CS0-002 Exam Question 206

A monthly job to install approved vendor software updates and hot fixes recently stopped working. The security team performed a vulnerability scan, which identified several hosts as having some critical OS vulnerabilities, as referenced in the common vulnerabilities and exposures (CVE) database.
Which of the following should the security team do NEXT to resolve the critical findings in the most effective manner? (Choose two.)
  • CS0-002 Exam Question 207

    A security analyst is reviewing the following log entries to identify anomalous activity:

    Which of the following attack types is occurring?
  • CS0-002 Exam Question 208

    A company's security officer needs to implement geographical IP blocks for nation-state actors from a foreign country On which of the following should the blocks be implemented'?
  • CS0-002 Exam Question 209

    Hotspot Question
    A security analyst performs various types of vulnerability scans. You must review the vulnerability scan results to determine the type of scan that was executed and determine if a false positive occurred for each device.
    Instructions:
    Select the drop option for whether the results were generated from a credentialed scan, non- credentialed scan, or a compliance scan.
    For ONLY the credentialed and non-credentialed scans, evaluate the results for false positives and check the findings that display false positives.
    NOTE: If you would like to uncheck an option that is currently selected, click on the option a second time. Lastly, based on the vulnerability scan results, identify the type of Server by dragging the Server to the results.
    The Linux Web Server, File-Print Server and Directory Server are draggable. If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

    CS0-002 Exam Question 210

    An organization recently had its strategy posted to a social media website. The document posted to the website is an exact copy of a document stored on only one server in the organization. A security analyst sees the following output from a command-line entry on the server suspected of the problem:

    Which of the following would be the BEST course of action?