A company has been a victim of multiple volumetric DoS attacks. Packet analysis of the offending traffic shows the following:

Which of the following mitigation techniques is MOST effective against the above attack?
A. The company should implement the following ACL at their gateway firewall:DENY IP HOST 192.168.1.1 170.43.30.0/24.
B. The company should enable the DoS resource starvation protection feature of the gateway NIPS.
C. The company should contact the upstream ISP and ask that RFC1918 traffic be dropped.
D. The company should implement a network-based sinkhole to drop all traffic coming from 192.168.1.1 at their gateway router.
正解:C
質問 2:
A system's authority to operate (ATO) is set to expire in four days. Because of other activities and limited staffing, the organization has neglected to start reauthentication activities until now. The cybersecurity group just performed a vulnerability scan with the partial set of results shown below:

Based on the scenario and the output from the vulnerability scan, which of the following should the security team do with this finding?
A. Ensure HTTP validation is enabled by rebooting the server.
B. Accept this risk for now because this is a "high" severity, but testing will require more than the four days available, and the system ATO needs to be competed.
C. Ignore it. This is false positive, and the organization needs to focus its efforts on other findings.
D. Remediate by going to the web config file, searching for the enforce HTTP validation setting, and manually updating to the correct setting.
正解:D
質問 3:
A company has established an ongoing vulnerability management program and procured the latest technology to support it. However, the program is failing because several vulnerabilities have not been detected. Which of the following will reduce the number of false negatives?
A. Reconfigure scanner to brute force mechanisms.
B. Increase scan frequency.
C. Perform credentialed scans.
D. Update the security incident response plan.
正解:C
質問 4:
An organization has two environments: development and production. Development is where applications are developed with unit testing. The development environment has many configuration differences from the production environment. All applications are hosted on virtual machines. Vulnerability scans are performed against all systems before and after any application or configuration changes to any environment. Lately, vulnerability remediation activity has caused production applications to crash and behave unpredictably. Which of the following changes should be made to the current vulnerability management process?
A. Create a third environment between development and production that mirrors production and tests all changes before deployment to the users
B. Create a second production environment by cloning the virtual machines, and if any stability problems occur, migrate users to the alternate production environment
C. Refine testing in the development environment to include fuzzing and user acceptance testing so applications are more stable before they migrate to production
D. Refine testing in the production environment to include more exhaustive application stability testing while continuing to maintain the robust vulnerability remediation activities
正解:A
質問 5:
A cybersecurity analyst is reviewing the following outputs:

Which of the following can the analyst infer from the above output?
A. The remote host is running a web server on port 80.
B. The remote host's firewall is dropping packets for port 80.
C. The remote host is running a service on port 8080.
D. The remote host is redirecting port 80 to port 8080.
正解:C
質問 6:
A new policy requires the security team to perform web application and OS vulnerability scans. All of the company's web applications use federated authentication and are accessible via a central portal. Which of the following should be implemented to ensure a more thorough scan of the company's web application, while at the same time reducing false positives?
A. The vulnerability scanner should implement OS and network service detection.
B. The vulnerability scanner should be installed on the web server.
C. The vulnerability scanner should scan for known and unknown vulnerabilities.
D. The vulnerability scanner should be configured to perform authenticated scans.
正解:D
質問 7:
The development team currently consists of three developers who each specialize in a specific programming language:
Developer 1 - C++/C#
Developer 2 - Python
Developer 3 - Assembly
Which of the following SDLC best practices would be challenging to implement with the current available staff?
A. Fuzzing
B. Peer review
C. Stress testing
D. Regression testing
正解:B
Nakazato -
CS0-001試験に合格しました!おめでとうございました!また、CS0-001試験問題集に感謝の意を申し上げます。