CompTIA CySA+ MCQs with Answers 2026

CompTIA CySA+ MCQs with Answers-featureimage-mcqstop

40+
MCQs Covered
4
Domains Covered
750
Pass Score
2026
Updated For

The CompTIA CySA+ (CS0-003) — Cybersecurity Analyst — is the intermediate cybersecurity certification that bridges Security+ and advanced certs like CASP+ and CISSP. It validates your ability to detect, analyze, and respond to cybersecurity threats using behavioral analytics, SIEM tools, threat intelligence, and incident response procedures. CySA+ is DoD 8140 approved and recognized as the industry standard for SOC analysts, threat analysts, and cybersecurity engineers. Whether you’re already Security+ certified or an aspiring SOC analyst — CySA+ proves you can defend organizations against real-world attacks.

Question 01

Which security tool aggregates and correlates log data from multiple sources across an organization to detect security threats in real time?

ASIEM (Security Information and Event Management) ✅
BIDS (Intrusion Detection System)
CDLP (Data Loss Prevention)
DWAF (Web Application Firewall)
💡 Explanation: A SIEM (Security Information and Event Management) collects, normalizes, and correlates log data from firewalls, servers, endpoints, applications, and network devices to detect anomalies and security incidents. Popular SIEMs include Splunk, Microsoft Sentinel, IBM QRadar, and Elastic SIEM. SIEM is the backbone of a Security Operations Center (SOC). IDS detects intrusions on a single network. DLP prevents data exfiltration. WAF protects web applications.

Question 02

A SOC analyst notices that a SIEM alert was generated, but after investigation, determines the activity was legitimate and not a real threat. What is this called?

AFalse positive ✅
BFalse negative
CTrue positive
DTrue negative
💡 Explanation: False positive = alert triggered but no real threat (benign activity flagged as malicious). False negative = real threat missed (attack not detected). True positive = real threat correctly detected. True negative = benign activity correctly ignored. SOC analysts spend significant time triaging false positives. Reducing false positives through SIEM tuning is a critical CySA+ skill.

Question 03

Which threat intelligence framework, developed by MITRE, provides a knowledge base of adversary tactics, techniques, and procedures (TTPs) used in real-world cyberattacks?

AMITRE ATT&CK ✅
BNIST Cybersecurity Framework
CISO 27001
DOWASP Top 10
💡 Explanation: MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a globally-accessible knowledge base that catalogs how attackers operate. It organizes TTPs into a matrix of tactics (Initial Access, Execution, Persistence, etc.) and techniques. SOC teams use ATT&CK to map detected behaviors to known attack patterns. NIST CSF is a risk management framework. ISO 27001 is a security management standard. OWASP focuses on web app vulnerabilities.

Question 04

Which type of threat intelligence includes specific indicators like malicious IP addresses, domain names, file hashes, and URLs that can be directly fed into security tools?

AStrategic threat intelligence
BTactical threat intelligence (Indicators of Compromise — IoCs) ✅
COperational threat intelligence
DPolitical threat intelligence
💡 Explanation: Tactical intelligence includes specific, actionable Indicators of Compromise (IoCs) — malicious IPs, domains, file hashes (MD5/SHA256), email addresses, and URLs. These can be loaded into SIEM rules, firewall blocklists, and endpoint detection tools. Strategic intelligence is high-level (trends, motivations — for executives). Operational intelligence provides details about specific attacks (who, when, how). Know all three levels for CySA+.



2

Vulnerability Management

Domain 2 — 30% of Exam

Question 05

Which scoring system rates the severity of software vulnerabilities on a scale of 0.0 to 10.0, with 10.0 being the most critical?

ACVSS (Common Vulnerability Scoring System) ✅
BCVE (Common Vulnerabilities and Exposures)
CCWE (Common Weakness Enumeration)
DNVD (National Vulnerability Database)
💡 Explanation: CVSS provides a numerical severity rating (0.0–10.0): None (0.0), Low (0.1–3.9), Medium (4.0–6.9), High (7.0–8.9), Critical (9.0–10.0). It considers attack vector, complexity, privileges required, user interaction, and impact on confidentiality/integrity/availability. CVE is a unique identifier for vulnerabilities (e.g., CVE-2024-1234). CWE categorizes software weakness types. NVD is NIST’s database of CVEs with CVSS scores.

Question 06

A vulnerability scan identifies a critical vulnerability on a production web server. The patch is available but requires a reboot during business hours. What should the analyst recommend FIRST?

AImmediately apply the patch regardless of downtime
BApply a compensating control (WAF rule, network segmentation) while scheduling the patch during a maintenance window ✅
CIgnore the vulnerability since it requires downtime
DRemove the web server from the network permanently
💡 Explanation: When a patch can’t be applied immediately, implement compensating controls to mitigate risk while scheduling the permanent fix. Compensating controls include: WAF rules, network segmentation, IPS signatures, disabling vulnerable features, or restricting access. Then apply the patch during a planned maintenance window. Never ignore critical vulnerabilities, and never cause unplanned outages without authorization. This balanced approach is what CySA+ tests.

Question 07

What is the difference between a vulnerability scan and a penetration test?

AThey are the same thing
BA vulnerability scan identifies known weaknesses; a penetration test actively exploits them to determine real-world impact ✅
CA penetration test is automated; a vulnerability scan is manual
DVulnerability scans are more invasive than penetration tests
💡 Explanation: Vulnerability scans are automated, non-invasive assessments that identify known vulnerabilities (missing patches, misconfigurations). Tools include Nessus, Qualys, and OpenVAS. Penetration tests are manual, authorized simulations where ethical hackers actively exploit vulnerabilities to assess real-world impact. Pen tests are more invasive and require explicit written authorization (Rules of Engagement). Scans are run frequently; pen tests are done periodically.

Question 08

Which type of vulnerability scan uses credentials to log into systems and provides more accurate and comprehensive results by checking internal configurations?

ANon-credentialed (unauthenticated) scan
BCredentialed (authenticated) scan ✅
CPassive scan
DExternal scan
💡 Explanation: Credentialed scans log into the target system using valid credentials, enabling deep inspection of installed software versions, registry settings, file permissions, and internal configurations. This produces far fewer false positives and identifies more vulnerabilities. Non-credentialed scans only see what’s externally visible (like an attacker would). Passive scans monitor network traffic without sending packets. Always prefer credentialed scans for accuracy.



3

Incident Response & Management

Domain 3 — 20% of Exam

Question 09

According to the NIST Incident Response lifecycle, what are the four phases of incident response in the correct order?

APreparation → Detection & Analysis → Containment, Eradication & Recovery → Post-Incident Activity ✅
BDetection → Containment → Preparation → Recovery
CAnalysis → Response → Remediation → Reporting
DIdentification → Notification → Investigation → Closure
💡 Explanation: NIST SP 800-61 defines four IR phases: (1) Preparation — policies, tools, training, communication plans; (2) Detection & Analysis — identify and investigate incidents using SIEM, logs, alerts; (3) Containment, Eradication & Recovery — isolate the threat, remove it, restore systems; (4) Post-Incident Activity — lessons learned, update procedures, documentation. This lifecycle is circular — post-incident improvements feed back into preparation.

Question 10

A compromised server has been identified in the network. What is the FIRST step the incident response team should take?

AWipe and reimage the server
BContain the threat by isolating the server from the network ✅
CNotify the CEO immediately
DRun an antivirus scan on all other servers
💡 Explanation: Containment is the first priority once a compromised system is identified — isolate it from the network to prevent lateral movement and further damage. Do NOT wipe the server first, as this destroys forensic evidence. Containment strategies include: network isolation (disconnect/VLAN), disabling accounts, blocking IPs at the firewall, or using endpoint detection to quarantine. After containment, proceed to eradication and recovery.

Question 11

During a forensic investigation, an analyst needs to create an exact bit-for-bit copy of a hard drive while preserving the original evidence. What should they create?

ABackup copy
BForensic image (disk image) ✅
CVM snapshot
DFile system copy
💡 Explanation: A forensic image (disk image) is a bit-for-bit exact copy of the entire drive, including deleted files, slack space, and unallocated space. Tools: FTK Imager, dd, EnCase. The image is verified using cryptographic hash values (MD5/SHA-256) to prove integrity. Analysts work on the image copy, never the original. Chain of custody must be maintained throughout. This is essential for legal admissibility of evidence.



4

Reporting & Communication

Domain 4 — 17% of Exam

Question 12

Which metric measures the average time it takes an organization to detect a security incident from the moment it occurs?

AMTTD (Mean Time to Detect) ✅
BMTTR (Mean Time to Respond)
CMTBF (Mean Time Between Failures)
DRPO (Recovery Point Objective)
💡 Explanation: MTTD measures how quickly threats are discovered — lower is better. MTTR (Mean Time to Respond/Remediate) measures how quickly the team responds and resolves incidents. MTTC (Mean Time to Contain) measures containment speed. These SOC metrics are reported to management to demonstrate security posture improvement. Industry average MTTD for breaches is ~200 days — the goal is to reduce this significantly.

Question 13

After resolving a major security incident, the incident response team conducts a meeting to review what happened, what went well, and what can be improved. What is this meeting called?

ALessons learned / Post-incident review ✅
BRisk assessment
CVulnerability scan
DPenetration test
💡 Explanation: The lessons learned (post-incident review / after-action report) is the final phase of incident response. It should occur within 1-2 weeks of the incident and include: what happened, timeline of events, what worked well, what failed, root cause analysis, and recommended improvements. Findings should be documented and fed back into the incident response plan, security policies, and training programs.

Question 14

Which security solution combines SIEM capabilities with automated incident response, orchestration, and threat intelligence into a single platform?

AEDR (Endpoint Detection and Response)
BSOAR (Security Orchestration, Automation, and Response) ✅
CNAC (Network Access Control)
DPAM (Privileged Access Management)
💡 Explanation: SOAR platforms automate repetitive SOC tasks — like blocking IPs, quarantining endpoints, and enriching alerts with threat intelligence — through pre-built playbooks. SOAR integrates with SIEM, firewalls, EDR, and ticketing systems. Popular SOAR tools: Splunk SOAR, Palo Alto XSOAR, IBM Resilient. EDR monitors endpoints specifically. NAC controls network access. PAM manages privileged accounts. SOAR is a key CySA+ concept.

🔄 NIST Incident Response Lifecycle

📋
Phase 1
Preparation
Policies, tools, training
🔍
Phase 2
Detection & Analysis
SIEM, logs, alerts
🛡️
Phase 3
Contain / Eradicate
Isolate, remove, restore
📝
Phase 4
Post-Incident
Lessons learned

🔧 Key Security Tools & Concepts

📊
SIEM
Log aggregation, correlation & alerting — SOC backbone
SOAR
Automated response playbooks & orchestration
🖥️
EDR / XDR
Endpoint detection & extended detection and response
🔍
MITRE ATT&CK
Adversary tactics, techniques & procedures (TTPs)
📋
CVSS
Vulnerability severity scoring (0.0–10.0)
🧪
IoCs
Indicators of Compromise — IPs, hashes, domains

⚖️ Vulnerability Scan vs Penetration Test

🔍 Vulnerability Scan
✦ Automated & non-invasive
✦ Identifies known vulnerabilities
✦ Run frequently (weekly/monthly)
✦ Tools: Nessus, Qualys, OpenVAS
✦ Credentialed = more accurate
🎯 Penetration Test
✦ Manual & invasive
✦ Actively exploits vulnerabilities
✦ Periodic (annual/biannual)
✦ Requires written authorization
✦ Proves real-world impact

📊 Key SOC Metrics

MTTD
Mean Time
to Detect
MTTR
Mean Time
to Respond
MTTC
Mean Time
to Contain
FPR
False Positive
Rate

💡 CompTIA CySA+ Exam Tips

1
Master SIEM Log Analysis — It’s Everywhere
Many questions present SIEM log output and ask you to identify the threat. Practice reading firewall logs, web server logs (Apache/IIS), authentication logs, and network capture data. Know how to identify brute force attacks, SQL injection attempts, port scans, and lateral movement from log entries.
2
Know the NIST IR Phases Cold
Preparation → Detection & Analysis → Containment, Eradication & Recovery → Post-Incident Activity. Many scenario questions ask “what should the analyst do FIRST?” The answer always follows this lifecycle. Containment before eradication. Evidence preservation before system restoration. Lessons learned after resolution.
3
Security+ Knowledge Is Your Foundation
CySA+ builds directly on Security+ concepts. Review: network protocols, attack types (phishing, XSS, SQL injection), encryption, PKI, and security frameworks. CySA+ goes deeper into detection, analysis, and response — but the foundational knowledge from Security+ is assumed and frequently tested. 

🎯 Keep Practicing — More MCQs Available!

We update our question bank regularly to match the latest CompTIA exam objectives

Frequently Asked Questions

How hard is the CompTIA CySA+ exam?

CySA+ (CS0-003) is considered a moderately difficult exam — harder than Security+ but easier than CASP+ or CISSP. It has a maximum of 85 questions (multiple-choice and performance-based) with a 165-minute time limit. The passing score is 750 out of 900. PBQs involve analyzing logs, SIEM output, and vulnerability scan results. Most candidates need 2-4 months of preparation with Security+ as a prerequisite.

CySA+ vs CEH — which should I get?

CySA+ focuses on defensive security — detection, analysis, and response (Blue Team). CEH focuses on offensive security — thinking and acting like an attacker (Red Team). CySA+ is better for SOC analysts and incident responders. CEH is better for penetration testers. Many cybersecurity professionals earn both. CySA+ is generally considered more practical, while CEH is more theoretical.

Is CySA+ worth it in 2026?

Absolutely — cybersecurity analyst roles are among the fastest-growing and highest-paying in IT. CySA+ is DoD 8140 approved, vendor-neutral, and validates the exact skills that SOC teams need: threat detection, vulnerability management, and incident response. Certified CySA+ professionals earn $85,000-$120,000 in the US. It’s the natural progression after Security+ and before CASP+ or CISSP.

Does CompTIA CySA+ expire?

Yes — CySA+ is valid for 3 years. To renew, earn 60 CEUs through continuing education, pass a higher-level CompTIA certification (CASP+), or retake the exam. CompTIA CertMaster CE is also available for online renewal. CySA+ also automatically renews Security+ and any lower certifications in the CompTIA pathway.

CompTIA CySA+ MCQs with Answers-infographic-mcqstop

About the author

MCQS TOP

Leave a Comment