CompTIA · Free Practice Questions · Last reviewed May 2026
24 real exam-style questions organised by domain, each with the correct answer highlighted and a plain-English explanation of why it's right — and why the others are wrong.
A SIEM correlation rule for impossible travel is creating noise from VPN users. Which refinements should improve fidelity? (Choose two.)
Disable all identity alerts
Require a second signal such as new device, failed MFA, or mailbox rule creation
Combining identity anomalies reduces false positives.
Add trusted VPN egress ranges as named/known locations
Known corporate VPN egress can explain apparent travel.
Treat every VPN login as malicious
A SOC is onboarding endpoint logs into a SIEM. Which fields are most important for process-chain investigations? (Choose three.)
Parent process name and command line
Parent context shows how execution began.
Monitor refresh rate
User and host identifiers
Identity and asset context support scoping and response.
Child process command line
Command line arguments reveal suspicious execution behaviour.
A threat hunter suspects data exfiltration over HTTPS from a database server. Which data sources are most useful? (Choose two.)
Database audit logs showing queried objects and accounts
Database logs reveal whether sensitive data was accessed before transfer.
Printer toner status
Building temperature logs
NetFlow or proxy logs showing destination, volume, and timing
Flow/proxy data establishes transfer pattern and destination.
A SOC wants to reduce alert fatigue without missing confirmed malicious activity. Which actions are appropriate? (Choose two.)
Suppress alerts only with documented criteria and expiry
Time-bound suppression preserves governance.
Delete noisy detections permanently without review
Route every alert directly to executives
Add enrichment such as asset criticality and threat-intel context
Enrichment helps analysts prioritize real risk.
Which signals strengthen an alert for Kerberoasting activity? (Choose two.)
Unusual volume of TGS requests for many service principals
Kerberoasting often generates broad service-ticket requests.
Requests from a workstation that does not normally administer services
Abnormal source context increases suspicion.
A user changing their desktop wallpaper
Successful DHCP lease renewal
A detection engineer is writing a Sigma rule for suspicious rundll32 usage. Which fields should be included? (Choose two.)
Command line containing unusual DLL path or URL pattern
Command-line arguments distinguish abuse from normal use.
Desk phone extension
Laptop battery health
Image or process name matching rundll32.exe
The executed binary is central to the behaviour.
Want more Security Operations practice?
Practice this domainA vulnerability manager is prioritizing remediation. Which factors should influence risk-based priority? (Choose three.)
Internet exposure of the affected asset
External reachability increases likelihood of attack.
Alphabetical order of the CVE identifier
Known exploitation in the wild
Active exploitation increases urgency.
Business criticality of the affected service
Impact depends on the service supported by the asset.
Which conditions should push a vulnerability higher in the remediation queue? (Choose three.)
The asset supports a critical business process
Business impact increases priority.
The affected asset is internet-facing
External exposure increases attack opportunity.
Exploitation is observed in the wild
Active exploitation increases likelihood.
The CVE number is easy to remember
A scanner reports a critical issue on a network device. Which steps help validate the finding before closure? (Choose two.)
Suppress all network-device findings permanently
Close it because the device is expensive
Confirm the firmware or software version on the device
Version evidence verifies whether the vulnerable build is present.
Check vendor advisory applicability and configuration requirements
Some findings depend on enabled features or specific configurations.
Which items belong in a vulnerability exception request? (Choose three.)
Business justification for delayed remediation
Justification explains why normal remediation cannot occur.
A request to remove the asset from inventory
Expiration or review date
Time limits prevent exceptions becoming permanent by default.
Compensating controls
Controls reduce risk while the vulnerability remains.
A web application DAST scan reports stored XSS. Which evidence helps confirm exploitability? (Choose two.)
Payload persists and executes when another user views the affected page
Stored execution against another user validates impact.
The vulnerable parameter and output encoding context are identified
Context shows why the payload executes.
The server has a large disk
The application uses HTTPS
Which pipeline controls help prevent vulnerable dependencies reaching production? (Choose two.)
SBOM generation and review for released builds
SBOMs support dependency tracking and downstream risk review.
Manual badge checks at the office door
Software composition analysis with policy gates
SCA identifies dependency CVEs before deployment.
DNS MX record rotation
Want more Vulnerability Management practice?
Practice this domainA host is suspected of running fileless malware. Which artefacts should be collected quickly? (Choose two.)
Memory image or live response data
Fileless activity may exist mainly in memory.
Active network connections and running processes
Live state helps reconstruct behaviour.
A list of cafeteria purchases
A printed office map
A phishing incident led to credential theft. Which containment actions are appropriate? (Choose two.)
Reset affected credentials and revoke active sessions
This cuts off stolen-session and password access.
Delete all user mailboxes
Disable DNS for the entire company indefinitely
Search for mailbox rules or OAuth grants created after compromise
Attackers often create persistence in mailbox or app permissions.
Which actions belong in eradication after a confirmed web-shell compromise? (Choose two.)
Remove the web shell and close the exploited vulnerability
Both malicious artefact and entry path must be addressed.
Reconnect the server before checking persistence
Rotate credentials exposed to the compromised web server
Server compromise may expose application or service credentials.
Only block the analyst's IP address
What should be included in incident scoping for ransomware? (Choose three.)
Initial infected host and user context
The starting point helps identify root cause.
The brand of office chairs near the server room
Backup integrity and last known clean restore point
Recovery depends on clean backups.
Shares or systems touched by the compromised account
Access path shows spread.
A legal hold is issued during an investigation. Which actions support it? (Choose two.)
Preserve relevant logs, mailboxes, images, and tickets
Potential evidence must be retained.
Let each team decide informally what to delete
Purge audit logs to save storage
Suspend routine deletion for in-scope evidence
Retention controls prevent accidental loss.
A tabletop exercise reveals that no one knows who can approve public statements. What should be updated? (Choose two.)
The office seating plan only
Contact list and escalation matrix
Responders need current contacts and escalation paths.
The malware signature database only
Incident communication plan with named approval roles
Communication authority must be explicit.
Want more Incident Response and Management practice?
Practice this domainA CISO wants a concise incident update during active containment. Which elements should be included? (Choose three.)
Every raw log line collected so far
Containment actions completed and pending
Status shows risk reduction progress.
Known decisions or approvals needed
Escalation points help leadership act.
Current impact and affected services
Leadership needs business impact.
A vulnerability dashboard for executives should avoid raw technical overload. Which views are useful? (Choose two.)
A list of scanner process IDs
Unfiltered plugin-output text
Critical exposure trend by business service
Trends show whether risk is moving.
SLA compliance and overdue remediation by owner
This supports accountability.
When briefing legal and privacy teams after a suspected data exposure, which details matter? (Choose two.)
Data types and jurisdictions potentially affected
Notification duties depend on data and jurisdiction.
A complete list of unrelated server patches
Speculation about attacker identity without evidence
Timeline of discovery, containment, and known access
Timing and scope affect legal obligations.
A remediation report shows repeated SLA breaches by one business unit. Which recommendations are appropriate? (Choose two.)
Automatically accept all future risk permanently
Review ownership, resourcing, and change-window constraints
Persistent breaches often reflect operational blockers.
Hide the business unit from future reports
Create an agreed corrective action plan with dates
Action plans turn reporting into improvement.
Which items help make a post-incident report useful for technical teams? (Choose two.)
Generic motivational slogans
Unrelated financial forecasts
Root cause and exploited control gaps
Technical teams need to know what failed.
Specific remediation tasks with owners and validation steps
Actionable tasks enable closure.
A third-party supplier needs incident information to fix an integration. What should be shared? (Choose two.)
Internal blame discussions
Credentials for unrelated systems
Required remediation outcome and deadline
Clear expectations support accountability.
Relevant timeline and technical evidence tied to the integration
The supplier needs facts that support troubleshooting.
Want more Reporting and Communication practice?
Practice this domainThe CS0-003 exam has up to 85 questions and must be completed in 165 minutes. The passing score is 750/1000.
The CS0-003 exam uses multiple-choice, multiple-select, drag-and-drop, and exhibit-based questions. Exhibit questions show CLI output, network diagrams, or routing tables and ask you to interpret them — exactly the format Courseiva uses.
The exam covers 4 domains: Security Operations, Vulnerability Management, Incident Response and Management, Reporting and Communication. Questions are weighted by domain — higher-weight domains appear more on your actual exam.
No. These are original exam-style practice questions written against the official CompTIA CS0-003 exam objectives. They are not copied from the real exam. Courseiva focuses on genuine understanding, not memorisation of braindumps.
Courseiva tracks your accuracy per domain and routes you toward weak areas automatically. Free, no account required.