SBN

CySA+: Exam policies and appeal procedures

Introduction

Conducting exams effectively, efficiently and in line with regulations is a daunting task. CompTIA, the vendor of the CompTIA Cybersecurity Analyst (CySA+) certification, is committed to ensuring that its certification exams are valued and respected in the marketplace. 

To enhance the integrity of its CySA+ certification, CompTIA takes certain security measures and ensures that candidates strictly adhere to them. These security measures include CySA+ certification exam policies and CySA+ exam appeal procedures, which are also the topic of this article.

What do I need to know about CySA+ certification exam policies?

The following sections will take a deep dive into the details about CySA+ certification exam policies. The candidates must comply with these policies to avoid suspension or cancellation of his or her CySA+ exam.

Testing policies

CompTIA accommodates disabled candidates in accordance with the applicable law. The candidate can request accommodation on the Pearson VUE website, CompTIA’s testing partner. In addition to the English-speaking countries, the CySA+ exam is also available in non-English-speaking countries. Students can request a 30-minute time extension on the exam day.

Exam scoring is also regularly monitored by CompTIA to ensure the validity of its CySA+ exam results. In the event of aberrant or fraudulent test scores, CompTIA reserves the right to ask the suspicious candidate for a retest. 

The candidate must also allow his or her photograph to be taken by the test center administrator prior to testing for the highest level of security and authentication. Your photo will be printed on your score report.

Candidates can also avail themselves of a rescheduling policy to change his or her exam date. However, he or she must inform Pearson VUE at least 24 hours before his or her CySA+ exam appointment. Failing to do so will result in confiscation of the exam (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Fakhar Imam. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/Qh3-xNZD9Xc/