Free CASP+ Practice Test

CompTIA SecurityX Practice Exam 9

CompTIA SecurityX CAS-005

1 / 10

An organization is considering a strategy to actively deceive and misdirect attackers once they have breached the network. Which security technology or strategy is designed for this purpose?

2 / 10

To comply with data residency requirements, a global organization must ensure that specific customer data originating from a certain country is stored and processed exclusively within that country's borders. Which security concern does this address?

3 / 10

A security architect is designing an enterprise-wide Identity and Access Management (IAM) solution. The goal is to provide a single login experience for users across multiple disparate applications, both on-premises and in the cloud. Which federated identity standard would MOST effectively achieve this?

4 / 10

An organization requires that all privileged access to production servers be performed through a jump server that records all sessions. Which control is this primarily an example of?

5 / 10

A security team is analyzing an incident that involved a new, previously unknown form of malware. To improve future detection, they need to generate a unique identifier for this malware based on its behavior rather than its signature. Which concept applies here?

6 / 10

Which secure design pattern advocates for segmenting an application into small, independent services, each running in its own isolated container, to limit the blast radius of a compromise?

7 / 10

A CASP+ candidate is designing a secure storage solution for highly sensitive, unchanging archival data. The data must be verifiable for integrity over long periods. Which type of storage and associated technology would be MOST appropriate?

8 / 10

When performing cloud forensics, which challenge is frequently encountered due to the dynamic and distributed nature of cloud environments and the control exercised by the CSP?

9 / 10

An organization needs to implement a system that ensures the integrity of downloaded software binaries by verifying their authenticity and that they have not been tampered with. Which cryptographic technique is MOST appropriate for this requirement?

10 / 10

A security incident involves a nation-state actor. Which type of threat intelligence source would provide the MOST specific and actionable information on this actor's Tactics, Techniques, and Procedures?

Your score is

The average score is 0%

0%