CompTIA SecurityX CAS-005 (V5) Practice Question

An investigator finds that a suspicious binary reuses multiple coding structures and variable naming styles seen in a previous high-impact threat. Which tactic best supports drawing a reliable link between the new binary and the previously observed malicious code base?

  • Scheduling a sandbox run to observe the binary’s malicious actions

  • Matching binary hashes against antivirus signatures

  • Reviewing code stylometry to identify repeated programming conventions

  • Comparing event logs to see if both binaries triggered the same alert

CompTIA SecurityX CAS-005 (V5)
Security Operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

SAVE $64
$529.00 $465.00
SAVE $70
CompTIA SecurityX Voucher with Retake
v5 / CAS-005
Includes Retake
$578.00 $508.00
Bash, the Crucial Exams Chat Bot
AI Bot