Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CAS-005 CompTIA SecurityX Certification Exam Free Practice Exam Questions (2026 Updated)

Prepare effectively for your CompTIA CAS-005 CompTIA SecurityX Certification Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 6
Total 344 questions

After a penetration test on the internal network, the following report was generated:

Attack Target Result

Compromised host ADMIN01S.CORP.LOCAL Successful

Hash collected KRBTGT.CORP.LOCAL Successful

Hash collected SQLSV.CORP.LOCAL Successful

Pass the hash SQLSV.CORP.LOCAL Failed

Domain control CORP.LOCAL Successful

Which of the following should be recommended to remediate the attack?

A.

Deleting SQLSV

B.

Reimaging ADMIN01S

C.

Rotating KRBTGT password

D.

Resetting the local domain

A malicious actor exploited firmware vulnerabilities and used rootkits in an attack on an organization. After the organization recovered from the incident, an engineer needs to recommend a solution that reduces the likelihood of the same type of attack in the future. Which of the following is the most relevant solution?

A.

Enabling software integrity checks

B.

Installing self-encrypting drives

C.

Implementing measured boot

D.

Configuring host-based encryption

An organization currently has IDS, firewall, and DLP systems in place. The systems administrator needs to integrate the tools in the environment to reduce response time. Which of the following should the administrator use?

A.

SOAR

B.

CWPP

C.

XCCDF

D.

CMDB

A company updates itscloud-based services by saving infrastructure code in a remote repository. The code is automatically deployed into the development environment every time the code is saved lo the repository The developers express concern that the deployment often fails, citing minor code issues and occasional security control check failures in the development environment Which of the following should a security engineer recommend to reduce the deployment failures? (Select two).

A.

Software composition analysis

B.

Pre-commit code linting

C.

Repository branch protection

D.

Automated regression testing

E.

Code submit authorization workflow

F.

Pipeline compliance scanning

An organization is increasing its focus on training that addresses new social engineering and phishing attacks. Which of the following is the organization most concerned about?

A.

Meeting existing regulatory compliance

B.

Overreliance on AI support bots

C.

Generative AI tools increasing the quality of exploits

D.

Differential analysis using AI models

During a security assessment using an EDR solution, a security engineer generates the following report about the assets in the system:

Initial report:

Device | Type | EDR status | Infection Status

LN002 | Linux SE | Enabled (unmanaged) | Unknown

OWIN23 | Windows 7 | Enabled | Clean

OWIN29 | Windows 10 | Enabled (bypass) | Clean

MAC005 | Mac OS | Enabled | Clean

After five days:

Device | Type | EDR status | Infection Status

LN002 | Linux SE | Enabled (unmanaged) | Unknown

OWIN23 | Windows 7 | Enabled | Clean

OWIN29 | Windows 10 | Enabled (bypass) | Infected

MAC005 | Mac OS | Disabled | Clean

Which of the following most likely enabled the infection?

A.

OWIN23 uses a legacy version of Windows that is not supported by the EDR.

B.

LN002 was not supported by the EDR solution and propagates the RAT.

C.

OWIN29 ' s EDR has an unknown vulnerability that was exploited by the attacker.

D.

MAC005 spreads the malware through other hosts in the network.

After a company discovered a zero-day vulnerability in its VPN solution, the company plans to deploy cloud-hosted resources to replace its current on-premises systems. An engineer must find an appropriate solution to facilitate trusted connectivity. Which of the following capabilities is the most relevant?

A.

Container orchestration

B.

Microsegmentation

C.

Conditional access

D.

Secure access service edge

Which of the following best describes the challenges associated with widespread adoption of homomorphic encryption techniques?

A.

Incomplete mathematical primitives

B.

No use cases to drive adoption

C.

Quantum computers not yetcapable

D.

insufficient coprocessor support

An analyst needs to identify security event trends. The following is an excerpt from the SIEM:

Time

Alert

Source

Destination

20250407-UTC

Successful login from uncommon auth method in 24 hours

user1

AD-DC-01.corp

20250407-UTC

User accessed sensitive resources

user1

NFS-01/financial/share

20250407-UTC

Potential password spraying from host

10.10.15.100

iga-server.corp

20250407-UTC

Threshold exceeded user visiting high risk websites

user2

freehacks.com

20250407-UTC

Risk score exceeded for user

user1

bar.ru

20250407-UTC

NULL

NULL

NULL

Which of the following is the most practical way to identify trends?

A.

Decreasing the timing window for detections related to user1

B.

Incorporating audit log reduction

C.

Correlating based on source field in batches of time

D.

Disabling the noisy rules based on total alerts fired per day

An organization decides to move to a distributed workforce model. Several legacy systems exist on premises and cannot be migrated because of existing compliance requirements. However, all new systems are required to be cloud-based. Which of the following would best ensure network access security?

A.

Utilizing a VPN for all users who require legacy system access

B.

Shifting all legacy systems to the existing public cloud infrastructure

C.

Configuring an SDN to block malicious traffic to on-premises networks

D.

Deploying microsegmentation with a firewall acting as the core router

A systems administrator is working with clients to verify email-based services are performing properly. The administrator wants to have the email server digitally sign outbound emails using the organization ' s private key. Which of the following should the systems administrator configure?

A.

SPF

B.

DKIM

C.

DMARC

D.

TLS

A company plans to deploy a new online application that provides video training for its customers. As part of the design, the application must be:

• Fast for all users

• Available for users worldwide

• Protected against attacks

Which of the following are the best components the company should use to meet these requirements? (Select two).

A.

WAF

B.

IPS

C.

CDN

D.

SASE

E.

VPN

F.

CASB

During a gap assessment, an organization notes that OYOD usage is asignificant risk. The organization implemented administrative policies prohibiting BYOD usage However, the organization has not implemented technical controls to prevent the unauthorized use of BYOD assets when accessing the organization ' s resources. Which of the following solutions should the organization implement to b»« reduce the risk of OYOD devices? (Select two).

A.

Cloud 1AM to enforce the use of token based MFA

B.

Conditional access, to enforce user-to-device binding

C.

NAC, to enforce device configuration requirements

D.

PAM. to enforce local password policies

E.

SD-WAN. to enforce web content filtering through external proxies

F.

DLP, to enforce data protection capabilities

A senior security engineer flags me following log file snippet as hawing likely facilitated an attacker ' s lateral movement in a recent breach:

Which of the following solutions, if implemented, would mitigate the nsk of this issue reoccurnnp?

A.

Disabling DNS zone transfers

B.

Restricting DNS traffic to UDP ' W

C.

Implementing DNS masking on internal servers

D.

Permitting only clients from internal networks to query DNS

A security administrator is performing a gap assessment against a specific OS benchmark The benchmark requires the following configurations be applied to endpoints:

• Full disk encryption

* Host-based firewall

• Time synchronization

* Password policies

• Application allow listing

* Zero Trust application access

Which of the following solutions best addresses the requirements? (Select two).

A.

CASB

B.

SBoM

C.

SCAP

D.

SASE

E.

HIDS

John Doe ' s email account was compromised. The attacker ' s access to John Doe ' s account was removed and MFA was implemented. The attacker convinced Joe Roe in the accounting department to pay a fraudulent invoice through email exchanges. A security analyst is reviewing the headers from the initial email that Joe Roe received:

Received: from 221.15.11.103 (221.15.11.103.mta.com [221.15.11.103])

by with esmtps (TLS 1.2)

Received-SPF: pass

Received: from 18.132.124.10 (18.132.124.10-internal.com [18.132.124.10])

by mx7sgwt-3S (Postfix) with ESMTPS id zRhQ22fmNnQCdys

DKIM-Signature: v=1; c=relaxed/relaxed; d=example.com;

s=default; t=1672873468;

h=To: Message-ID: Date: Content-Type: Subject: From: From: To: Cc: Subject;

To: jroe@example.com

Message-ID: _73/A4-32616-C36L8ZbYC4p

Date: Mon, 07 Apr 2025 +0000

Content-Type: multipart/alternative; boundary=

MIME-Version: 1.0

Reply-To: jdoe@exampl.com

Subject: FW: Invoice

From: jdoe@exampl.com

X-SpamProbability: 0.095349

Which of the following best explains how the attacker was able to get the invoice paid?

A.

The attacker guessed John Doe ' s password.

B.

The attacker registered a new domain.

C.

The attacker ' s emails did not use domain keys for verification.

D.

The email failed the sender policy framework check.

Source code snippets for two separate malware samples are shown below:

Sample 1:

knockEmDown(String e) {

if(target.isAccessed()) {

target.toShell(e);

System.out.printIn(e.toString());

c2.sendTelemetry(target.hostname.toString + " is " + e.toString());

} else {

target.close();

}

}

Sample 2:

targetSys(address a) {

if(address.islpv4()) {

address.connect(1337);

address.keepAlive( " paranoid " );

String status = knockEmDown(address.current);

remote.sendC2(address.current + " is " + status);

} else {

throw Exception e;

}

}

Which of the following describes the most important observation about the two samples?

A.

Telemetry is first buffered and then transmitted in paranoid mode.

B.

The samples were probably written by the same developer.

C.

Both samples use IP connectivity for command and control.

D.

Sample 1 is the target agent while Sample 2 is the C2 server.

An organization found a significant vulnerability associated with a commonly used package in a variety of operating systems. The organization develops a registry of software dependencies to facilitate incident response activities. As part of the registry, the organization creates hashes of packages that have been formally vetted. Which of the following attack vectors does this registry address?

A.

Supply chain attack B. Cipher substitution attack C. Side-channel analysis D. On-path attack E. Pass-the-hash attack

A company migrated a critical workload from its data center to the cloud. The workload uses a very large data set that requires computational-intensive data processing. The business unit that uses the workload is projecting the following growth pattern:

• Storage requirements will double every six months.

• Computational requirements will fluctuate throughout the year.

• Average computational requirements will double every year.

Which of the following should the company do to address the business unit ' s requirements?

A.

Deploy a cloud-based CDN for storage and a load balancer for compute.

B.

Combine compute and storage in vertically autoscaling mode.

C.

Implement a load balancer for computing and storage resources.

D.

Plan for a horizontally scaling computing and storage infrastructure.

A company isolated its OT systems from other areas of the corporate network These systems are required to report usage information over the internet to the vendor Which oi the following b*st reduces the risk of compromise or sabotage ' (Select two).

A.

Implementing allow lists

B.

Monitoring network behavior

C.

Encrypting data at rest

D.

Performing boot Integrity checks

E.

Executing daily health checks

F.

Implementing a site-to-site IPSec VPN

Page: 3 / 6
Total 344 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved