00:15:00

CompTIA SecurityX Practice Test (CAS-005)

Use the form below to configure your CompTIA SecurityX Practice Test (CAS-005). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA SecurityX CAS-005
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA SecurityX CAS-005 Information

What is the CompTIA SecurityX Certification?

CompTIA SecurityX is a high-level cybersecurity certification. It used to be called CASP+ but was renamed in 2024 when the CAS-005 exam was released. This certification proves that you can design and manage secure systems in big, complex businesses.

Who is SecurityX For?

SecurityX is meant for advanced IT professionals. You should have at least 10 years of general IT experience and 5 years working directly with cybersecurity. If you're a senior engineer, architect, or lead, this certification is a good fit for you.

What Topics Does It Cover?

The SecurityX exam tests your skills in four main areas:

  • Security Architecture: Building secure systems and networks
  • Security Operations: Handling incidents and keeping systems running safely
  • Governance, Risk, and Compliance: Following laws and managing risk
  • Security Engineering and Cryptography: Using encryption and secure tools

What Is the Exam Like?

  • Questions: Up to 90 questions
  • Types: Multiple-choice and performance-based (real-world problems)
  • Time: 165 minutes
  • Languages: English, Japanese, and Thai
  • Passing Score: Pass/Fail (no number score is shown)

You’ll find out if you passed right after finishing the test.

Why Take the SecurityX Exam?

SecurityX shows that you can handle high-level security work. Many jobs, especially in the government or large companies, ask for this type of certification. It’s also approved by the U.S. Department of Defense (DoD 8140.03M).

Is There a Prerequisite?

There’s no required course or other exam before SecurityX, but CompTIA strongly recommends that you have 10 years in IT and 5 years in security. Without this experience, the exam may be too hard.

Should I take the SecurityX exam?

If you're already working in cybersecurity and want to prove your skills, SecurityX is a great choice. It shows that you’re ready to lead, solve complex problems, and keep organizations secure.

Free CompTIA SecurityX CAS-005 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Governance, Risk, and Compliance
    Security Architecture
    Security Engineering
    Security Operations
Question 1 of 15

Which approach is the MOST appropriate to combine security and networking in a single, cloud-based framework that supports a distributed trust model?

  • A perimeter-focused monitoring cluster

  • A consolidated edge security platform

  • A wide area networking tool with routing optimization features

  • A remote logging appliance for session management

Question 2 of 15

A large financial institution depends on an older system to process high‑volume payment data. The system is no longer supported by the vendor, and company leaders want to strengthen its login rules without disrupting normal operations. Which measure balances additional security with continued high‑throughput processing?

  • Allow remote administrators to bypass normal authentication sequences

  • Adopt enhanced oversight for high‑level accounts and thorough logging of access

  • Use one shared credential for all system technicians

  • Deactivate all encryption to speed up data transactions

Question 3 of 15

A software team is updating an application that transforms external data into complex structures for further processing. Logs show that unwanted commands are occasionally triggered after data is loaded. Which control reduces these unauthorized actions?

  • Keep messages in plain text format and rely on local logs

  • Postpone data checks until the last step of the process

  • Expand the set of default libraries that accept remote data

  • Apply thorough class-type restrictions during data handling

Question 4 of 15

An analyst observes that several endpoints have not generated new logs for the aggregator. The endpoints appear online, and no direct alerts have been raised. Which step would be the most effective method to restore comprehensive coverage for these endpoints?

  • Check agent functionality on each system and re-enroll them with the aggregator if missing

  • Use a script that periodically pings each system and collects a timing report

  • Reset all aggregator rules so they accept all inputs from every source again

  • Notify the help desk to wipe and reinstall the operating system on the affected endpoints

Question 5 of 15

Requiring a limited group to manage valuable system data hinders infiltration attempts by external adversaries

  • False

  • True

Question 6 of 15

Which method is best for restricting malicious connections that pivot through a public-facing host to access internal systems?

  • Hide internal error messages and anonymize responses

  • Focus on filtering cross-site scripting patterns in user-supplied parameters

  • Implement egress filtering and validate domain targets to block unauthorized requests

  • Disable all inbound connections from external networks

Question 7 of 15

Which approach best enforces strong security for ephemeral images in a continuous integration pipeline with minimal manual intervention?

  • Disable scanning or orchestration to reduce overhead for ephemeral environments

  • Require administrators to manually inspect ephemeral images before every deployment

  • Scan ephemeral images with an automated service during each build and replace any that fail checks

  • Use a shared base image and avoid rechecking ephemeral builds after initial creation

Question 8 of 15

A software team merges code from multiple feature branches every day. They want to reveal security gaps and functional problems as soon as new changes are introduced, and still maintain frequent releases. Which measure is the most effective in this situation?

  • Schedule reviews when problems appear in the live environment

  • Configure an automated process that runs tests and scanning whenever code is checked in

  • Rely on manual checks before the final release is shipped

  • Trigger a single vulnerability scan each evening

Question 9 of 15

Which approach is the most reliable method to ensure that revised hardware from a manufacturer remains compliant with security requirements?

  • Continuing to use the original tests for evaluating the new device

  • Accepting vendor assurances without requesting tangible artifacts or audits

  • Re-examining updated components with thorough testing and documented signoffs

  • Waiting for the next hardware refresh cycle before performing another check

Question 10 of 15

An organization integrates external text files into a training environment. Malicious actors embed harmful scripts in the incoming data, seeking to compromise the system. Which method is best for stopping these infiltration attempts?

  • Scan and sanitize incoming content prior to processing.

  • Depend on general training initiatives to handle dangerous content.

  • Add a single cleaning routine after the final build session.

  • Permit entries from addresses managed by recognized organizations.

Question 11 of 15

A company archives personal records on portable media. The security team needs a measure that will keep the records unreadable if that media is taken from the site. Which option offers the strongest defense against unauthorized viewing?

  • Restrict read permissions using local user accounts on the device

  • Include a hash function for passwords that control file access

  • Apply a digital signature to the records to confirm their authenticity

  • Use volume-level encryption with keys managed outside the storage hardware

Question 12 of 15

Which approach best reduces the chance of revealing personal records in system outputs after data is processed by advanced software?

  • Run temporary instances without consistent supervision

  • Use manipulated data that does not include real personal records

  • Rely on automated code scanning solutions before release

  • Implement cryptographic methods for stored and transmitted information

Question 13 of 15

A company plans to initiate a script whenever a particular system entry is generated to handle tasks without human assistance. Which method enhances automation efficiency in this scenario?

  • Utilizing a remote mechanism that starts its procedures after an additional step is confirmed

  • Scheduling a regular job that runs once every day to check for recent events

  • Running a script whenever someone presses a prompt in the monitoring tool

  • Setting up a script to launch when the system creates new entries

Question 14 of 15

An organization is deploying a new online platform expected to handle elevated user activity while safeguarding critical business functions. Which method fulfills these requirements?

  • Scale capacity to very high limits and avoid additional safeguards

  • Combine more than one environment for handling user volume and provide a defense layer to deter harmful interactions

  • Use a single environment and limit security measures to maintain a rapid response

  • Encrypt business information during transfer but reduce the number of environments to handle usage

Question 15 of 15

A factory is dependent on an older system built for an outdated operating environment that cannot be updated. The system meets important production needs but remains unpatched. Which measure reduces unauthorized access risk while allowing continued use?

  • Apply the latest patches from open-source providers

  • Enforce strict segmentation from the main network with filtered connections

  • Install new user accounts to detect unusual system activity

  • Switch the program to a modern system to work around support gaps