

CompTIA CySA+ Certification - (CS0-003) Exam Questions
Question 11 Single Choice
Which of the following refers to the likelihood of a vulnerability appearing again after it has been remediated?
Question 12 Single Choice
Your organization is concerned about potential leaks of sensitive data. Which technology should be deployed to identify and prevent unauthorized access to such data?
Question 13 Single Choice
Your organization has recently migrated to a SaaS provider for its enterprise resource planning (ERP) software. Before this migration, a weekly port scan was conducted to help validate the on-premise systems' security. Which of the following actions should you take to validate the security of the cloud-based solution?
Question 14 Single Choice
If an attacker can compromise an Active Directory domain by utilizing an attack to grant administrative access to the domain controllers for all domain members, which type of attack is being used?
Question 15 Multiple Choice
What remediation strategies are the MOST effective in reducing the risk to an embedded ICS from a network-based compromise? (Select TWO)
Question 16 Single Choice
In the 2017 Equifax breach, the credit reporting company itself had vast amounts of sensitive personal data of consumers exposed due to a flaw in their Apache Struts web-application software. In the context of the Diamond Model of Intrusion Analysis, who does Equifax represent?
Question 17 Multiple Choice
Which of the following are valid concerns when migrating to a serverless architecture? (SELECT THREE)
Question 18 Single Choice
What command should a forensic analyst use to make a forensic disk image of a hard drive?
Question 19 Single Choice
Which operating system feature is designed to detect malware that is loaded early in the system startup process or before the operating system can load itself?
Question 20 Single Choice
During your annual cybersecurity awareness training in your company, the instructor states that employees should be careful about what information they post on social media. According to the instructor, if you post too much personal information on social media, such as your name, birthday, hometown, and other personal details, it is much easier for an attacker to conduct which type of attack to break your passwords?





