

CompTIA SecurityX Certification - (CAS-005) Exam Questions
Question 1 Multiple Choice
Which of the following will an adversary do during the reconnaissance phase of the Lockheed Martin kill chain? (SELECT THREE)
Question 2 Single Choice
A company is implementing a Zero Trust architecture with continuous authorization for its remote workforce. To enhance security, the organization wants to monitor user activity and dynamically adjust access permissions based on detected risks during a session. Which of the following components is most critical for enabling this functionality?
Question 3 Single Choice
Judith is conducting a vulnerability scan of her data center. She notices that a management interface for a virtualization platform is exposed to her vulnerability scanner. Which of the following networks should the hypervisor's management interface be exposed to ensure the best security of the virtualization platform?
Question 4 Single Choice
An organization is deploying a critical software application and wants to ensure the integrity and authenticity of its code. Which of the following practices best supports the verification of software provenance?
Question 5 Single Choice
XYZ Training wants to ensure that the operating system’s kernel has not been changed by malware. Which of the following endpoint security controls would ensure that the workstations perform a check of the operating system boot loader and kernel using stored digital certificates before loading up the installed operating system?
Question 6 Single Choice
You are notified by an external organization that an IP address associated with your company's email server has been sending spam emails requesting funds as part of a lottery collection scam. An investigation into the incident reveals the email account used was Connor from the sales department and that Connor's email account was only used from one workstation. You analyze Connor's workstation and discover several unknown processes running, but netflow analysis reveals no attempted lateral movement to other workstations on the network. Which containment strategy would be most effective to use in this scenario?
Question 7 Single Choice
You are working as a network administrator and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their laptop to that same switch port. Which of the following security features would BEST accomplish this goal?
Question 8 Single Choice
XYZ Training is concerned with the possibility of employees accessing another user's workstation in secured areas without their permission. Which of the following would BEST be able to prevent this from happening?
Question 9 Single Choice
A third-party vendor has just released patches to resolve a major vulnerability. There are over 100 critical devices that need to be updated. What action should be taken to ensure the patch is installed with minimal downtime?
Question 10 Single Choice
You are planning an engagement with a new client. The client wants your penetration testers to target their web and email servers that are hosted in a screened subnet and are accessible to visitors over the Internet. Which target type best describes these targets?





