CompTIA CS0-003 Exam Questions
CompTIA CySA+ (CS0-003) (Page 12 )

Updated On: 24-Feb-2026

Which of the following would a security analyst most likely use to compare TTPs between different known adversaries of an organization?

  1. MITRE ATT&CK
  2. Cyber Kill Cham
  3. OWASP
  4. STIX/TAXII

Answer(s): A



An analyst is remediating items associated with a recent incident. The analyst has isolated the vulnerability and is actively removing it from the system.
Which of the following steps of the process does this describe?

  1. Eradication
  2. Recovery
  3. Containment
  4. Preparation

Answer(s): A



Joe, a leading sales person at an organization, has announced on social media that he is leaving his current role to start a new company that will compete with his current employer. Joe is soliciting his current employer's customers. However, Joe has not resigned or discussed this with his current supervisor yet.
Which of the following would be the best action for the incident response team to recommend?

  1. Isolate Joe's PC from the network
  2. Reimage the PC based on standard operating procedures
  3. Initiate a remote wipe of Joe's PC using mobile device management
  4. Perform no action until HR or legal counsel advises on next steps

Answer(s): D



The Chief Information Security Officer is directing a new program to reduce attack surface risks and threats as part of a zero trust approach. The IT security team is required to come up with priorities for the program.
Which of the following is the best priority based on common attack frameworks?

  1. Reduce the administrator and privileged access accounts
  2. Employ a network-based IDS
  3. Conduct thorough incident response
  4. Enable SSO to enterprise applications

Answer(s): A



During an extended holiday break, a company suffered a security incident. This information was properly relayed to appropriate personnel in a timely manner, and the server was up to date and configured with appropriate auditing and logging. The Chief Information Security Officer wants to find out precisely what happened.
Which of the following actions should the analyst take first?

  1. Clone the virtual server for forensic analysis
  2. Log in to the affected server and begin analysis of the logs
  3. Restore from the last known-good backup to confirm there was no loss of connectivity
  4. Shut down the affected server immediately

Answer(s): A






Post your Comments and Discuss CompTIA CS0-003 exam dumps with other Community members:

Join the CS0-003 Discussion