CompTIA SecurityX CAS‑005 Practice Test

CompTIA SecurityX Practice Exam 1

CompTIA SecurityX CAS-005

1 / 30

An incident response team needs to automate malware detection across endpoints. Which tool integrates with Azure for this purpose?

2 / 30

A virtualization platform hosts critical workloads. Which security practice mitigates VM escape attacks?

3 / 30

A new regulation requires data residency in the EU. Which Azure feature ensures compliance during resource deployment?

4 / 30

A mobile app requires secure key storage. Which Azure service should you integrate to manage cryptographic keys?

5 / 30

A breach occurs, and logs show unusual activity from a privileged account. Which command retrieves detailed session info on a Linux server?

6 / 30

An enterprise deploys a cloud-based CRM. Which control ensures data integrity across hybrid endpoints?

7 / 30

A company must comply with GDPR and assess third-party vendor risks. Which document should you request to evaluate their data handling?

8 / 30

A server’s TLS configuration uses deprecated SHA-1 hashing. Which command verifies the current cipher suite?

9 / 30

A SOC detects a persistent threat bypassing signature-based IDS. Which tool should you use to analyze behavioral anomalies in network traffic?

10 / 30

A company is designing a hybrid network with on-premises servers and Azure resources. Which security control should you implement to enforce a zero-trust architecture?

11 / 30

Which protocol is often used to automate vulnerability scanning alerts and share threat indicators?

12 / 30

During a forensic investigation, which artifact is essential to preserve volatile memory before shutdown?

13 / 30

Which control helps ensure secure configuration drift prevention across infrastructure?

14 / 30

What is the role of a Software Bill of Materials (SBOM) in enterprise security?

15 / 30

Which cryptographic principle supports forward secrecy for secure communications?

16 / 30

What is a primary advantage of containerizing applications in terms of security architecture?

17 / 30

In a hybrid cloud-on-premises deployment, which model defines security responsibility boundaries between provider and customer?

18 / 30

Which approach is most effective for detecting insider threats or compromised privileged accounts?

19 / 30

What baseline security control should be implemented on endpoints to mitigate zero-day threats and unknown malware?

20 / 30

When deploying encryption for data at rest in storage arrays, which key-management practice is safest?

21 / 30

Which vulnerability-scoring standard helps prioritize remediation efforts across multiple systems?

22 / 30

Which automation tool type is appropriate for orchestrating patch deployment, security scans, and configuration compliance at scale?

23 / 30

Which security boundary concept helps minimize lateral movement risk within an enterprise network?

24 / 30

What is a critical benefit of using a Cloud Access Security Broker (CASB) in a multi-cloud environment?

25 / 30

Which cryptographic technique ensures that a stored file can’t be read if encryption keys are lost or revoked?

26 / 30

In an IaC (Infrastructure-as-Code) pipeline using Terraform, what practice helps prevent misconfiguration vulnerabilities before deployment?

27 / 30

Which cloud architecture control helps enforce separation of duties and least privilege across services?

28 / 30

When assessing a third-party vendor, what risk aspect must be evaluated under GRC principles?

29 / 30

Which framework is widely used to structure enterprise risk-management and governance practices in accordance with CAS-005 requirements?

30 / 30

In designing a corporate security program, what document type sets the high-level goals and roles before technical controls are applied?

Your score is

The average score is 79%

0%