Certspots CompTIA CySA+ CS0-003 Practice Exam https://www.certspots.com/exam/cs0-003/ CompTIA CySA+ CS0-003 Practice Exam 1. Which of the following techniques would be best to provide the necessary assurance for embedded software that drives centrifugal pumps at a power Plant? A. Containerization B. Manual code reviews C. Static and dynamic analysis D. Formal methods Answer: C CompTIA CySA+ CS0-003 Practice Exam 2. The Chief Information Security Officer wants to eliminate and reduce shadow IT in the enterprise. Several high-risk cloud applications are used that increase the risk to the organization. Which of the following solutions will assist in reducing the risk? A. Deploy a CASB and enable policy enforcement B. Configure MFA with strict access C. Deploy an API gateway D. Enable SSO to the cloud applications Answer: A CompTIA CySA+ CS0-003 Practice Exam 3. Which of the following is the best action to take after the conclusion of a security incident to improve incident response in the future? A. Develop a call tree to inform impacted users B. Schedule a review with all teams to discuss what occurred C. Create an executive summary to update company leadership D. Review regulatory compliance with public relations for official notification Answer: B CompTIA CySA+ CS0-003 Practice Exam 4. Which of the following is the BEST option to protect a web application against CSRF attacks? A. Update the web application to the latest version. B. Set a server-side rate limit for CSRF token generation. C. Avoid the transmission of CSRF tokens using cookies. D. Configure the web application to only use HTTPS and TLS 1.3. Answer: C CompTIA CySA+ CS0-003 Practice Exam 5. A new cybersecurity analyst is tasked with creating an executive briefing on possible threats to the organization. Which of the following will produce the data needed for the briefing? A. Firewall logs B. Indicators of compromise C. Risk assessment D. Access control lists Answer: B CompTIA CySA+ CS0-003 Practice Exam 6. A company is in the process of implementing a vulnerability management program, and there are concerns about granting the security team access to sensitive data. Which of the following scanning methods can be implemented to reduce the access to systems while providing the most accurate vulnerability scan results? A. Credentialed network scanning B. Passive scanning C. Agent-based scanning D. Dynamic scanning Answer: C CompTIA CySA+ CS0-003 Practice Exam 7. The Chief Information Security Officer is directing a new program to reduce attack surface risks and threats as part of a zero trust approach. The IT security team is required to come up with priorities for the program. Which of the following is the best priority based on common attack frameworks? A. Reduce the administrator and privileged access accounts B. Employ a network-based IDS C. Conduct thorough incident response D. Enable SSO to enterprise applications Answer: A CompTIA CySA+ CS0-003 Practice Exam 8. A security analyst who works in the SOC receives a new requirement to monitor for indicators of compromise. Which of the following is the first action the analyst should take in this situation? A. Develop a dashboard to track the indicators of compromise. B. Develop a query to search for the indicators of compromise. C. Develop a new signature to alert on the indicators of compromise. D. Develop a new signature to block the indicators of compromise. Answer: B CompTIA CySA+ CS0-003 Practice Exam 9. A cybersecurity analyst is concerned about attacks that use advanced evasion techniques. Which of the following would best mitigate such attacks? A. Keeping IPS rules up to date B. Installing a proxy server C. Applying network segmentation D. Updating the antivirus software Answer: A CompTIA CySA+ CS0-003 Practice Exam 10. A security analyst discovers the accounting department is hosting an accounts receivable form on a public document service. Anyone with the link can access it. Which of the following threats applies to this situation? A. Potential data loss to external users B. Loss of public/private key management C. Cloud-based authentication attack D. Identification and authentication failures Answer: A