CompTIA CASP+ Sample Questions

CompTIA SecurityX Practice Exam 10

CompTIA SecurityX CAS-005

1 / 10

An organization is required to implement controls that ensure the non-repudiation of transactions. Which cryptographic service is BEST suited to provide assurance that a specific user performed a particular action and cannot later deny it?

2 / 10

A penetration tester is performing a black-box assessment against an organization's external network. The tester identifies several open ports and attempts to enumerate services. Which phase of the penetration testing methodology is the tester currently in?

3 / 10

A security architect is designing a secure communication channel for IoT devices with extremely limited processing power and memory. Which cryptographic algorithm suite is typically preferred for its efficiency in resource-constrained environments while still providing strong security?

4 / 10

When evaluating supply chain risk for a critical software component, what is the MOST significant concern regarding a third-party vendor that has poor security practices and lacks transparent security audits?

5 / 10

A Chief Information Security Officer needs to implement a solution to prevent the execution of unauthorized applications on enterprise endpoints, including custom scripts and portable executables. Which endpoint security control is BEST suited for this?

6 / 10

An organization is experiencing a sophisticated attack where an attacker is using legitimate administrative tools and living-off-the-land techniques to evade detection. Which type of threat intelligence model focuses on the attacker's objectives and the sequence of their actions, rather than just isolated indicators?

7 / 10

A CASP+ candidate is designing a secure development pipeline that automatically performs security checks during code commits and build processes. Which tool or practice is specifically designed for this purpose within a CI/CD pipeline?

8 / 10

A security analyst is performing a security audit and identifies that critical application logs are stored on the same server as the application itself. Which security best practice is being violated, and what is the primary risk?

9 / 10

When designing a resilient enterprise, which architectural principle involves using different vendors, technologies, or implementations for critical components to prevent a single point of failure from a security vulnerability perspective?

10 / 10

A security engineer is implementing cryptographic controls for a new messaging system. The requirement is to ensure that even if the private key of a session is compromised in the future, past communications cannot be decrypted. Which property is MOST critical to achieve this?

Your score is

The average score is 0%

0%