CompTIA SecurityX Certification - (CAS-005) Logo
CompTIA Logo

CompTIA SecurityX Certification - (CAS-005) Exam Questions

520

Total Questions

SEP
2025

Last Updated

1st

1st Try Guaranteed

Expert Verified

Experts Verified

Question 1 Multiple Choice

Which of the following will an adversary do during the reconnaissance phase of the Lockheed Martin kill chain? (SELECT THREE)

Question 2 Single Choice

A company is implementing a Zero Trust architecture with continuous authorization for its remote workforce. To enhance security, the organization wants to monitor user activity and dynamically adjust access permissions based on detected risks during a session. Which of the following components is most critical for enabling this functionality?

Question 3 Single Choice

Judith is conducting a vulnerability scan of her data center. She notices that a management interface for a virtualization platform is exposed to her vulnerability scanner. Which of the following networks should the hypervisor's management interface be exposed to ensure the best security of the virtualization platform?

Question 4 Single Choice

An organization is deploying a critical software application and wants to ensure the integrity and authenticity of its code. Which of the following practices best supports the verification of software provenance?

Question 5 Single Choice

XYZ Training wants to ensure that the operating system’s kernel has not been changed by malware. Which of the following endpoint security controls would ensure that the workstations perform a check of the operating system boot loader and kernel using stored digital certificates before loading up the installed operating system?

Question 6 Single Choice

You are notified by an external organization that an IP address associated with your company's email server has been sending spam emails requesting funds as part of a lottery collection scam. An investigation into the incident reveals the email account used was Connor from the sales department and that Connor's email account was only used from one workstation. You analyze Connor's workstation and discover several unknown processes running, but netflow analysis reveals no attempted lateral movement to other workstations on the network. Which containment strategy would be most effective to use in this scenario?

Question 7 Single Choice

You are working as a network administrator and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their laptop to that same switch port. Which of the following security features would BEST accomplish this goal?

Question 8 Single Choice

XYZ Training is concerned with the possibility of employees accessing another user's workstation in secured areas without their permission. Which of the following would BEST be able to prevent this from happening?

Question 9 Single Choice

A third-party vendor has just released patches to resolve a major vulnerability. There are over 100 critical devices that need to be updated. What action should be taken to ensure the patch is installed with minimal downtime?

Question 10 Single Choice

You are planning an engagement with a new client. The client wants your penetration testers to target their web and email servers that are hosted in a screened subnet and are accessible to visitors over the Internet. Which target type best describes these targets?
Page: 1 / 52