🔥 40% Off Crucial Exams Memberships — This Week Only

2 days, 13 hours remaining!
00:20:00

CompTIA SecurityX Practice Test (CAS-005)

Use the form below to configure your CompTIA SecurityX Practice Test (CAS-005). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA SecurityX CAS-005 (V5)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA SecurityX CAS-005 (V5) Information

What is the CompTIA SecurityX Certification?

CompTIA SecurityX is a high-level cybersecurity certification. It used to be called CASP+ but was renamed in 2024 when the CAS-005 exam was released. This certification proves that you can design and manage secure systems in big, complex businesses.

Who is SecurityX For?

SecurityX is meant for advanced IT professionals. You should have at least 10 years of general IT experience and 5 years working directly with cybersecurity. If you're a senior engineer, architect, or lead, this certification is a good fit for you.

What Topics Does It Cover?

The SecurityX exam tests your skills in four main areas:

  • Security Architecture: Building secure systems and networks
  • Security Operations: Handling incidents and keeping systems running safely
  • Governance, Risk, and Compliance: Following laws and managing risk
  • Security Engineering and Cryptography: Using encryption and secure tools

What Is the Exam Like?

  • Questions: Up to 90 questions
  • Types: Multiple-choice and performance-based (real-world problems)
  • Time: 165 minutes
  • Languages: English, Japanese, and Thai
  • Passing Score: Pass/Fail (no number score is shown)

You’ll find out if you passed right after finishing the test.

Why Take the SecurityX Exam?

SecurityX shows that you can handle high-level security work. Many jobs, especially in the government or large companies, ask for this type of certification. It’s also approved by the U.S. Department of Defense (DoD 8140.03M).

Is There a Prerequisite?

There’s no required course or other exam before SecurityX, but CompTIA strongly recommends that you have 10 years in IT and 5 years in security. Without this experience, the exam may be too hard.

Should I take the SecurityX exam?

If you're already working in cybersecurity and want to prove your skills, SecurityX is a great choice. It shows that you’re ready to lead, solve complex problems, and keep organizations secure.

CompTIA SecurityX CAS-005 (V5) Logo
  • Free CompTIA SecurityX CAS-005 (V5) Practice Test

  • 20 Questions
  • Unlimited time
  • Governance, Risk, and Compliance
    Security Architecture
    Security Engineering
    Security Operations
Question 1 of 20

An organization discovered older sensors that cannot be updated. Attackers have been taking advantage of weaknesses to reach other systems in the environment. Which approach addresses these vulnerable devices while balancing operational requirements?

  • Apply advanced user access controls on these devices to deter intrusions

  • Enable remote logging on the environment to capture threat attempts

  • Remove the older sensors in favor of modern hardware

  • Segment these devices using a dedicated VLAN with restricted pathways

Question 2 of 20

Which technique yields a higher level of consistency when restricting newly generated content across multiple repositories?

  • Use user-defined labels at each department boundary with periodic manual reviews

  • Retain inherited parameters throughout the lifecycle while considering updates from new metadata

  • Adopt an automated scanning system that assigns protective measures by analyzing and flagging critical details

  • Consolidate related content in a single location and organize usage by original source categories

Question 3 of 20

An organization reports excessive data arriving from many remote addresses, leading to frequent shutdowns. Which tactic best secures continued operations?

  • Filter incoming requests from a static file on each host

  • Increase allowable sessions at perimeter equipment

  • Use an external service that detects harmful flows

  • Add more servers with identical configurations

Question 4 of 20

A company deploys a secure device for advanced cryptography and physical tamper controls. They observe longer-than-expected processing times for numerous signing requests each day. Which method alleviates these delays while protecting the device’s key storage?

  • Enable parallel processing options on the secure device to handle cryptography simultaneously

  • Perform all cryptographic tasks on a server to offload workload from the secure device

  • Use unencrypted storage for private keys to reduce retrieval time

  • Increase the request time window so each operation finishes without error

Question 5 of 20

An investigator finds that a suspicious binary reuses multiple coding structures and variable naming styles seen in a previous high-impact threat. Which tactic best supports drawing a reliable link between the new binary and the previously observed malicious code base?

  • Scheduling a sandbox run to observe the binary’s malicious actions

  • Reviewing code stylometry to identify repeated programming conventions

  • Matching binary hashes against antivirus signatures

  • Comparing event logs to see if both binaries triggered the same alert

Question 6 of 20

A company plans to initiate a script whenever a particular system entry is generated to handle tasks without human assistance. Which method enhances automation efficiency in this scenario?

  • Scheduling a regular job that runs once every day to check for recent events

  • Setting up a script to launch when the system creates new entries

  • Utilizing a remote mechanism that starts its procedures after an additional step is confirmed

  • Running a script whenever someone presses a prompt in the monitoring tool

Question 7 of 20

An organization is deploying a new online platform expected to handle elevated user activity while safeguarding critical business functions. Which method fulfills these requirements?

  • Encrypt business information during transfer but reduce the number of environments to handle usage

  • Use a single environment and limit security measures to maintain a rapid response

  • Scale capacity to very high limits and avoid additional safeguards

  • Combine more than one environment for handling user volume and provide a defense layer to deter harmful interactions

Question 8 of 20

Which method ensures the secret is shared in a way that multiple participants must collaborate before locked information can be revealed?

  • Applying local encryption for participants with unique passcodes

  • Adopting a threshold-based algorithm that splits the secret into several portions

  • Storing the secret in a hardware security device

  • Implementing a passphrase policy among trusted staff

Question 9 of 20

A threat intelligence team discovered an unauthorized device gaining entry to a protected segment without a challenge. Logs show that this device bypassed policy-based checks, indicating no authentication request was triggered on the switch. Which solution best addresses the cause of the unauthorized entry?

  • Enable extended authentication negotiations on the trunk interface to enforce credential checks

  • Implement anomaly detection on the router that connects external traffic

  • Apply domain blocking rules through authoritative DNS filtering

  • Rotate and reissue the internal certificate authority credentials

Question 10 of 20

An investigator obtains a custom-built device suspected of storing code on its embedded components. Which approach is most likely to produce comprehensive details for an in-depth review?

  • Copying application logs and files to an external storage for offline inspection

  • Reinstalling the firmware before analyzing it with a software-based script

  • Attaching a hardware probe to the debug interface for a bit-by-bit memory acquisition

  • Running a memory dump tool from the operating system while the device is booted

Question 11 of 20

Which EU legislation places constraints on dominant online companies to encourage fair competition for smaller businesses?

  • General Data Protection Regulation

  • Cyber Resilience Act

  • Digital Markets Act

  • Payment Services Directive

Question 12 of 20

An analyst inspects a list controlling inbound traffic to a web server. Certain subnets cannot connect, even though they are intended to have access. Logs indicate a deny action for these subnets. The firewall and router settings have no visible errors. Which method best restores the expected connectivity?

  • Lower the range of transient ports used by the web server

  • Add a passive inspection line for tracking inbound requests

  • Delete existing rules and trust system defaults instead

  • Put the permit rule for those subnets ahead of the general deny line

Question 13 of 20

A company needs to obscure its traffic between remote offices without heavy certificate-based overhead. The team wants short-lived keys for each session so attackers cannot reuse captured data to access future sessions. Which arrangement achieves these goals?

  • Relying on one certificate to safeguard all data flows across the offices

  • Embedding a single long-term key in each endpoint

  • Applying a hash function to data before sending it

  • A method that generates short-lived keys for every session

Question 14 of 20

A manufacturing company’s financial leader notices a history of server failures that halt production lines. Which step best addresses the goal of minimizing production stoppages?

  • Set up parallel systems hosted in different locations with verified failover steps

  • Keep weekly archival sets secured in a locked cabinet

  • Install the latest hardware updates every quarter

  • Implement continuous traffic inspection on the perimeter

Question 15 of 20

An organization discovers passwords in application code stored on a public repository. Which action addresses the exposure while preserving existing commits for future reference?

  • Purge the repository but retain the existing secret for continuity

  • Scrub references from upcoming code commits and rotate the compromised secret

  • Delete past commits to remove sensitive references

  • Redact the latest commit so passwords are no longer visible

Question 16 of 20

A technology company has expanded its operations by adding cloud-based hosts while retaining equipment on-premises. They want a unified encryption approach that applies to data in both locations. Which action achieves consistent key handling and minimizes complexity?

  • Use a centralized system that manages encryption keys for both locations

  • Adopt separate local solutions so each site encrypts data independently

  • Exchange key updates manually through scheduled procedures at each site

  • Distribute new keys through email whenever a key rotation is planned

Question 17 of 20

A company maintains a widely used internal platform for managing customer information. The organization plans to integrate a new connection to a third-party marketing service. Which approach best addresses potential vulnerabilities introduced by this added functionality?

  • Stop outbound traffic to external services that are not maintained under direct oversight

  • Analyze all data flows and define additional trust boundaries where external services meet internal processes

  • Run an automated scan on source code after the new feature is fully deployed

  • Depend on firewall rules to control interactions between the platform and the marketing service

Question 18 of 20

When a sudden operational disruption threatens an organization’s stability, which methodology ensures rapid coordination of resources, decisive leadership, and timely communication to contain the situation as quickly as possible?

  • Configuration management

  • Vendor risk oversight

  • Asset inventory processes

  • Crisis management

Question 19 of 20

Which method helps detect minor alterations in a file by producing a new output if the content changes?

  • It reduces storage size by compressing content

  • It restricts users from modifying certain files or folders

  • It encodes information to conceal its contents from others

  • It processes the file with a specialized function that produces a new output for altered data

Question 20 of 20

A state-funded competitor is focusing on gathering confidential information from a pharmaceutical research center. Unusual outbound connections suggest that the competitor might be taking advantage of newly developed findings. Which action limits this covert activity while preserving global relationships?

  • Periodically check international partner addresses without adding any new network segregation measures.

  • Increase network logs and implement division of key systems to track unusual transmissions and constrain data routes.

  • Prevent employees from using internal secure data transport so malicious traffic is easier to spot.

  • Terminate all external links related to international research collaborators to stop external infiltration attempts.