Pass the CompTIA 220-1002 exam, why choose Lead4Pass

why choose lead4pass

Passing the CompTIA 220-1001 exam is not a simple matter. So why choose Lead4Pass 220-1002 exam dumps? https://www.lead4pass.com/220-1002.html (PDF + VCE).

Because lead4Pass is a trusted and old store! Over the years we have served tens of thousands of users! They all passed the exam successfully! We have the best reputation!

Is the leader of the industry! To pass the CompTIA 220-1002 exam, you only need to choose the Lead4Pass 220-1002 exam dumps to ensure that you successfully pass the exam!

Lead4pass 220-1002 exam dumps contain two modes: PDF and VCE Software! You can choose at will according to your study habits! This site shares a part of CompTIA 220-1002 exam practice questions for free, you can practice the test online.

Share part of CompTIA 220-1002 exam PDF for free

The free CompTIA 220-1002 exam PDF is part of the Lead4Pass 220-1002 exam dumps. Download it for free at braindump4it.com.

CompTIA 220-1002 exam questions online practice test

QUESTION 1

A company needs a software package for a new branch office. Which of the following license should the business
purchase to allow correct licensing of the software?
A. Personal license for each employee
B. Commercial license for each concurrent user
C. Open-source license for each installation
D. Enterprise license for all corporate computers
Correct Answer: B

QUESTION 2

A user is unable to access certain files from a specific folder. Which of the following commands should a technician use
to modify the file permissions for a specific file?
A. chown
B. ls
C. grep
D. cp
Correct Answer: A
Reference: https://devblogs.microsoft.com/commandline/chmod-chown-wsl-improvements/

QUESTION 3

A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which
SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands
should the technician use?
A. apt-get
B. iwconfig
C. sudo
D. ifconfig
Correct Answer: B

QUESTION 4

A technician is called to troubleshoot a user\’s Windows workstation that fails to boot. The user reports that, after
updating the workstation\’s graphics driver to a beta version, the machine gives a “Stop” error on every boot Which of
the following should the technician complete to resolve the issue?
A. Boot the workstation in safe mode and disable the graphics driver system tray menu
B. Boot the workstation in safe mode with networking and install the latest stable graphics driver.
C. Boot the workstation in safe mode and disable Windows driver signing requirements
D. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings
Correct Answer: A

QUESTION 5

An administrator wants to deploy updates during the company\’s off-hours. Which of the following properties should the administrator implement to facilitate the deployment of the updates?
A. WaKe-on-LAN
B. Proxy settings
C. Remote Assistance
D. Quality of service
Correct Answer: A

QUESTION 6

A Windows user logs on to a network domain computer after recently being switched to a roaming profile. The user
reports extremely long startup times. Which of the following should a technician check to address this issue?
A. The amount of data on the user\’s desktop
B. The total quantity of RAM installed on the computer
C. The free space available on the network share
D. The size of the Windows swap file
Correct Answer: A

QUESTION 7

A technician is updating a Linux server that had been in storage. After booting into single-user mode, a command is
issued that displays the technician\’s current location in the filesystem. Which of the following commands was issued?
A. PWD
B. passed
C. apt-get
D. grep
Correct Answer: A

QUESTION 8

Which of the following NTFS security settings overrides all other settings?
A. Deny
B. Modify
C. Read
D. Write
Correct Answer: D

QUESTION 9

Which of the following provide the BEST security for a server room? (Select two.)
A. Badge reader
B. Bollard
C. Biometric lock
D. Cable lock
E. USB token
F. Privacy window shades
Correct Answer: AC

QUESTION 10

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly,
but the installation media does not detect any hard drives. Which of the following should the user do to help detect the
hard drives?
A. Press F8 when prompted
B. Hit the refresh button to force a re-detect
C. Enable PATA in the BIOS
D. Select load driver
Correct Answer: D
Reference: http://www.togaware.com/linux/survivor/Load_RAID.html

QUESTION 11

A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must
have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the
following solutions must the hardware be able to support? (Choose two.)
A. Image deployment
B. Multiboot
C. PXE
D. Unattended installation
E. USB
F. Wake-on-LAN
Correct Answer: CF

QUESTION 12

A user has installed a legacy application in Windows 7 and reports that only some of the functionality in it is operational.
Another user is using the same application on a different Windows 7 machine and doesn\’t report those problems.
Which of the following features in Windows 7 may be responsible for this problem?
A. System Protection settings
B. User Account Control
C. Action Center
D. Data Execution Prevention
Correct Answer: B
Reference: http://windows.microsoft.com/en-us/windows7/products/features/user-account-control

QUESTION 13

Joe. a user, is receiving automated replies but does not remember sending any emails to those recipients He checks
the sent items folder and sees email messages he did not send Which of the following would be the BEST way to
resolve this issue?
A. Reset Joe\’s email password
B. Set up a rule to delete the automated replies
C. Mark the automated replies as spam D. Rebuild Joe\’s profile
Correct Answer: A

QUESTION 14

A technician receives an end user\’s computer that displays erratic behavior upon startup. When the technician starts
the computer performance is reduced. A window appears on the screen stating a purchase must be made to disinfect
the computer. The technician quarantines the computer and disables System Restore. Which of the following should the
technician do NEXT?
A. Roll back the NIC driver
B. Update and install anti-malware software
C. Configure and enable the email spam filters
D. Verify the security certificate is valid
E. Perform a full system backup
Correct Answer: D

QUESTION 15

A technician performs a risk assessment and determines a requested change has low risk and low impact. Which of the
following best practices should the technician follow to proceed with implementing the change?
A. Update the ticket with the results of the risk assessment and implement the change
B. Reference the business policy and follow all change management procedures
C. Obtain approval from the department and implement the change
D. Provide a risk assessment to colleagues for peer review
Correct Answer: B

Summarize:

CompTIA 220-1002 exam questions and answers have been updated to ensure they are true and valid.
Free sharing of CompTIA 220-1002 exam practice questions can improve your exam success rate.
To pass the exam 100% smoothly, please click Lead4Pass 220-1002 dumps https://www.lead4pass.com/220-1002.html (total question: 732 Q&A). Lead4Pass contains complete exam questions and answers! All exam questions and answers are valid immediately.

ps.
The free CompTIA 220-1002 exam PDF is part of the Lead4Pass 220-1002 exam dumps. Download it for free at braindump4it.com.

CompTIA Cloud Essentials exam questions and answers updated

CompTIA Cloud Essentials+ exam updated

The latest CompTIA Cloud Essentials+ exam questions and answers have been updated to ensure that they are true and valid! CompTIA Cloud Essentials+ exam code “CLO-002”. Get the complete CompTIA CLO-002 exam dumps https://www.lead4pass.com/clo-002.html (Total Questions: 143 Q&A).
This site shares a part of CompTIA CLO-002 exam practice questions You can practice the test online.

CompTIA CLO-002 exam PDF download online

CompTIA CLO-002 exam PDF Share a free part of the dumps from the Lead4Pass CLO-002 exam.
Get the complete CompTIA CLO-002 exam questions and answers to help you pass the exam successfully

Share free CompTIA CLO-002 exam questions online practice test

QUESTION 1

Which of the following BEST explains why there should be an established communication policy between CSPs and
clients?

A. To set guidelines for securing network traffic for all communications with endpoints on the corporate local area
network
B. To ensure all staff knows the acceptable guidelines for representing themselves on social media.
C. To has protocols in place for notifying staff when a cloud outage occurs.
D. To have proper procedures in place for interactions between internal departments and cloud vendors submitting bids for software or service.
Correct Answer: C

QUESTION 2

Which of the following would be expected from a security consultant who has been hired to investigate a data breach of a private cloud instance?

A. Incident report
B. Application scan results
C. Request for information
D. Risk register
Correct Answer: A

QUESTION 3

A cloud administrator notices users call to report application performance degradation between 1:00 p.m. and 3:00 p.m. every day. Which of the following is the BEST option for the administrator to configure?

A. Locality
B. Block storage
C. Right-sizing
D. Auto-scaling
Correct Answer: D

QUESTION 4

A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a
geographic area. To ensure the software upgrade is properly tested, approved, and applied, which of
the following processes should the administrator follow?

A. Configuration management
B. Incident management
C. Resource management
D. Change management
Correct Answer: A

QUESTION 5

A cloud systems administrator needs to migrate several corporate applications to a public cloud provider and
decommission the internal hosting environment. This migration must be completed by the end of the month.

Because these applications are internally developed to meet specific business accounting needs, the administrator cannot use an alternative application.

Which of the following BEST describes the approach the administrator should use?

A. Hybrid deployment
B. Phased migration
C. Lift and shift
D. Rip and replace
Correct Answer: C

QUESTION 6

A systems administrator is reviewing a disaster recovery option that requires little to no downtime in the event of a
natural disaster. Which of the following BEST meets this requirement?

A. Configure availability zones.
B. Configure high availability.
C. Configure geo-redundancy.
D. Configure auto-scaling.
Correct Answer: A


QUESTION 7

A new company directive requires all departments to ensure intellectual property is kept within a country\’s borders.
Which of the following concepts BEST represents this requirement?

A. Data portability
B. Data security
C. Data locality
D. Data sovereignty
Correct Answer: D

QUESTION 8

A business analyst is using a public cloud provider\’s CRM service to manage contacts and organize all
communication. Which of the following cloud service models is the analyst using?

A. IaaS
B. SaaS
C. DBaaS
D. PaaS
Correct Answer: B

QUESTION 9

Which of the following is the BEST approach to optimize data security in an IaaS migration of data to the cloud?

A. Review of the risk register.
B. Perform a vulnerability scan
C. Perform server hardening.
D. Configure encryption in transit.
Correct Answer: A

QUESTION 10

A systems administrator must select a CSP while considering system uptime and access to critical servers. Which of the
following is the MOST important criterion when choosing the CSP?

A. Elasticity
B. Scalability
C. Availability
D. Serviceability
Correct Answer: C

QUESTION 11

In a DevOps environment, there is a requirement to start building application solutions in an efficient manner without any dependent components. Which of the following should a DevOps engineer do to meet these requirements?

A. Build the applications in QA and then enable resource tagging.
B. Build the applications in QA, and then clone and deploy them in production.
C. Use templates for building the applications.
D. Use templates and enable auto-scaling.
Correct Answer: D

QUESTION 12

A cloud administrator needs to enable users to access business applications remotely while ensuring these applications
are only installed on company-controlled equipment. All users require the ability to modify personal working
environments.

Which of the following is the BEST solution?

A. SSO
B. VDI
C. SSH
D. VPN
Correct Answer: D

QUESTION 13

A software developer wants to ensure a packaged application can be deployed in different environments without
modifying anything but the application settings. The developer creates an image and provides instructions for the
systems administrator to use for deployment.

This is an example of:

A. application versioning.
B. source code control.
C. containerization.
D. deployment automation.
Correct Answer: B

QUESTION 14

Which of the following is related to data availability in the cloud?
A. Resiliency
B. Deduplication
C. Scalability
D. Elasticity
Correct Answer: A

QUESTION 15

Which of the following security objectives is MOST improved when moving a system to the cloud?
A. Availability
B. Integrity
C. Privacy
D. Confidentiality
Correct Answer: A


CompTIA CLO-002 exam questions and answers are updated. All exam questions and answers have been updated and corrected. Lead4pass CLO-002 exam dumps https://www.lead4pass.com/clo-002.html (PDF + VCE). Guarantee 100 % Successfully passed the exam.

ps.
CompTIA CLO-002 exam PDF Share a free part of the dumps from the Lead4Pass CLO-002 exam.
Get the complete CompTIA CLO-002 exam questions and answers to help you pass the exam successfully

CompTIA Advanced Security Practitioner exam questions and answers updated

The latest CompTIA Advanced Security Practitioner exam questions and answers have been updated to ensure that they are true and valid! CompTIA Advanced Security Practitioner exam code “CAS-003”. Get the complete CompTIA CAS-003 exam dumps https://www.lead4pass.com/cas-003.html (Total Questions: 717 Q&A).
This site shares a part of CompTIA CAS-003 exam practice questions You can practice the test online.

CompTIA CAS-003 exam PDF download online

CompTIA CAS-003 exam PDF Share a free part of the dumps from the Lead4Pass CAS-003 exam.
Get the complete CompTIA CAS-003 exam questions and answers to help you pass the exam successfully

Share free CompTIA CAS-003 exam questions online practice test

QUESTION 1
A pentester must attempt to crack passwords on a windows domain that enforces strong complex passwords. Which of
the following would crack the MOST passwords in the shortest time period?
A. Online password testing
B. Rainbow tables attack
C. Dictionary attack
D. Brute force attack
Correct Answer: B
The passwords in a Windows (Active Directory) domain are encrypted.
When a password is “tried” against a system it is “hashed” using encryption so that the actual password is never sent in
clear text across the communications line. This prevents eavesdroppers from intercepting the password. The hash of a
password usually looks like a bunch of garbage and is typically a different length than the original password. Your
password might be “shitzu” but the hash of your password would look something like
“7378347eedbfdd761619451949225ec1”.
To verify a user, a system takes the hash value created by the password hashing function on the client computer and
compares it to the hash value stored in a table on the server. If the hashes match, then the user is authenticated and
granted access.
Password cracking programs work in a similar way to the login process. The cracking program starts by taking plaintext
passwords, running them through a hash algorithm, such as MD5, and then compares the hash output with the hashes
in the stolen password file. If it finds a match then the program has cracked the password.
Rainbow Tables are basically huge sets of precomputed tables filled with hash values that are pre-matched to possible
plaintext passwords. The Rainbow Tables essentially allow hackers to reverse the hashing function to determine what
the plaintext password might be.
The use of Rainbow Tables allow for passwords to be cracked in a very short amount of time compared with brute-force
methods, however, the trade-off is that it takes a lot of storage (sometimes Terabytes) to hold the Rainbow Tables
themselves.

QUESTION 2
Which of the following is the GREATEST security concern with respect to BYOD?
A. The filtering of sensitive data out of data flows at geographic boundaries.
B. Removing potential bottlenecks in data transmission paths.
C. The transfer of corporate data onto mobile corporate devices.
D. The migration of data into and out of the network in an uncontrolled manner.
Correct Answer: D

QUESTION 3
During an audit, it was determined from a sample that four out of 20 former employees were still accessing their email
accounts An information security analyst is reviewing the access to determine if the audit was valid Which of the
following would assist with the validation and provide the necessary documentation to audit?
A. Examining the termination notification process from human resources and employee account access logs
B. Checking social media platforms for disclosure of company sensitive and proprietary information
C. Sending a test email to the former employees to document an undeliverable email and review the ERP access
D. Reviewing the email global account list and the collaboration platform for recent activity
Correct Answer: A

QUESTION 4
A company is in the process of re-architecting its sensitive system infrastructure to take advantage of on-demand
computing through a public cloud provider The system to be migrated is sensitive with respect to latency availability, and
integrity The infrastructure team agreed to the following
1.
Application and middleware servers will migrate to the cloud”; Database servers will remain on-site
2.
Data backup wilt be stored in the cloud
Which of the following solutions would ensure system and security requirements are met?
A. Implement a direct connection from the company to the cloud provider
B. Use a cloud orchestration tool and implement appropriate change control processes
C. Implement a standby database on the cloud using a CASB for data-at-rest security
D. Use multizone geographic distribution with satellite relays
Correct Answer: A

QUESTION 5
Confidential information related to Application A. Application B and Project X appears to have been leaked to a
competitor. After consulting with the legal team, the IR team is advised to take immediate action to preserve evidence
for possible litigation and criminal charges.
While reviewing the rights and group ownership of the data involved in the breach, the IR team inspects the following
distribution group access lists:comptia cas-003 exam questions q5

Which of the following actions should the IR team take FIRST?
A. Remove all members from the distribution groups immediately
B. Place the mailbox for jsmith on legal hold
C. Implement a proxy server on the network to inspect all outbound SMTP traffic for the DevOps group
D. Install DLP software on all developer laptops to prevent data from leaving the network.
Correct Answer: A

QUESTION 6
An organization is deploying IoT locks, sensors, and cameras, which operate over 802.11, to replace legacy building
access control systems. These devices are capable of triggering physical access changes, including locking and
unlocking doors and gates. Unfortunately, the devices have known vulnerabilities for which the vendor has yet to
provide firmware updates.
Which of the following would BEST mitigate this risk?
A. Direct wire the IoT devices into physical switches and place them on an exclusive VLAN.
B. Require sensors to sign all transmitted unlock control messages digitally.
C. Associate the devices with an isolated wireless network configured for WPA2 and EAP-TLS.
D. Implement an out-of-band monitoring solution to detect message injections and attempts.
Correct Answer: C

QUESTION 7
Ann, a corporate executive, has been the recent target of increasing attempts to obtain corporate secrets by competitors
through advanced, well-funded means. Ann frequently leaves her laptop unattended and physically unsecure in hotel
rooms during travel. A security engineer must find a practical solution for Ann that minimizes the need for user training.
Which of the following is the BEST solution in this scenario?
A. Full disk encryption
B. Biometric authentication
C. An eFuse-based solution
D. Two-factor authentication
Correct Answer: A
Exam B

QUESTION 8
Which of the following represents important technical controls for securing a SAN storage infrastructure? (Select TWO).
A. Synchronous copy of data
B. RAID configuration
C. Data de-duplication
D. Storage pool space allocation
E. Port scanning
F. LUN masking/mapping
G. Port mapping
Correct Answer: FG
A logical unit number (LUN) is a unique identifier that designates individual hard disk devices or grouped devices for
address by a protocol associated with a SCSI, iSCSI, Fibre Channel (FC) or similar interface. LUNs are central to the
management of block storage arrays shared over a storage area network (SAN).
LUN masking subdivides access to a given port. Then, even if several LUNs are accessed through the same port, the
server masks can be set to limit each server\\’s access to the appropriate LUNs. LUN masking is typically conducted at
the host bus adapter (HBA) or switch level.
Port mapping is used in `Zoning\\’. In storage networking, Fibre Channel zoning is the partitioning of a Fibre Channel
fabric into smaller subsets to restrict interference, add security, and to simplify management. While a SAN makes
available several devices and/or ports to a single device, each system connected to the SAN should only be allowed
access to a controlled subset of these devices/ports.
Zoning can be applied to either the switch port a device is connected to OR the WWN World Wide Name on the host
being connected. As port based zoning restricts traffic flow based on the specific switch port a device is connected to, if
the device is moved, it will lose access. Furthermore, if a different device is connected to the port in question, it will gain
access to any resources the previous host had access to.

QUESTION 9
The Chief Executive Officer (CEO) of a small start-up company wants to set up offices around the country for the sales
staff to generate business. The company needs an effective communication solution to remain in constant contact with
each other, while maintaining a secure business environment. A junior-level administrator suggests that the company
and the sales staff stay connected via free social media. Which of the following decisions is BEST for the CEO to
make?
A. Social media is an effective solution because it is easily adaptable to new situations.
B. Social media is an ineffective solution because the policy may not align with the business.
C. Social media is an effective solution because it implements SSL encryption.
D. Social media is an ineffective solution because it is not primarily intended for business applications.
Correct Answer: B
Social media networks are designed to draw people\\’s attention quickly and to connect people is thus the main focus;
security is not the main concern. Thus the CEO should decide that it would be ineffective to use social media in the
company as it does not align with the company business.

QUESTION 10
A SaaS-based email service provider often receives reports from legitimate customers that their IP netblocks are on
blacklists and they cannot send email. The SaaS has confirmed that affected customers typically have IP addresses
within broader network ranges and some abusive customers within the same IP ranges may have performed spam
campaigns. Which of the following actions should the SaaS provider perform to minimize legitimate customer impact?
A. Inform the customer that the service provider does not have any control over third-party blacklist entries. The
customer should reach out to the blacklist operator directly
B. Perform a takedown of any customer accounts that have entries on email blacklists because this is a strong indicator
of hostile behavior
C. Work with the legal department and threaten legal action against the blacklist operator if the netblocks are not
removed because this is affecting legitimate traffic
D. Establish relationship with a blacklist operators so broad entries can be replaced with more granular entries and
incorrect entries can be quickly pruned
Correct Answer: D

QUESTION 11
A newly hired Chief Information Security Officer (CISO) is reviewing the organization\\’s security budget from the
previous year. The CISO notices $100,000 worth of fines were paid for not properly encrypting outbound email
messages. The CISO expects next year\\’s costs associated with fines to double and the volume of messages to
increase by 100%. The organization sent out approximately 25,000 messages per year over the last three years. Given
the table below:comptia cas-003 exam questions q11

Which of the following would be BEST for the CISO to include in this year\\’s budget?
A. A budget line for DLP Vendor A
B. A budget line for DLP Vendor B
C. A budget line for DLP Vendor C
D. A budget line for DLP Vendor D
E. A budget line for paying future fines
Correct Answer: E

QUESTION 12
An investigation showed a worm was introduced from an engineer\\’s laptop. It was determined the company does not
provide engineers with company-owned laptops, which would be subject to a company policy and technical controls.
Which of the following would be the MOST secure control implement?
A. Deploy HIDS on all engineer-provided laptops, and put a new router in the management network.
B. Implement role-based group policies on the management network for client access.
C. Utilize a jump box that is only allowed to connect to client from the management network.
D. Deploy a company-wide approved engineering workstation for management access.
Correct Answer: A

QUESTION 13
A company that has been breached multiple times is looking to protect cardholder data. The previous undetected
attacks all mimicked normal administrative-type behavior. The company must deploy a host solution to meet the
following requirements:
Detect administrative actions Block unwanted MD5 hashes Provide alerts Stop exfiltration of cardholder data
Which of the following solutions would BEST meet these requirements? (Choose two.)
A. AV
B. EDR
C. HIDS
D. DLP
E. HIPS
F. EFS
Correct Answer: BE

QUESTION 14
A security administrator is advocating for enforcement of a new policy that would require employers with privileged
access accounts to undergo periodic inspections and review of certain job performance data. To which of the following
policies is the security administrator MOST likely referring?
A. Background investigation
B. Mandatory vacation
C. Least privilege
D. Separation of duties
Correct Answer: C

QUESTION 15
A security auditor suspects two employees of having devised a scheme to steal money from the company. While one
employee submits purchase orders for personal items, the other employee approves these purchase orders. The auditor
has contacted the human resources director with suggestions on how to detect such illegal activities. Which of the
following should the human resource director implement to identify the employees involved in these activities and
reduce the risk of this activity occurring in the future?
A. Background checks
B. Job rotation
C. Least privilege
D. Employee termination procedures
Correct Answer: B
Job rotation can reduce fraud or misuse by preventing an individual from having too much control over an area.

CompTIA CAS-003 exam questions and answers are updated. All exam questions and answers have been updated and corrected.
Lead4pass CAS-003 exam dumps https://www.lead4pass.com/CAS-003.html (PDF + VCE). Guarantee 100 % Successfully passed the exam.

ps.
CompTIA CAS-003 exam PDF Share a free part of the dumps from the Lead4Pass CAS-003 exam.
Get the complete CompTIA CAS-003 exam questions and answers to help you pass the exam successfully

How to successfully pass the CompTIA CS0-002 exam

You can choose the online practice test on this site to successfully pass the exam. Studying here can improve your exam pass rate! Of course, you can also choose Lead4Pass CS0-002 dumps https://www.lead4pass.com/cs0-002.html (PDF + VCE). Lead4Pass contains complete exam questions and answers.
It has a 99.5% exam pass rate! Help you pass the exam easily.

Share the CompTIA CS0-002 exam PDF for free

The freely shared CompTIA CS0-002 exam PDF is only part of the Lead4Pass CS0-002 exam questions and answers.
The free exam PDF can help you understand the latest and updated CompTIA CS0-002 exam content. I recommend Lead4Pass to pass the CS0-002 exam.

CompTIA CS0-002 online practice test

QUESTION 1
An organization developed a comprehensive incident response policy. Executive management approved the policy and
its associated procedures. Which of the following activities would be MOST beneficial to evaluate personnel\\’s
familiarity with incident response procedures?
A. A simulated breach scenario involving the incident response team
B. Completion of annual information security awareness training by all employees
C. Tabletop activities involving business continuity team members
D. Completion of lessons-learned documentation by the computer security incident response team
E. External and internal penetration testing by a third party
Correct Answer: A

 

QUESTION 2
A company\\’s Chief Information Security Officer (CISO) is concerned about the integrity of some highly confidential
files. Any changes to these files must be tied back to a specific authorized user\\’s activity session. Which of the
following is the BEST technique to address the CISO\\’s concerns?
A. Configure DLP to reject all changes to the files without pre-authorization. Monitor the files for unauthorized changes.
B. Regularly use SHA-256 to hash the directory containing the sensitive information. Monitor the files for unauthorized
changes.
C. Place a legal hold on the files. Require authorized users to abide by a strict time context access policy.Monitor the
files for unauthorized changes.
D. Use Wireshark to scan all traffic to and from the directory. Monitor the files for unauthorized changes.
Correct Answer: A

 

QUESTION 3
A security analyst is building a malware analysis lab. The analyst wants to ensure malicious applications are not
capable of escaping the virtual machines and pivoting to other networks. To BEST mitigate this risk, the analyst should
use __________.
A. an 802.11ac wireless bridge to create an air gap.
B. a managed switch to segment the lab into a separate VLAN.
C. a firewall to isolate the lab network from all other networks.
D. an unmanaged switch to segment the environments from one another.
Correct Answer: C

 

QUESTION 4
A small organization has proprietary software that is used internally. The system has not been well maintained and
cannot be updated with the rest of the environment Which of the following is the BEST solution?
A. Virtualize the system and decommission the physical machine.
B. Remove it from the network and require air gapping.
C. Only allow access to the system via a jumpbox
D. Implement MFA on the specific system.
Correct Answer: A

 

QUESTION 5
The inability to do remote updates of certificates. keys software and firmware is a security issue commonly associated
with:
A. web servers on private networks.
B. HVAC control systems
C. smartphones
D. firewalls and UTM devices
Correct Answer: B

 

QUESTION 6
A cybersecurity analyst is currently checking a newly deployed server that has an access control list applied. When
conducting the scan, the analyst received the following code snippet of results:comptia cs0-002 exam questions q6

Which of the following describes the output of this scan?
A. The analyst has discovered a False Positive, and the status code is incorrect providing an OK message.
B. The analyst has discovered a True Positive, and the status code is correct providing a file not found error message.
C. The analyst has discovered a True Positive, and the status code is incorrect providing a forbidden message.
D. The analyst has discovered a False Positive, and the status code is incorrect providing a server error message.
Correct Answer: B

 

QUESTION 7
A company\\’s modem response team is handling a threat that was identified on the network Security analysts have as
at remote sites. Which of the following is the MOST appropriate next step in the incident response plan?
A. Quarantine the web server
B. Deploy virtual firewalls
C. Capture a forensic image of the memory and disk
D. Enable web server containerization
Correct Answer: B

 

QUESTION 8
Which of the following software assessment methods would be BEST for gathering data related to an application\\’s
availability during peak times?
A. Security regression testing
B. Stress testing
C. Static analysis testing
D. Dynamic analysis testing
E. User acceptance testing
Correct Answer: B

 

QUESTION 9
A malicious hacker wants to gather guest credentials on a hotel 802.11 network. Which of the following tools is the
malicious hacker going to use to gain access to information found on the hotel network?
A. Nikto
B. Aircrak-ng
C. Nessus
D. tcpdump
Correct Answer: A

 

QUESTION 10
A security analyst is reviewing the following web server log:
GET %2f..%2f..%2f.. %2f.. %2f.. %2f.. %2f../etc/passwd
Which of the following BEST describes the issue?
A. Directory traversal exploit
B. Cross-site scripting
C. SQL injection
D. Cross-site request forgery
Correct Answer: A

 

QUESTION 11
A company\\’s senior human resources administrator left for another position, and the assistant administrator was
promoted into the senior position. On the official start day, the new senior administrator planned to ask for extended
access permissions but noticed the permissions were automatically granted on that day. Which of the following
describes the access management policy in place at the company?
A. Mandatory-based
B. Host-based
C. Federated access
D. Role-based
Correct Answer: D

 

QUESTION 12
Which of the following should a database administrator implement to BEST protect data from an untrusted server
administrator?
A. Data deidentification
B. Data encryption
C. Data masking
D. Data minimization
Correct Answer: B

 

QUESTION 13
Employees of a large financial company are continuously being Infected by strands of malware that are not detected by
EDR tools. When of the following Is the BEST security control to implement to reduce corporate risk while allowing
employees to exchange files at client sites?
A. MFA on the workstations
B. Additional host firewall rules
C. VDI environment
D. Hard drive encryption
E. Network access control
F. Network segmentation
Correct Answer: B

 

QUESTION 14
A security analyst is reviewing vulnerability scan results and notices new workstations are being flagged as having
outdated antivirus signatures. The analyst observes the following plugin output:
Antivirus is installed on the remote host:
Installation path: C:\Program Files\AVProduct\Win32\
Product Engine: 14.12.101
Engine Version: 3.5.71
Scanner does not currently have information about AVProduct version 3.5.71. It may no longer be supported.
The engine version is out of date. The oldest supported version from the vendor is 4.2.11. The analyst uses the
vendor\\’s website to confirm the oldest supported version is correct.
Which of the following BEST describes the situation?
A. This is a false positive, and the scanning plugin needs to be updated by the vendor.
B. This is a true negative, and the new computers have the correct version of the software.
C. This is a true positive, and the new computers were imaged with an old version of the software.
D. This is a false negative, and the new computers need to be updated by the desktop team.
Correct Answer: C

 

QUESTION 15
A security administrator needs to create an IDS rule to alert on FTP login attempts by root. Which of the following rules
is the BEST solution?comptia cs0-002 exam questions q15

A. Option A
B. Option B
C. Option C
D. Option D
Correct Answer: B


The freely shared CompTIA CS0-002 exam questions and answers are the latest updates to help you understand the latest exam questions.
All questions and answers are carefully shared by us for free! To easily pass the exam,
please choose the complete CompTIA CS0-002 exam dumps https://www.lead4pass.com/cs0-002.html (Total Questions: 260 Q&A).
All questions and answers are up-to-date to ensure that you receive a notification of successful certification after the exam.

ps.

The freely shared CompTIA CS0-002 exam PDF is only part of the Lead4Pass CS0-002 exam questions and answers. The free exam PDF can help you understand the latest and updated CompTIA CS0-002 exam content.
I recommend Lead4Pass to pass the CS0-002 exam.