00:15:00

CompTIA CySA+ Practice Test (CS0-003)

Use the form below to configure your CompTIA CySA+ Practice Test (CS0-003). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA CySA+ CS0-003 (V3)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA CySA+ CS0-003 (V3) Information

CompTIA CySA+, short for CompTIA Cybersecurity Analyst, is a globally recognized certification designed for IT professionals seeking to specialize in cybersecurity analytics and threat detection. This certification is aimed at individuals who want to enhance their skills in identifying and mitigating security threats within an organization's network. CySA+ certification covers various aspects of cybersecurity, including threat analysis, vulnerability assessment, and incident response. It validates the ability to analyze data and behavior patterns to detect and respond to security incidents effectively. By earning the CompTIA CySA+ certification, professionals demonstrate their proficiency in protecting organizations against evolving cyber threats, making them valuable assets in the field of cybersecurity.

Free CompTIA CySA+ CS0-003 (V3) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Security Operations
    Vulnerability Management
    Incident Response and Management
    Reporting and Communication
Question 1 of 15

An organization is required by a compliance framework to encrypt all sensitive data at rest. However, a critical legacy database system central to operations does not support native encryption, and an upgrade is not feasible in the short term. To mitigate the risk, the security team implements stringent access control lists (ACLs), data loss prevention (DLP) tools, and continuous database activity monitoring. Which of the following BEST describes this set of security measures?

  • Managerial control

  • Corrective control

  • Preventative control

  • Compensating control

Question 2 of 15

During a vulnerability assessment, it is discovered that a critical server running a legacy system cannot be patched immediately due to dependencies on outdated software. Which of the following BEST describes a compensating control that can be implemented to mitigate the risk?

  • Disable unused services on the legacy server.

  • Increase logging and monitoring to detect any exploit attempts.

  • Implement a firewall rule to block specific attack vectors targeting the vulnerability.

  • Conduct routine vulnerability scans to detect potential threats.

Question 3 of 15

In a Linux-based server, you are tasked with securing the web server configuration file to prevent unauthorized changes. Where is the typical location of the Apache HTTP server configuration file?

  • /etc/httpd/conf/httpd.conf

  • /etc/nginx/nginx.conf

  • /etc/systemd/system.conf

  • /etc/ssh/sshd_config

Question 4 of 15

A company has experienced a breach in their primary network defense mechanism, and sensitive systems are currently vulnerable. Following the containment and eradication phases, which of the following would be the BEST immediate action to lessen the chance of another successful attack until the primary defense can be restored?

  • Update the incident response plan to include the breach details.

  • Conduct a root cause analysis to determine how the breach occurred.

  • Extend VPN access to all employees to ensure business continuity.

  • Implement network segmentation to limit lateral movement and isolate sensitive systems.

Question 5 of 15

What is the BEST approach to reduce MTTR during a security incident?

  • Create detailed incident response documentation for potential threats.

  • Ensure all team members receive regular training on incident response procedures.

  • Implement automated alerting systems to notify relevant teams promptly.

  • Use manual monitoring and human intervention to manage alerts.

Question 6 of 15

You are the lead cybersecurity analyst at your company and have just identified a critical vulnerability on your main production servers. Which stakeholder should be immediately informed to ensure that business processes are not disrupted?

  • Customers

  • IT operations team

  • Public relations team

  • Compliance team

Question 7 of 15

Which type of control is designed to identify and record a security breach after it has occurred?

  • Operational

  • Detective

  • Preventive

  • Corrective

Question 8 of 15

During a vulnerability assessment, a cybersecurity analyst is using a debugger to analyze a suspicious binary that crashes under certain conditions. Which debugger feature would be most useful to break the execution at the point of crash to inspect the state of the program?

  • Core dumps

  • Breakpoints

  • Single-stepping

  • Watchpoints

Question 9 of 15

You are reviewing quarterly vulnerability scan results and notice that the same OpenSSL remote code-execution vulnerability (CVE-2022-12345) keeps reappearing on a group of Linux web servers even though the operations team states it applied the vendor patch after each previous finding. Change-management and firewall logs show no recent network changes, and the scanner plugin has been updated and validated in a lab where it correctly reports a patched host as clean. Which underlying issue is the most probable cause of this vulnerability's recurrence on the production servers?

  • The scanner is generating a false positive because of cached service banners.

  • The servers were rebooted before the patch finished installing, causing a transient error that the scanner misinterpreted.

  • An automated configuration-management process is reinstalling the older, vulnerable OpenSSL package after the patch is applied.

  • The firewall was temporarily disabled during the external vulnerability scan, exposing the service.

Question 10 of 15

During network monitoring, an analyst observes periodic, predictable network traffic from a specific internal device to an external server. Which action should the analyst prioritize to identify if this is an indicator of beaconing?

  • Validate the reputation of the external server.

  • Check if the traffic is using non-standard ports.

  • Analyze the packet contents to check for signs of malicious communication.

  • Ignore the traffic since it is periodic and predictable.

Question 11 of 15

A cybersecurity analyst is reviewing the vulnerabilities associated with an older, mission-critical application. The application cannot be updated or patched without significant downtime, which would impact business operations. After evaluating the application's vulnerabilities, it is determined that they are not actively being exploited in the wild and the potential impact is low. The environment is heavily monitored with numerous compensating controls in place to detect any malicious activity. Which course of action is most appropriate for the cybersecurity analyst to recommend in this scenario?

  • Recommend transferring the risk to a third-party vendor specializing in legacy application security.

  • Recommend accepting the risk and continue monitoring for any changes in threat exposure.

  • Recommend mitigating the risk immediately by taking the application offline for patching.

  • Recommend avoiding the risk by ceasing the use of the application and seeking an alternative solution.

Question 12 of 15

During a routine security audit, your team discovers multiple instances of unauthorized access attempts on a sensitive database. As the lead incident responder, what should be your first step according to a well-structured incident response plan?

  • Inform upper management.

  • Notify law enforcement.

  • Identify and validate the incident.

  • Isolate the affected system.

Question 13 of 15

When analyzing malware behavior in a sandbox environment, an analyst notices that the malware remains dormant and does not exhibit any malicious activity. What could be the reason for this behavior?

  • The malware detects the sandbox environment and is programmed to avoid execution within it

  • The network settings of the sandbox prevent the malware from communicating externally

  • The sandbox has automatically neutralized the malware upon detection

  • The malware is awaiting a specific system event or user interaction to trigger its payload

Question 14 of 15

According to industry guidance such as NIST SP 800-61, under which circumstance is it generally appropriate for an incident response team to notify law enforcement about a cybersecurity incident?

  • Only after the organization publicly discloses the breach in a press release.

  • Immediately after any intrusion-detection alert, regardless of severity or scope.

  • When analysis shows the incident involves criminal activity or legal or regulatory obligations require external reporting.

  • Only if the organization lacks an internal CSIRT and cannot perform its own investigation.

Question 15 of 15

A cybersecurity analyst is tasked with analyzing a suspicious executable file recovered from a compromised system. The goal is to understand the malware's behavior, such as its communication protocols and persistence mechanisms, without access to the original source code. Which of the following techniques should the analyst primarily use?

  • Port scanning

  • Fuzzing

  • Reverse engineering

  • Static code analysis