CompTIA CS0-003 Übungsprüfungen
Zuletzt aktualisiert am 05.06.2025- Prüfungscode: CS0-003
- Prüfungsname: CompTIA Cybersecurity Analyst (CySA+) Exam
- Zertifizierungsanbieter: CompTIA
- Zuletzt aktualisiert am: 05.06.2025
An organization was compromised, and the usernames and passwords of all employees were leaked online.
Which of the following best describes the remediation that could reduce the impact of this situation?
- A . Multifactor authentication
- B . Password changes
- C . System hardening
- D . Password encryption
A recent penetration test discovered that several employees were enticed to assist attackers by visiting specific websites and running downloaded files when prompted by phone calls.
Which of the following would best address this issue?
- A . Increasing training and awareness for all staff
- B . Ensuring that malicious websites cannot be visited
- C . Blocking all scripts downloaded from the internet
- D . Disabling all staff members‘ ability to run downloaded applications
A web application team notifies a SOC analyst that there are thousands of HTTP/404 events on the public-facing web server.
Which of the following is the next step for the analyst to take?
- A . Instruct the firewall engineer that a rule needs to be added to block this external server.
- B . Escalate the event to an incident and notify the SOC manager of the activity.
- C . Notify the incident response team that a DDoS attack is occurring.
- D . Identify the IP/hostname for the requests and look at the related activity.
An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation.
Which of the following pieces of data should be collected first in order to preserve sensitive information before isolating the server?
- A . Hard disk
- B . Primary boot partition
- C . Malicious tiles
- D . Routing table
- E . Static IP address
A Chief Information Security Officer wants to map all the attack vectors that the company faces each day.
Which of the following recommendations should the company align their security controls around?
- A . OSSTMM
- B . Diamond Model Of Intrusion Analysis
- C . OWASP
- D . MITRE ATT&CK
A new cybersecurity analyst is tasked with creating an executive briefing on possible threats to the organization.
Which of the following will produce the data needed for the briefing?
- A . Firewall logs
- B . Indicators of compromise
- C . Risk assessment
- D . Access control lists
A SOC manager receives a phone call from an upset customer. The customer received a vulnerability report two hours ago: but the report did not have a follow-up remediation response from an analyst.
Which of the following documents should the SOC manager review to ensure the team is meeting the appropriate contractual obligations for the customer?
- A . SLA
- B . MOU
- C . NDA
- D . Limitation of liability
A SOC manager receives a phone call from an upset customer. The customer received a vulnerability report two hours ago: but the report did not have a follow-up remediation response from an analyst.
Which of the following documents should the SOC manager review to ensure the team is meeting the appropriate contractual obligations for the customer?
- A . SLA
- B . MOU
- C . NDA
- D . Limitation of liability
Which of the following is a reason why proper handling and reporting of existing evidence are important for the investigation and reporting phases of an incident response?
- A . TO ensure the report is legally acceptable in case it needs to be presented in court
- B . To present a lessons-learned analysis for the incident response team
- C . To ensure the evidence can be used in a postmortem analysis
- D . To prevent the possible loss of a data source for further root cause analysis
The Chief Information Security Officer (CISO) of a large management firm has selected a cybersecurity framework that will help the organization demonstrate its investment in tools and systems to protect its data.
Which of the following did the CISO most likely select?
- A . PCI DSS
- B . COBIT
- C . ISO 27001
- D . ITIL