The CompTIA CySA+ (CS0-003) validates skills in detecting, analyzing, and responding to cybersecurity threats through continuous security monitoring and incident response. It is vendor-neutral and bridges the gap between Security+ and advanced certifications like CASP+ or CISSP. Download the official CompTIA CySA+ Exam Objectives for the full domain breakdown.
CySA+ Practice Quiz
1. A SOC analyst reviewing the Splunk dashboard below on a Monday morning observes 1 failed authentication per account spread across 47 distinct user IDs, all originating from 198.51.100.42 within a 90-second window. AD lockout policy is set at 5 attempts. Which attack pattern does this telemetry MOST likely represent?
Right answer (B): That's correct! Password spraying targets multiple accounts with a small number of commonly used passwords from the same source, which matches the pattern of one IP hitting many accounts.
Wrong answers:
- A): Credential stuffing uses previously breached username-password pairs and typically originates from distributed sources rather than a single IP.
- C): A brute force attack against a single account generates many attempts on one account, not across multiple accounts as described.
- D): Session hijacking involves stealing an active session token and would not produce failed login attempts in the authentication logs.
2. While threat hunting in EDR, an analyst pivots on the Sysmon Event ID 1 record below showing WINWORD.EXE spawning an encoded, hidden PowerShell child process on a finance workstation. Map this finding to the MOST appropriate indicator-of-compromise category for SOC reporting.
Right answer (C): That's correct! A Word document spawning PowerShell is a behavioral indicator because it represents an abnormal parent-child process relationship that deviates from expected application behavior.
Wrong answers:
- A): Network-based indicators involve suspicious traffic patterns such as connections to known malicious IPs or unusual DNS queries, not local process execution chains.
- B): Signature-based detection relies on matching known malware hashes or byte patterns, whereas this scenario identifies suspicious behavior without a specific signature.
- D): A compliance violation relates to policy or regulatory non-adherence and is not a technical indicator of compromise.
3. The SOC manager wants to reduce MTTR on the multi-stage attack chain shown below by automating containment actions across EDR, firewall, and IAM tools without writing custom integration code for each. Which capability of a SOAR platform fulfills this requirement that a standalone SIEM cannot?
Right answer (D): That's correct! SOAR platforms uniquely provide automated playbook execution that can orchestrate responses across multiple security tools without human intervention.
Wrong answers:
- A): Log aggregation is a core SIEM function that collects and normalizes data from firewalls, endpoints, servers, and other sources into a central repository.
- B): Real-time correlation is a fundamental SIEM capability that matches events against detection rules to identify threats as they occur.
- C): Dashboard visualization is a standard SIEM feature that presents alert data, trends, and metrics in graphical formats for analyst review.
4. The Nessus export shown below lists CVE-2026-1042 (CVSS 9.8, unauthenticated RCE) on a Tier-1 production database server, and the vendor patch demands a service restart. The next approved change window is 5 days away. What should the vulnerability analyst recommend FIRST in the patch ticket?
Right answer (A): That's correct! Implementing compensating controls such as network segmentation, WAF rules, or IPS signatures reduces risk immediately while scheduling the patch for a proper maintenance window.
Wrong answers:
- B): Applying the patch immediately on a production database during business hours risks unplanned downtime and data loss that could impact critical operations.
- C): Marking it as a false positive without validation ignores a legitimate critical vulnerability and leaves the system exposed to exploitation.
- D): Waiting for the next quarterly cycle leaves the critical vulnerability unaddressed for potentially months, greatly increasing the window of exposure.
5. The pentest finding shown below shows a UNION-based SQLi in an internal HR portal that returned the full users table containing password hashes. The dev team asks which control will eliminate the root cause rather than just filter known payloads. Which remediation is MOST effective?
Right answer (B): That's correct! Parameterized queries prevent SQL injection at the source by separating SQL logic from user-supplied data, making it impossible for input to alter query structure.
Wrong answers:
- A): A WAF can detect and block some injection attempts but is a compensating control that can be bypassed with obfuscation or novel attack patterns.
- C): Restricting to read-only limits the damage from exploitation but does not prevent data exfiltration through SELECT-based injection attacks.
- D): TLS encrypts the connection between application and database but has no effect on SQL injection, which operates at the application logic layer.
6. A vulnerability analyst is triaging CVE-2026-2210 shown below on an air-gapped SCADA HMI. The base score is 9.8 but the asset has no routable path from the corporate or external networks. According to CVSS v3.1 methodology, how should this contextual data influence the prioritization?
Right answer (C): That's correct! The CVSS environmental score allows analysts to adjust the base score based on the specific deployment context, including network accessibility and existing mitigations.
Wrong answers:
- A): Treating every vulnerability as critical without context leads to inefficient resource allocation and patch fatigue across the organization.
- B): Ignoring vulnerabilities on air-gapped systems is dangerous because insider threats, removable media, and supply chain attacks can still exploit them.
- D): The difficulty of updating does not increase the vulnerability's risk score, though it may affect the remediation timeline and approach.
7. The IR timeline shown below shows that at 04:05 ET the team confirmed the ransomware was successfully contained: hosts isolated, lateral movement halted, and encryption stopped. According to NIST SP 800-61r2, which phase begins NEXT at 04:10 ET?
Right answer (D): That's correct! After containment, the NIST framework proceeds to eradication, which removes the threat, followed by recovery to restore normal operations.
Wrong answers:
- A): Preparation is the first phase that occurs before any incident and involves creating policies, assembling the team, and conducting training exercises.
- B): Detection and Analysis is the second phase where the incident is initially identified and investigated, which has already occurred in this scenario.
- C): Containment has already been completed as stated in the question, so repeating this phase would be redundant and delay remediation.
8. The compromised Linux server shown in the output below has been powered down per IR playbook and disconnected from the network. The legal team requires admissibility in potential litigation. Which action should the forensic analyst perform FIRST to establish chain of custody on the storage media?
Right answer (A): That's correct! Creating a forensic image with a documented hash preserves the original evidence in its exact state and establishes an integrity baseline for chain of custody.
Wrong answers:
- B): Logging into the server directly modifies access timestamps and could alter or overwrite volatile data that may contain critical evidence.
- C): Rebooting the server destroys volatile memory contents including running processes, network connections, and encryption keys that may be essential to the investigation.
- D): Deleting files destroys evidence, removes forensic artifacts, and could trigger anti-forensic mechanisms embedded in the malware.
9. The CISO has asked the analyst to brief the Board Risk Committee using the data summarized in the table below in a 15-minute slot. The board members are non-technical and need to authorize remediation budget. Which reporting approach is MOST appropriate for this audience?
Right answer (B): That's correct! Executive leadership needs business-focused reporting that translates technical findings into risk impact, financial exposure, and recommended investment in remediation.
Wrong answers:
- A): Detailed technical reports with raw scan data overwhelm non-technical stakeholders and fail to communicate business relevance or strategic priorities.
- C): A vulnerability spreadsheet sorted by IP provides no business context and requires technical expertise to interpret that executives typically do not possess.
- D): Packet captures are raw technical evidence used by SOC analysts and forensic investigators, not a communication format suitable for leadership briefings.
10. The threat intel report shown below confirms a supply-chain compromise via a trojanized vendor update affecting 612 endpoints with possible PII exposure and active GDPR/SEC disclosure clocks running. Per incident communication best practices and regulatory obligations, which stakeholder group MUST be notified FIRST?
Right answer (C): That's correct! Legal counsel, executive management, and the vendor must be notified first to coordinate response, assess legal obligations, and stop the compromised update from spreading further.
Wrong answers:
- A): Notifying the media prematurely can cause reputational damage, interfere with the investigation, and may violate legal requirements around disclosure timing.
- B): A company-wide email could alert the attacker if they have internal access and may cause unnecessary panic before the scope is fully understood.
- D): While law enforcement notification may be required, internal stakeholders and legal counsel should be engaged first to preserve evidence and determine reporting obligations.
Quiz Complete!
0/10Here's how you performed across CySA+ domains:
Pass CompTIA CySA+ on Your First Attempt!!
Get 85+ full-length practice questions, hands-on labs, and PBQs.
Start Practicing NowCySA+ Domain Weights (CS0-003)
Pass CompTIA CySA+ on Your First Attempt!!
Get complete practice with 85+ questions, hands-on security labs, PBQs, and detailed domain breakdowns. An investment worth making!
Free CySA+ Flashcards
What is the difference between a SIEM and a SOAR platform?
Click to flipA SIEM aggregates, correlates, and alerts on security events from multiple log sources. A SOAR automates response actions via playbooks and orchestrates workflows across security tools.
Frequently Asked Questions
The CySA+ (CS0-003) passing score is 750 on a 100-900 scale. The exam includes up to 85 questions with a 165-minute time limit.
CySA+ is highly valuable for SOC analysts and cybersecurity professionals who perform threat detection and incident response. It is DoD 8140 approved and validates hands-on defensive security skills.
Security+ covers broad security fundamentals, while CySA+ dives deeper into threat detection, SIEM analysis, vulnerability management, and incident response. CySA+ is considered an intermediate-level certification.
CompTIA recommends 3-4 years of hands-on information security or related experience. Having Security+ or equivalent knowledge is strongly recommended before attempting CySA+.
The CySA+ exam voucher costs approximately $404 USD. CompTIA offers bundles with retake vouchers and training materials at a discount.
Yes, CySA+ includes performance-based questions simulating real scenarios like analyzing SIEM log output, triaging alerts, interpreting vulnerability scan results, and identifying indicators of compromise.
CySA+ is valid for three years. Renewal requires 60 CEUs through CompTIA's Continuing Education program or passing a higher-level CompTIA certification.
CySA+ qualifies you for SOC analyst, cybersecurity analyst, threat intelligence analyst, vulnerability analyst, and incident responder roles. Salaries range from $80,000 to $120,000.
CySA+ focuses on defensive security (blue team) while PenTest+ focuses on offensive security (red team). Choose based on your career path. Many professionals eventually earn both certifications.
Key tools include Splunk or ELK for SIEM, Nessus or Qualys for vulnerability scanning, Wireshark for packet analysis, and MITRE ATT&CK for threat framework mapping.
Yes, there are no mandatory prerequisites. However, Security+ knowledge is strongly recommended as CySA+ builds upon foundational security concepts covered in the Security+ curriculum.
CertLabz offers full-length CySA+ practice exams with 85+ questions, virtual security labs, PBQ simulations, domain breakdowns with progress tracking, and flashcards. Plans start at $10/month.
