CompTIA CS0-003 CompTIA Cybersecurity Analyst (CySA+) Exam Online Training
CompTIA CS0-003 Online Training
The questions for CS0-003 were last updated at Nov 19,2024.
- Exam Code: CS0-003
- Exam Name: CompTIA Cybersecurity Analyst (CySA+) Exam
- Certification Provider: CompTIA
- Latest update: Nov 19,2024
A recent zero-day vulnerability is being actively exploited, requires no user interaction or privilege escalation, and has a significant impact to confidentiality and integrity but not to availability.
Which of the following CVE metrics would be most accurate for this zero-day threat?
- A . CVSS: 31/AV: N/AC: L/PR: N/UI: N/S: U/C: H/1: K/A: L
- B . CVSS:31/AV:K/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
- C . CVSS:31/AV:N/AC:L/PR:N/UI:H/S:U/C:L/I:N/A:H
- D . CVSS:31/AV:L/AC:L/PR:R/UI:R/S:U/C:H/I:L/A:H
Which of the following tools would work best to prevent the exposure of PII outside of an organization?
- A . PAM
- B . IDS
- C . PKI
- D . DLP
An organization conducted a web application vulnerability assessment against the corporate website, and the following output was observed:
Which of the following tuning recommendations should the security analyst share?
- A . Set an HttpOnlvflaq to force communication by HTTPS
- B . Block requests without an X-Frame-Options header
- C . Configure an Access-Control-Allow-Origin header to authorized domains
- D . Disable the cross-origin resource sharing header
Which of the following items should be included in a vulnerability scan report? (Choose two.)
- A . Lessons learned
- B . Service-level agreement
- C . Playbook
- D . Affected hosts
- E . Risk score
- F . Education plan
The Chief Executive Officer of an organization recently heard that exploitation of new attacks in the industry was happening approximately 45 days after a patch was released.
Which of the following would best protect this organization?
- A . A mean time to remediate of 30 days
- B . A mean time to detect of 45 days
- C . A mean time to respond of 15 days
- D . Third-party application testing
A security analyst recently joined the team and is trying to determine which scripting language is being used in a production script to determine if it is malicious.
Given the following script:
Which of the following scripting languages was used in the script?
- A . PowerShel
- B . Ruby
- C . Python
- D . Shell script
A company’s user accounts have been compromised. Users are also reporting that the company’s internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS.
Which of the following most likely describes the observed activity?
- A . There is an issue with the SSL certificate causinq port 443 to become unavailable for HTTPS access
- B . An on-path attack is being performed by someone with internal access that forces users into port 80
- C . The web server cannot handle an increasing amount of HTTPS requests so it forwards users to port 80
- D . An error was caused by BGP due to new rules applied over the company’s internal routers
A company’s user accounts have been compromised. Users are also reporting that the company’s internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS.
Which of the following most likely describes the observed activity?
- A . There is an issue with the SSL certificate causinq port 443 to become unavailable for HTTPS access
- B . An on-path attack is being performed by someone with internal access that forces users into port 80
- C . The web server cannot handle an increasing amount of HTTPS requests so it forwards users to port 80
- D . An error was caused by BGP due to new rules applied over the company’s internal routers
A company’s user accounts have been compromised. Users are also reporting that the company’s internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS.
Which of the following most likely describes the observed activity?
- A . There is an issue with the SSL certificate causinq port 443 to become unavailable for HTTPS access
- B . An on-path attack is being performed by someone with internal access that forces users into port 80
- C . The web server cannot handle an increasing amount of HTTPS requests so it forwards users to port 80
- D . An error was caused by BGP due to new rules applied over the company’s internal routers
A company’s user accounts have been compromised. Users are also reporting that the company’s internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS.
Which of the following most likely describes the observed activity?
- A . There is an issue with the SSL certificate causinq port 443 to become unavailable for HTTPS access
- B . An on-path attack is being performed by someone with internal access that forces users into port 80
- C . The web server cannot handle an increasing amount of HTTPS requests so it forwards users to port 80
- D . An error was caused by BGP due to new rules applied over the company’s internal routers