Labor Day Flash Sale: 30% off Today Only!

57 minutes, 21 seconds remaining!

CompTIA SecurityX CAS-005 (V5) Practice Question

A security analyst is investigating a suspicious executable file recovered from a user's workstation. Initial static analysis reveals that the file is heavily obfuscated and contains very few readable strings, making it difficult to determine its purpose. Which of the following is the MOST effective next step to determine the file's true behavior and potential maliciousness?

  • Perform a full disassembly of the executable to manually trace the code execution path.

  • Submit the file's hash to online malware repositories to check for known indicators of compromise (IoCs).

  • Execute the file within a controlled, isolated sandbox environment to perform dynamic analysis.

  • Analyze the system's standard event logs for any anomalies that occurred after the file was downloaded.

CompTIA SecurityX CAS-005 (V5)
Security Operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

SAVE $64
$529.00 $465.00
SAVE $70
CompTIA SecurityX Voucher with Retake
v5 / CAS-005
Includes Retake
$578.00 $508.00
Bash, the Crucial Exams Chat Bot
AI Bot