhole has begun to spike. Which of the following describes what may be occurring?
A.   Someone has logged on to the sinkhole and is using the device.
B.   The sinkhole has begun blocking suspect or malicious traffic.
C.   The sinkhole has begun rerouting unauthorized traffic.
D.   Something is controlling the sinkhole and causing CPU spikes due to malicious utilization.
Answer: C
NEW QUESTION 201
Alerts have been received from the SIEM, indicating infections on multiple computers. Base on threat characteristics, these files were quarantined by the host-based antivirus program. At the same time, additional alerts in the SIEM show multiple blocked URLs from the address of the infected computers; the URLs were classified as uncategorized. The domain location of the IP address of the URLs that were blocked is checked, and it is registered to an ISP in Russia. Which of the following steps should be taken NEXT?
A.   Remove those computers from the network and replace the hard drives.
Send the infected hard drives out for investigation.
B.   Run a full antivirus scan on all computers and use Splunk to search for any suspicious activity that happened just before the alerts were received in the SIEM.
C.   Run a vulnerability scan and patch discovered vulnerabilities on the next pathing cycle.
Have the users restart their computers.
Create a use case in the SIEM to monitor failed logins on the infected computers.
D.   Install a computer with the same settings as the infected computers in the DMZ to use as a honeypot.
Permit the URLs classified as uncategorized to and from that host.
Answer: B
NEW QUESTION 202
Which of the following has the GREATEST impact to the data retention policies of an organization?
A.   The CIA classification matrix assigned to each piece of data.
B.   The level of sensitivity of the data established by the data owner.
C.   The regulatory requirements concerning the data set.
D.   The technical constraints of the technology used to store the data.
Answer: D
NEW QUESTION 203
A company has decided to process credit card transactions directly. Which of the following would meet the requirements for scanning this type of data?
A.   Quarterly
B.   Yearly
C.   Bi-annually
D.   Monthly
Answer: A
NEW QUESTION 204
Which of the following counter measures should the security administrator apply to MOST effectively mitigate Bootkit-level infections of the organization’s workstation devices?
A.   Remove local administrator privileges.
B.   Configure a BIOS-level password on the device.
C.   Install a secondary virus protection application.
D.   Enforce a system state recovery after each device reboot.
Answer: A
NEW QUESTION 205
A new zero-day vulnerability was discovered within a basic screen capture app, which is used throughout the environment. Two days after discovering the vulnerability, the manufacturer of the software has not announced a remediation or if there will be a fix for this newly discovered vulnerability. The vulnerable application is not uniquely critical, but it is used occasionally by the management and executive management teams. The vulnerability allows remote code execution to gain privileged access to the system. Which of the following is the BEST course of actions to mitigate this threat?
A.   Work with the manufacturer to determine the time frame for the fix.
B.   Block the vulnerable application traffic at the firewall and disable the application services on each computer.
C.   Remove the application and replace it with a similar non-vulnerable application.
D.   Communicate with the end users that the application should not be used until the manufacturer has resolved the vulnerability.
Answer: D
NEW QUESTION 206
Which of the following tools should a cybersecurity analyst use to verify the integrity of a forensic image before and after an investigation?
A.   strings
B.   sha1sum
C.   file
D.   dd
E.   gzip
Answer: B
NEW QUESTION 207
A centralized tool for organizing security events and managing their response and resolution is known as what?
A.   SIEM
B.   HIPS
C.   Syslog
D.   Wireshark
Answer: A
NEW QUESTION 208
After a recent security breach, it was discovered that a developer had promoted code that had been written to the production environment as a hotfix to resolve a user navigation issue that was causing issues for several customers. The code had inadvertently granted administrative privileges to all users, allowing inappropriate access to sensitive data and reports. Which of the following could have prevented this code from being released into the production environment?
A.   Cross training
B.   Succession planning
C.   Automate reporting
D.   Separation of duties
Answer: D
NEW QUESTION 209
A security analyst is assisting with a computer crime investigation and has been asked to secure a PC and deliver it to the forensic lab. Which of the following items would be MOST helpful to secure the PC? (Choose three.)
A.   Tamper-proof seals
B.   Faraday cage
C.   Chain of custody form
D.   Drive eraser
E.   Write blockers
F.   Network tap
G.   Multimeter
Answer: ABC
NEW QUESTION 210
A nuclear facility manager determined the need to monitor utilization of water within the facility. A startup company just announced a state-of-the-art solution to address the need for integrating the business and ICS network. The solution requires a very small agent to be installed on the ICS equipment. Which of the following is the MOST important security control for the manager to invest in to protect the facility?
A.   Run a penetration test on the installed agent.
B.   Require that the solution provider make the agent source code available for analysis.
C.   Require through guides for administrator and users.
D.   Install the agent for a week on a test system and monitor the activities.
Answer: D
NEW QUESTION 211
A company has implemented WPA2, a 20-character minimum for the WiFi passphrase, and a new WiFi passphrase every 30 days, and has disabled SSID broadcast on all wireless access points. Which of the following is the company trying to mitigate?
A.   Downgrade attacks
B.   Rainbow tables
C.   SSL pinning
D.   Forced deauthentication
Answer: A
NEW QUESTION 212
A staff member reported that a laptop has degraded performance. The security analyst has investigated the issue and discovered that CPU utilization, memory utilization, and outbound network traffic are consuming the laptop resources. Which of the following is the BEST course of actions to resolve the problem?
A.   Identify and remove malicious processes.
B.   Disable scheduled tasks.
C.   Suspend virus scan.
D.   Increase laptop memory.
E.   Ensure the laptop OS is properly patched.
Answer: A
NEW QUESTION 213
A security analyst has discovered that an outbound SFTP process is occurring at the same time of day for the past several days. At the time this was discovered, large amounts of business critical data were delivered. The authentication for this process occurred using a service account with proper credentials. The security analyst investigated the destination IP for this transfer and discovered that this new process is not documented in the change management log. Which of the following would be the BEST course of action for the analyst to take?
A.   Investigate a potential incident.
B.   Verify user permissions.
C.   Run a vulnerability scan.
D.   Verify SLA with cloud provider.
Answer: A
NEW QUESTION 214
During an investigation, a computer is being seized. Which of the following is the FIRST step the analyst should take?
A.   Power off the computer and remove it from the network.
B.   Unplug the network cable and take screenshots of the desktop.
C.   Perform a physical hard disk image.
D.   Initiate chain-of-custody documentation.
Answer: A
NEW QUESTION 215
An organization has recently experienced a data breach. A forensic analysis confirmed the attacker found a legacy web server that had not been used in over a year and was not regularly patched. After a discussion with the security team, management decided to initiate a program of network reconnaissance and penetration testing. They want to start the process by scanning the network for active hosts and open ports. Which of the following tools is BEST suited for this job?
A.   Ping
B.   Nmap
C.   Netstat
D.   ifconfig
E.   Wireshark
F.   L0phtCrack
Answer: B
NEW QUESTION 216
A medical organization recently started accepting payments over the phone. The manager is concerned about the impact of the storage of different types of data. Which of the following types of data incurs the highest regulatory constraints?
A.   PHI
B.   PCI
C.   PII
D.   IP
Answer: B
NEW QUESTION 217
An organization wants to remediate vulnerabilities associated with its web servers. An initial vulnerability scan has been performed, and analysts are reviewing the results. Before starting any remediation, the analysts want to remove false positives to avoid spending time on issues that are not actual vulnerabilities. Which of the following would be an indicator of a likely false positive?
A.   Reports indicate that findings are informational.
B.   Any items labeled `low’ are considered informational only.
C.   The scan result version is different from the automated asset inventory.
D.   `HTTPS’ entries indicate the web page is encrypted securely.
Answer: B
NEW QUESTION 218
An insurance company employs quick-response team drivers that carry corporate-issued mobile devices with the insurance company’s app installed on them. Devices are configuration-hardened by an MDM and kept up to date. The employees use the app to collect insurance claim information and process payments. Recently, a number of customers have filed complaints of credit card fraud against the insurance company, which occurred shortly after their payments were processed via the mobile app. The cyber-incident response team has been asked to investigate. Which of the following is MOST likely the cause?
A.   The MDM server is misconfigured.
B.   The app does not employ TLS.
C.   USB tethering is enabled.
D.   3G and less secure cellular technologies are not restricted.
Answer: B
NEW QUESTION 219
A cybersecurity consultant found common vulnerabilities across the following services used by multiple servers at an organization: VPN, SSH, and HTTPS. Which of the following is the MOST likely reason for the discovered vulnerabilities?
A.   Leaked PKI private key
B.   Vulnerable version of OpenSSL
C.   Common initialization vector
D.   Weak level of encryption entropy
E.   Vulnerable implementation of PEAP
Answer: D
NEW QUESTION 220
A recent audit included a vulnerability scan that found critical patches released 60 days prior were not applied to servers in the environment. The infrastructure team was able to isolate the issue and determined it was due to a service being disabled on the server running the automated patch management application. Which of the following would be the MOST efficient way to avoid similar audit findings in the future?
A.   Implement a manual patch management application package to regain greater control over the process.
B.   Create a patch management policy that requires all servers to be patched within 30 days of patch release.
C.   Implement service monitoring to validate that tools are functioning properly.
D.   Set services on the patch management server to automatically run on start-up.
Answer: D
NEW QUESTION 221
Which of the following could be directly impacted by an unpatched vulnerability in vSphere ESXi?
A.   The organization’s physical routers.
B.   The organization’s mobile devices.
C.   The organization’s virtual infrastructure.
D.   The organization’s VPN.
Answer: C
NEW QUESTION 222
A security analyst performed a review of an organization’s software development life cycle. The analyst reports that the life cycle does not contain in a phase in which team members evaluate and provide critical feedback on another developer’s code. Which of the following assessment techniques is BEST for describing the analyst’s report?
A.   Architectural evaluation
B.   Waterfall
C.   Whitebox testing
D.   Peer review
Answer: D
NEW QUESTION 223
A security analyst is creating ACLs on a perimeter firewall that will deny inbound packets that are from internal addresses, reversed external addresses, and multicast addresses. Which of the following is the analyst attempting to prevent?
A.   Broadcast storms
B.   Spoofing attacks
C.   DDoS attacks
D.   Man-in-the-middle attacks
Answer: B
NEW QUESTION 224
A server contains baseline images that are deployed to sensitive workstations on a regular basis. The images are evaluated once per month for patching and other fixes, but do not change otherwise. Which of the following controls should be put in place to secure the file server and ensure the images are not changed?
A.   Install and configure a file integrity monitoring tool on the server and allow updates to the images each month.
B.   Schedule vulnerability scans of the server at least once per month before the images are updated.
C.   Require the use of two-factor authentication for any administrator or user who needs to connect to the server.
D.   Install a honeypot to identify any attacks before the baseline images can be compromised.
Answer: A
NEW QUESTION 225
A security analyst notices PII has been copied from the customer database to an anonymous FTP server in the DMZ. Firewall logs indicate the customer database has not been accessed from anonymous FTP server. Which of the following departments should make a decision about pursuing further investigation? (Choose two.)
A.   Human resources
B.   Public relations
C.   Legal
D.   Executive management
E.   IT management
Answer: D
NEW QUESTION 226
A security analyst received several service tickets reporting that a company storefront website is not accessible by internal domain users. However, external users are accessing the website without issue. Which of the following is the MOST likely reason for this behavior?
A.   The FQDN is incorrect.
B.   The DNS server is corrupted.
C.   The time synchronization server is corrupted.
D.   The certificate is expired.
Answer: B
NEW QUESTION 227
Which of the following utilities could be used to resolve an IP address to a domain name, assuming the address has a PTR record?
A.   ifconfig
B.   ping
C.   arp
D.   nbtstat
Answer: B
NEW QUESTION 228
……
Welcome to choose PassLeader CS0-001 dumps for 100% passing CompTIA CS0-001 exam: https://www.passleader.com/cs0-001.html (252 Q&As VCE Dumps and PDF Dumps –> 321 Q&As VCE Dumps and PDF Dumps –> 373 Q&As VCE Dumps and PDF Dumps –> 421 Q&As VCE Dumps and PDF Dumps)
Also, previewing the NEWEST PassLeader CS0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpaXd6TXJ4T3ItSDQ (More SIMULATION questions, Drag and Drop questions, Hotspot questions)