Exam Details

  • Exam Code
    :CS0-003
  • Exam Name
    :CompTIA Cybersecurity Analyst (CySA+)
  • Certification
    :CompTIA CySA+
  • Vendor
    :CompTIA
  • Total Questions
    :427 Q&As
  • Last Updated
    :May 13, 2024

CompTIA CompTIA CySA+ CS0-003 Questions & Answers

  • Question 21:

    An organization recently changed its BC and DR plans. Which of the following would best allow for the incident response team to test the changes without any impact to the business?

    A. Perform a tabletop drill based on previously identified incident scenarios.

    B. Simulate an incident by shutting down power to the primary data center.

    C. Migrate active workloads from the primary data center to the secondary location.

    D. Compare the current plan to lessons learned from previous incidents.

  • Question 22:

    During a cybersecurity incident, one of the web servers at the perimeter network was affected by ransomware. Which of the following actions should be performed immediately?

    A. Shut down the server.

    B. Reimage the server.

    C. Quarantine the server.

    D. Update the OS to latest version.

  • Question 23:

    A security analyst reviews the latest vulnerability scans and observes there are vulnerabilities with similar CVSSv3 scores but different base score metrics. Which of the following attack vectors should the analyst remediate first?

    A. CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    B. CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    C. CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    D. CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

  • Question 24:

    A security analyst must review a suspicious email to determine its legitimacy. Which of the following should be performed? (Choose two.)

    A. Evaluate scoring fields, such as Spam Confidence Level and Bulk Complaint Level

    B. Review the headers from the forwarded email

    C. Examine the recipient address field

    D. Review the Content-Type header

    E. Evaluate the HELO or EHLO string of the connecting email server

    F. Examine the SPF, DKIM, and DMARC fields from the original email

  • Question 25:

    An organization was compromised, and the usernames and passwords of all employees were leaked online. Which of the following best describes the remediation that could reduce the impact of this situation?

    A. Multifactor authentication

    B. Password changes

    C. System hardening

    D. Password encryption

  • Question 26:

    A. Integrate an IT service delivery ticketing system to track remediation and closure

    B. Create a compensating control item until the system can be fully patched

    C. Accept the risk and decommission current assets as end of life

    D. Request an exception and manually patch each system

  • Question 27:

    Which of the following would help an analyst to quickly find out whether the IP address in a SIEM alert is a known-malicious IP address?

    A. Join an information sharing and analysis center specific to the company's industry

    B. Upload threat intelligence to the IPS in STIX'TAXII format

    C. Add data enrichment for IPs in the ingestion pipeline

    D. Review threat feeds after viewing the SIEM alert

  • Question 28:

    A vulnerability analyst received a list of system vulnerabilities and needs to evaluate the relevant impact of the exploits on the business. Given the constraints of the current sprint, only three can be remediated. Which of the following represents the least impactful risk, given the CVSS3.1 base scores?

    A. AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L - Base Score 6.0

    B. AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L - Base Score 7.2

    C. AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H - Base Score 6.4

    D. AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L - Base Score 6.5

  • Question 29:

    A security analyst is reviewing the findings of the latest vulnerability report for a company's web application. The web application accepts files for a Bash script to be processed if the files match a given hash. The analyst is able to submit files to the system due to a hash collision. Which of the following should the analyst suggest to mitigate the vulnerability with the fewest changes to the current script and infrastructure?

    A. Deploy a WAF to the front of the application.

    B. Replace the current MD5 with SHA-256.

    C. Deploy an antivirus application on the hosting system.

    D. Replace the MD5 with digital signatures.

  • Question 30:

    A security analyst needs to mitigate a known, exploited vulnerability related to an attack vector that embeds software through the USB interface. Which of the following should the analyst do first?

    A. Conduct security awareness training on the risks of using unknown and unencrypted USBs.

    B. Write a removable media policy that explains that USBs cannot be connected to a company asset.

    C. Check configurations to determine whether USB ports are enabled on company assets.

    D. Review logs to see whether this exploitable vulnerability has already impacted the company.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CS0-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.