CompTIA CySA+ (CS0-002) Certification Sample Questions

CySA+ Dumps, CS0-002 Dumps, CS0-002 PDF, CySA+ VCE, CompTIA CS0-002 VCE, CompTIA CySA Plus PDFThe purpose of this Sample Question Set is to provide you with information about the CompTIA Cybersecurity Analyst exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the CS0-002 certification test. To get familiar with real exam environment, we suggest you try our Sample CompTIA CySA+ Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual CompTIA Cybersecurity Analyst (CySA+) certification exam.

These sample questions are simple and basic questions that represent likeness to the real CompTIA CS0-002 exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium CompTIA CySA+ Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

CompTIA CS0-002 Sample Questions:

01. In the last six months, a company is seeing an increase in credential-harvesting attacks. The latest victim was the chief executive officer (CEO).
Which of the following countermeasures will render the attack ineffective?
a) Use a complex password according to the company policy.
b) Implement an intrusion-prevention system.
c) Isolate the CEO's computer in a higher security zone.
d) Implement multifactor authentication.
02. A cybersecurity analyst receives a phone call from an unknown person with the number blocked on the caller ID. After starting conversation, the caller begins to request sensitive information.
Which of the following techniques is being applied?
a) Social engineering
b) Phishing
c) Impersonation
d) War dialing
03. There are reports that hackers are using home thermostats to ping a national service provider without the provider's knowledge.
Which of the following attacks is occurring from these devices?
a) IoT
b) DDoS
04. A security analyst has been asked to review permissions on accounts within Active Directory to determine if they are appropriate to the user's role.
During this process, the analyst notices that a user from building maintenance is part of the Domain Admin group.
Which of the following does this indicate?
a) Cross-site scripting
b) Session hijack
c) Privilege escalation
d) Rootkit
05. Which of the following is the main benefit of sharing incident details with partner organizations or external trusted parties during the incident response process?
a) It facilitates releasing incident results, findings and resolution to the media and all appropriate government agencies
b) It shortens the incident life cycle by allowing others to document incident details and prepare reports.
c) It enhances the response process, as others may be able to recognize the observed behavior and provide valuable insight.
d) It allows the security analyst to defer incident-handling activities until all parties agree on how to proceed with analysis.
06. A security analyst wants to capture data flowing in and out of a network. Which of the following would MOST likely assist in achieving this goal?
a) Taking a screenshot.
b) Analyzing network traffic and logs.
c) Analyzing big data metadata.
d) Capturing system image.
07. Given the following logs:
Aug 18 11:00:57 comptia sshd[5657]: Failed password for root from port 38980 ssh2
Aug 18 23:08:26 comptia sshd[5768]: Failed password for root from port 38156 ssh2
Aug 18 23:08:30 comptia sshd[5770]: Failed password for admin from port 38556 ssh2
Aug 18 23:08:34 comptia sshd[5772]: Failed password for invalid user asterisk from port 38864 ssh2
Aug 18 23:08:38 comptia sshd[5774]: Failed password for invalid user sjobeck from port 39157 ssh2
Aug 18 23:08:42 comptia sshd[5776]: Failed password for root from port 39467 ssh2
Which of the following can be suspected?
a) An unauthorized user is trying to gain access from
b) An authorized user is trying to gain access from
c) An authorized user is trying to gain access from
d) An unauthorized user is trying to gain access from
08. The security analyst determined that an email containing a malicious attachment was sent to several employees within the company, and it was not stopped by any of the email filtering devices.
An incident was declared. During the investigation, it was determined that most users deleted the email, but one specific user executed the attachment.
Based on the details gathered, which of the following actions should the security analyst perform NEXT?
a) Obtain a copy of the email with the malicious attachment. Execute the file on another user's machine and observe the behavior. Document all findings.
b) Acquire a full backup of the affected machine. Reimage the machine and then restore from the full backup.
c) Take the affected machine off the network. Review local event logs looking for activity and processes related to unknown or unauthorized software.
d) Take possession of the machine. Apply the latest OS updates and firmware. Discuss the problem with the user and return the machine.
09. Which of the following tools should a cybersecurity analyst use to verify the integrity of a forensic image before and after an investigation?
a) strings
b) sha1sum
c) file
d) dd
e) gzip
10. After a security breach, it was discovered that the attacker had gained access to the network by using a brute-force attack against a service account with a password that was set to not expire, even though the account had a long, complex password. 
Which of the following could be used to prevent similar attacks from being successful in the future?
a) Complex password policies
b) Account lockout
c) Self-service password reset portal
d) Scheduled vulnerability scans


Question: 01
Answer: d
Question: 02
Answer: a
Question: 03
Answer: b
Question: 04
Answer: c
Question: 05
Answer: c
Question: 06
Answer: b
Question: 07
Answer: d
Question: 08
Answer: c
Question: 09
Answer: b
Question: 10
Answer: b

Note: For any error in CompTIA Cybersecurity Analyst (CySA+) (CS0-002) certification exam sample questions, please update us by writing an email on

Rating: 5 / 5 (58 votes)