CompTIA CS0-003 Exam Questions
CompTIA CySA+ (CS0-003) (Page 16 )

Updated On: 24-Feb-2026

A penetration tester submitted data to a form in a web application, which enabled the penetration tester to retrieve user credentials.
Which of the following should be recommended for remediation of this application vulnerability?

  1. Implementing multifactor authentication on the server OS
  2. Hashing user passwords on the web application
  3. Performing input validation before allowing submission
  4. Segmenting the network between the users and the web server

Answer(s): C



A cybersecurity team lead is developing metrics to present in the weekly executive briefs. Executives are interested in knowing how long it takes to stop the spread of malware that enters the network.
Which of the following metrics should the team lead include in the briefs?

  1. Mean time between failures
  2. Mean time to detect
  3. Mean time to remediate
  4. Mean time to contain

Answer(s): C



An employee accessed a website that caused a device to become infected with invasive malware. The incident response analyst has:
created the initial evidence log.
disabled the wireless adapter on the device.
interviewed the employee, who was unable to identify the website that was accessed. reviewed the web proxy traffic logs.
Which of the following should the analyst do to remediate the infected device?

  1. Update the system firmware and reimage the hardware.
  2. Install an additional malware scanner that will send email alerts to the analyst.
  3. Configure the system to use a proxy server for Internet access.
  4. Delete the user profile and restore data from backup.

Answer(s): A



A cloud team received an alert that unauthorized resources were being auto-provisioned. After investigating, the team suspects that cryptomining is occurring.
Which of the following indicators would most likely lead the team to this conclusion?

  1. High GPU utilization
  2. Bandwidth consumption
  3. Unauthorized changes
  4. Unusual traffic spikes

Answer(s): A



A company’s security team is updating a section of the reporting policy that pertains to inappropriate use of resources (e.g., an employee who installs cryptominers on workstations in the office). Besides the security team, which of the following groups should the issue be escalated to first in order to comply with industry best practices?

  1. Help desk
  2. Law enforcement
  3. Legal department
  4. Board member

Answer(s): C






Post your Comments and Discuss CompTIA CS0-003 exam dumps with other Community members:

Join the CS0-003 Discussion