Sunday, 22 July 2018

CompTIA CS0-001 Question Answer

A reverse engineer was analyzing malware found on a retailer’s network and found code extracting track data in memory. Which of the following threats did the engineer MOST likely uncover?

A. POS malware
B. Rootkit
C. Key logger
D. Ransomware

Answer: A


Due to new regulations, a company has decided to institute an organizational vulnerability management program and assign the function to the security team. Which of the following frameworks would BEST support the program? (Select two.)


A. COBIT
B. NIST
C. ISO 27000 series
D. ITIL
E. OWASP

Answer: DE

Wednesday, 28 February 2018

CompTIA CS0-001 Question Answer

security analyst is reviewing IDS logs and notices the following entry:
Which of the following attacks is occurring?

A. Cross-site scripting
B. Header manipulation
C. SQL injection
D. XML injection

Answer: C


A company that is hiring a penetration tester wants to exclude social engineering from the list of authorized activities. Which of the following documents should include these details?

A. Acceptable use policy
B. Service level agreement
C. Rules of engagement
D. Memorandum of understanding
E. Master service agreement

Answer: B

Thursday, 28 December 2017

PPCC Launches Cybersecurity Degree


Pikes Peak Community College will offer a cybersecurity degree beginning in the spring of 2018.

The Associate in Applied Science in Cybersecurity is being presented in addition to the preparatory courses for cybersecurity testing that PPCC has offered since 2016.

"We know how essential cybersecurity is for our country and our region," PPCC president Lance Bolton said in an email. "No one else is better positioned than Pikes Peak to get the number of trained professionals needed for those jobs and to grow that vital workforce."

According to a PPCC press release, there are currently 1,434 open positions for people with Security + certification in the Pikes Peak region, which makes it one of the regions with the highest demand for cybersecurity in the country.

The new degree program prepares students for the Cisco Certified Network Associate Security certification test (CCNA Security) or the Security + certification (CompTIA Security +) certification from the Computing Technology Industry Association, according to the statement, and graduates can follow careers as cyber security analysts, information systems, security engineers and systems design engineers, among others.

With two new cyber labs on its Rampart Range and Centennial Campus and a pending lease agreement for an additional cybersecurity lab facility on Catalyst Campus, PPCC can provide hands-on training to 75 qualified students, the statement said.

In addition, PPCC non-credit cybersecurity workshops are intended to provide IT enthusiasts and professionals with the skills and knowledge they need to pass the Network +, Security + and Hacker Certified Ethics (CEH) exams, which are the standards of the industry for professionals working in cybersecurity.

Using new cybersecurity ranges, students work in realistic settings in the lab. According to the statement, accelerated PPCC courses cost significantly less than most test preparation camps and, although they do not count toward a college degree, they come with a voucher to take the industry certification exam at no additional cost.

Friday, 27 October 2017

CompTIA CS0-001 Question Answer

A security audit revealed that port 389 has been used instead of 636 when connecting to LDAP for the authentication of users. The remediation recommended by the audit was to switch the port to 636 wherever technically possible. Which of the following is the BEST response?

A. the audit. This finding is a well-known false positive; the services that typically run on 389 and 636 are identical.
B. Change all devices and servers that support it to 636, as encrypted services run by default on 636.
C. Change all devices and servers that support it to 636, as 389 is a reserved port that requires root access and can expose the server to privilege escalation attacks.
D. the audit. This finding is accurate, but the remediation is to update encryption keys on each of the servers to match port 636.

Answer: B

Wednesday, 6 September 2017

CompTIA CS0-001 Question Answer

A security analyst is adding input to the incident response communication plan. A company officer has suggested that if a data breach occurs, only affected parties should be notified to keep an incident from becoming a media headline. Which of the following should the analyst recommend to the company officer?

A. The first responder should contact law enforcement upon confirmation of a security incident in order for a forensics team to preserve chain of custody.
B. Guidance from laws and regulations should be considered when deciding who must be notified in order to avoid fines and judgements from non-compliance.
C. An externally hosted website should be prepared in advance to ensure that when an incident occurs victims have timely access to notifications from a noncompromised recourse.
D. The HR department should have information security personnel who are involved in the investigation of the incident sign non-disclosure agreements so the company cannot be held liable for customer data that might be viewed during an investigation.

Answer: A


A company has recently launched a new billing invoice website for a few key vendors. The cybersecurity analyst is receiving calls that the website is performing slowly and the pages sometimes time out. The analyst notices the website is receiving millions of requests, causing the service to become unavailable. Which of the following can be implemented to maintain the availability of the website?

A. VPN
B. Honeypot
C. Whitelisting
D. DMZ
E. MAC filtering

Answer: C