Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CompTIA SecurityX Certification Exam

Last Update 15 hours ago Total Questions : 344

The CompTIA SecurityX Certification Exam content is now fully updated, with all current exam questions added 15 hours ago. Deciding to include CAS-005 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CAS-005 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CAS-005 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CompTIA SecurityX Certification Exam practice test comfortably within the allotted time.

Question # 61

A company wants to protect against the most common attacks and rapidly integrate with different programming languages. Which of the following technologies is most likely to meet this need?

A.

RASP

B.

Cloud-based IDE

C.

DAST

D.

NIPS

Question # 62

A security architect for a global organization with a distributed workforce recently received funding lo deploy a CASB solution Which of the following most likely explains the choice to use a proxy-based CASB?

A.

The capability to block unapproved applications and services is possible

B.

Privacy compliance obligations are bypassed when using a user-based deployment.

C.

Protecting and regularly rotating API secret keys requires a significant time commitment

D.

Corporate devices cannot receive certificates when not connected to on-premises devices

Question # 63

A Chief Information Security Officer (CISO) is concerned that a company ' s current data disposal procedures could result in data remanence. The company uses only SSDs. Which of the following would be the most secure way to dispose of the SSDs given the CISO ' s concern?

A.

Degaussing

B.

Overwriting

C.

Shredding

D.

Formatting

E.

Incinerating

Question # 64

A company wants to perform threat modeling on an internally developed, business-critical application. The Chief Information Security Officer (CISO) is most concerned that the application should maintain 99.999% availability and authorized users should only be able to gain access to data they are explicitly authorized to view. Which of the following threat-modeling frameworks directly addresses the CISO ' s concerns about this system?

A.

CAPEC

B.

STRIDE

C.

ATT & CK

D.

TAXII

Question # 65

An organization that performs real-time financial processing is implementing a new backup solution. Given the following business requirements:

The backup solution must reduce the risk of potential backup compromise.

The backup solution must be resilient to a ransomware attack.

The time to restore from backups is less important than backup data integrity.

Multiple copies of production data must be maintained.

Which of the following backup strategies best meets these requirements?

A.

Creating a secondary, immutable database and adding live data on a continuous basis

B.

Utilizing two connected storage arrays and ensuring the arrays constantly sync

C.

Enabling remote journaling on the databases to ensure real-time transactions are mirrored

D.

Setting up anti-tampering on the databases to ensure data cannot be changed unintentionally

Question # 66

A company is adopting microservice architecture in order to quickly remediate vulnerabilities and deploy to production. All of the microservices run on the same Linux platform. Significant time was spent updating the base OS before deploying code. Which of the following should the company do to make the process efficient?

A.

Use Terraform scripts while creating golden images

B.

Create a cron job to run apt-update every 30 days.

C.

Use snapshots to deploy code to existing compute instances.

D.

Deploy a centralized update server.

Question # 67

While reviewing recent modem reports, a security officer discovers that several employees were contacted by the same individual who impersonated a recruiter. Which of the following best describes this type of correlation?

A.

Spear-phishing campaign

B.

Threat modeling

C.

Red team assessment

D.

Attack pattern analysis

Question # 68

John Doe ' s email account was compromised. The attacker ' s access to John Doe ' s account was removed and MFA was implemented. The attacker convinced Joe Roe in the accounting department to pay a fraudulent invoice through email exchanges. A security analyst is reviewing the headers from the initial email that Joe Roe received:

Received: from 221.15.11.103 (221.15.11.103.mta.com [221.15.11.103])

by with esmtps (TLS 1.2)

Received-SPF: pass

Received: from 18.132.124.10 (18.132.124.10-internal.com [18.132.124.10])

by mx7sgwt-3S (Postfix) with ESMTPS id zRhQ22fmNnQCdys

DKIM-Signature: v=1; c=relaxed/relaxed; d=example.com;

s=default; t=1672873468;

h=To: Message-ID: Date: Content-Type: Subject: From: From: To: Cc: Subject;

To: jroe@example.com

Message-ID: _73/A4-32616-C36L8ZbYC4p

Date: Mon, 07 Apr 2025 +0000

Content-Type: multipart/alternative; boundary=

MIME-Version: 1.0

Reply-To: jdoe@exampl.com

Subject: FW: Invoice

From: jdoe@exampl.com

X-SpamProbability: 0.095349

Which of the following best explains how the attacker was able to get the invoice paid?

A.

The attacker guessed John Doe ' s password.

B.

The attacker registered a new domain.

C.

The attacker ' s emails did not use domain keys for verification.

D.

The email failed the sender policy framework check.

Question # 69

After an incident response exercise, a security administrator reviews the following table:

Which of the following should the administrator do to beat support rapid incident response in the future?

A.

Automate alerting to IT support for phone system outages.

B.

Enable dashboards for service status monitoring

C.

Send emails for failed log-In attempts on the public website

D.

Configure automated Isolation of human resources systems

Question # 70

An organization is deploying a new data lake that will centralize records from several applications. During the design phase, the security architect identifies the following requirements:

• The sensitivity levels of the data is different.

• The data must be accessed through stateless API calls after authentication.

• Different users will have access to different data sets.

Which of the following should the architect implement to best meet these requirements?

A.

Directory services

B.

802.1X with EAP-TLS

C.

OpenID Connect

D.

CASB

Go to page: