Labor Day Flash Sale: 30% off Today Only!

5 hours, 2 minutes remaining!
00:15:00

CompTIA SecurityX Practice Test (CAS-005)

Use the form below to configure your CompTIA SecurityX Practice Test (CAS-005). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA SecurityX CAS-005 (V5)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA SecurityX CAS-005 (V5) Information

What is the CompTIA SecurityX Certification?

CompTIA SecurityX is a high-level cybersecurity certification. It used to be called CASP+ but was renamed in 2024 when the CAS-005 exam was released. This certification proves that you can design and manage secure systems in big, complex businesses.

Who is SecurityX For?

SecurityX is meant for advanced IT professionals. You should have at least 10 years of general IT experience and 5 years working directly with cybersecurity. If you're a senior engineer, architect, or lead, this certification is a good fit for you.

What Topics Does It Cover?

The SecurityX exam tests your skills in four main areas:

  • Security Architecture: Building secure systems and networks
  • Security Operations: Handling incidents and keeping systems running safely
  • Governance, Risk, and Compliance: Following laws and managing risk
  • Security Engineering and Cryptography: Using encryption and secure tools

What Is the Exam Like?

  • Questions: Up to 90 questions
  • Types: Multiple-choice and performance-based (real-world problems)
  • Time: 165 minutes
  • Languages: English, Japanese, and Thai
  • Passing Score: Pass/Fail (no number score is shown)

You’ll find out if you passed right after finishing the test.

Why Take the SecurityX Exam?

SecurityX shows that you can handle high-level security work. Many jobs, especially in the government or large companies, ask for this type of certification. It’s also approved by the U.S. Department of Defense (DoD 8140.03M).

Is There a Prerequisite?

There’s no required course or other exam before SecurityX, but CompTIA strongly recommends that you have 10 years in IT and 5 years in security. Without this experience, the exam may be too hard.

Should I take the SecurityX exam?

If you're already working in cybersecurity and want to prove your skills, SecurityX is a great choice. It shows that you’re ready to lead, solve complex problems, and keep organizations secure.

Free CompTIA SecurityX CAS-005 (V5) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Governance, Risk, and Compliance
    Security Architecture
    Security Engineering
    Security Operations
Question 1 of 15

A company’s security team suspects an unauthorized application was launched on a workstation. They have limited data from central monitoring systems. Which method would uncover exact processes that ran, messages about user actions, and unexpected errors related to the event?

  • Checking external intelligence postings on suspicious actors

  • Examining local event data for recent process activity

  • Reliance on scanning results from an outside service

  • Gathering records from name resolution queries

Question 2 of 15

A specialized interface is widely used to read and write memory on many integrated circuits. A researcher wants to connect to a device to verify malicious instructions in firmware. Which approach addresses these requirements for hardware-level analysis and memory extraction?

  • Attaching a universal debugging cable over a general-purpose networking port

  • Emulating the processor architecture with a virtual machine and relying on software hooks for memory access

  • Enabling a hidden administrator function within the device’s production firmware

  • Utilizing a standard hardware interface to step through instructions and retrieve data from on-chip registers

Question 3 of 15

Which measure best identifies and prevents tampering in sensitive system logs?

  • Switch to a separate environment for daily backups

  • Restrict remote connections using firewall rules and monitoring

  • Enforce multifactor tokens for every administrative action

  • Apply cryptographic validation with a non-rewritable archival system

Question 4 of 15

A risk manager at a large multinational needs to demonstrate that internal safeguards for data handling meet external expectations. Which recognized method best positions the organization for a credible outside review?

  • Rely on a cloud provider’s alliance resource for best-practice recommendations

  • Adopt an overhead checklist tailored to organizational goals

  • Use a code scanner that flags data handling risks for the security team

  • Obtain an attestation known as SOC 2 to verify established controls

Question 5 of 15

An organization is introducing a new system to disrupt unwanted transmissions before they harm critical servers. Which strategy supports that goal and helps maintain continuous traffic flow?

  • An inline mechanism that inspects ongoing transmissions and blocks questionable packets

  • A firewall that places all sessions in a holding area before approving regular traffic

  • A detection process that generates alerts for malicious content but allows the data to pass

  • A passive scanner that reviews event logs and notifies administrators of anomalies afterward

Question 6 of 15

An enterprise operates more than 10,000 servers across on-premises data centers and multiple cloud providers. The security team needs to minimize configuration drift and speed up audit reporting while using the least manual effort. According to best practices for automated compliance tracking in modern GRC and configuration-management tools, which technique BEST meets these requirements?

  • Deploy a compliance automation engine that continuously compares every server's configuration to an approved baseline and produces real-time deviation reports.

  • Rely on end users to self-report any configuration changes that might affect compliance posture.

  • Disable verbose audit logging on servers to improve performance and reduce the size of compliance reports.

  • Schedule quarterly manual inspections where administrators log in to a sample of servers and record their findings in spreadsheets.

Question 7 of 15

An organization is deploying this solution to protect message contents at rest and in transit while confirming the sender’s identity. Which technique best addresses these objectives?

  • Using transport-level encryption for server-to-server connections

  • Message encryption and signing with unique certificate pairs assigned to each user

  • Publishing domain records that rely on public DNS to verify senders

  • Establishing short-lived symmetrical keys for each outgoing message and discarding them afterward

Question 8 of 15

During a security assessment, an organization noticed a flaw that allows external attackers to trigger unwanted actions on a web portal. They plan to measure its severity using a well-known scoring model. Which factor focuses on how the exploit is delivered, including whether it needs local access or can be initiated through a network?

  • Confidentiality Impact

  • Privileges Required

  • Attack Vector

  • Scope

Question 9 of 15

During a review of an application, a function is identified that can push user data beyond its allocated space. Which measure is most likely to prevent malicious exploits in this scenario?

  • Use a safe string-handling library that limits input size

  • Increase hashing strength for stored data

  • Configure an allow list for domain-based restrictions

  • Enable multi-factor authentication

Question 10 of 15

An organization uses a content delivery network to serve media files to a global audience. Which approach provides the highest level of confidentiality and integrity for transmitted data?

  • Transferring content between the user's device and the origin with consistent encryption

  • Implementing location-based routing to direct traffic to the nearest data center

  • Deactivating encryption at edge servers for performance gains, then re-encrypting afterward

  • Using cryptographic checksums for media files stored at remote endpoints

Question 11 of 15

Which strategy verifies that each user’s permissions are still appropriate on a regular timetable?

  • Confirming extended user privileges with a token

  • Reviewing user eligibility at designated intervals

  • Combining SSO with device posture checks

  • Setting up a second identity provider

Question 12 of 15

During an investigation of a network breach, a security team notices repeated infiltration methods and identical post-compromise activities. They suspect these patterns align with known adversarial steps. Which approach is the best for verifying the repeated adversary infiltration steps?

  • Activate a host-based system that flags suspicious user processes

  • Review firewall logs for repeated blocked traffic in the same channel

  • Deploy multiple decoy hosts to collect additional malicious behaviors

  • Map each recorded activity to a recognized sequence of adversarial phases to see how they repeat

Question 13 of 15

During a security review, short-term fixes are implemented repeatedly with no deeper investigation, causing vulnerabilities to reappear. Which approach reflects this repeated mistake?

  • Continuing to rely on an outdated application without addressing its underlying weaknesses

  • Mandating that all new features undergo code inspections before production

  • Gathering information from external advisories before major design changes

  • Maintaining a rolling schedule that addresses discovered vulnerabilities

Question 14 of 15

A security analyst is investigating a suspicious executable file recovered from a user's workstation. Initial static analysis reveals that the file is heavily obfuscated and contains very few readable strings, making it difficult to determine its purpose. Which of the following is the MOST effective next step to determine the file's true behavior and potential maliciousness?

  • Perform a full disassembly of the executable to manually trace the code execution path.

  • Submit the file's hash to online malware repositories to check for known indicators of compromise (IoCs).

  • Analyze the system's standard event logs for any anomalies that occurred after the file was downloaded.

  • Execute the file within a controlled, isolated sandbox environment to perform dynamic analysis.

Question 15 of 15

During a routine investigation, a security team discovers that an employee is running a series of scanners against various hosts. Which method discovers these unauthorized probes most effectively?

  • Subscribing to a threat intelligence platform to track external hazards

  • Deploying a decoy server that appears to host valuable services

  • Collecting and reviewing logs from external web servers for unusual connections

  • Observing external domain name records for unusual requests