PrepAway - Latest Free Exam Questions & Answers

Category: CS0-001

Briefing CS0-001: CompTIA CSA+ Certification

Which of the following steps should be taken to prevent…

Law enforcement has contacted a corporation’s legal counsel because correlated data from a breach shows the organization as the common denominator from all indicators of compromise. An employee overhears the conversation between legal counsel and law enforcement, and then posts a comment about it on social media.
The media then starts contacting other employees about the breach. Which of the following steps should be taken to prevent further disclosure of information about the breach?

which of the following would BEST protect against futur…

An administrator has been investigating the way in which an actor had been exfiltrating confidential data from a web server to a foreign host. After a thorough forensic review, the administrator determined the server’s BIOS had been modified by rootkit installation. After removing the rootkit and flashing the BIOS to a known good state, which of the following would BEST protect against future adversary access to the BIOS, in case another rootkit is installed?

Which of the following is the BEST way to proceed?

In order to meet regulatory compliance objectives for the storage of PHI, vulnerability scans must be conducted on a continuous basis. The last completed scan of the network returned 5,682 possible vulnerabilities. The
Chief Information Officer (CIO) would like to establish a remediation plan to resolve all known issues. Which of the following is the BEST way to proceed?


Page 4 of 8« First...23456...Last »