Exam Details

  • Exam Code
    :CS0-003
  • Exam Name
    :CompTIA Cybersecurity Analyst (CySA+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :556 Q&As
  • Last Updated
    :Apr 17, 2025

CompTIA CompTIA Certifications CS0-003 Questions & Answers

  • Question 181:

    A Chief Information Security Officer (CISO) is concerned that a specific threat actor who is known to target the company's business type may be able to breach the network and remain inside of it for an extended period of time.

    Which of the following techniques should be performed to meet the CISO's goals?

    A. Vulnerability scanning

    B. Adversary emulation

    C. Passive discovery

    D. Bug bounty

  • Question 182:

    A security analyst performs a vulnerability scan. Based on the metrics from the scan results, the analyst must prioritize which hosts to patch. The analyst runs the tool and receives the following output:

    Which of the following hosts should be patched first, based on the metrics?

    A. host01

    B. host02

    C. host03

    D. host04

  • Question 183:

    During an incident, a security analyst discovers a large amount of Pll has been emailed externally from an employee to a public email address. The analyst finds that the external email is the employee's personal email.

    Which of the following should the analyst recommend be done first?

    A. Place a legal hold on the employee's mailbox.

    B. Enable filtering on the web proxy.

    C. Disable the public email access with CASB.

    D. Configure a deny rule on the firewall.

  • Question 184:

    Which of the following is described as a method of enforcing a security policy between cloud customers and cloud services?

    A. CASB

    B. DMARC

    C. SIEM

    D. PAM

  • Question 185:

    During the log analysis phase, the following suspicious command is detected

    Which of the following is being attempted?

    A. Buffer overflow

    B. RCE

    C. ICMP tunneling

    D. Smurf attack

  • Question 186:

    A web application team notifies a SOC analyst that there are thousands of HTTP/404 events on the public-facing web server. Which of the following is the next step for the analyst to take?

    A. Instruct the firewall engineer that a rule needs to be added to block this external server

    B. Escalate the event to an incident and notify the SOC manager of the activity

    C. Notify the incident response team that there is a DDoS attack occurring

    D. Identify the IP/hostname for the requests and look at the related activity

  • Question 187:

    While reviewing web server logs, an analyst notices several entries with the same time stamps, but all contain odd characters in the request line. Which of the following steps should be taken next?

    A. Shut the network down immediately and call the next person in the chain of command.

    B. Determine what attack the odd characters are indicative of.

    C. Utilize the correct attack framework and determine what the incident response will consist of.

    D. Notify the local law enforcement for incident response.

  • Question 188:

    A security analyst receives an alert for suspicious activity on a company laptop An excerpt of the log is shown below:

    Which of the following has most likely occurred?

    A. An Office document with a malicious macro was opened.

    B. A credential-stealing website was visited.

    C. A phishing link in an email was clicked

    D. A web browser vulnerability was exploited.

  • Question 189:

    A vulnerability scanner generates the following output:

    The company has an SLA for patching that requires time frames to be met for high-risk vulnerabilities. Which of the following should the analyst prioritize first for remediation?

    A. Oracle JDK

    B. Cisco Webex

    C. Redis Server

    D. SSL Self-signed Certificate

  • Question 190:

    After completing a review of network activity, the threat hunting team discovers a device on the network that sends an outbound email via a mail client to a non-company email address daily at 10:00 p.m. Which of the following is potentially occurring?

    A. Irregular peer-to-peer communication

    B. Rogue device on the network

    C. Abnormal OS process behavior

    D. Data exfiltration

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CS0-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.