CompTIA SecurityX CAS-005 Practice Question

An organization finds a suspicious application on a server that might transmit data to unknown destinations. The team wants to observe the application's true capabilities under real execution conditions, but they need a safe way to monitor its actions. Which approach is most likely to reveal the application's runtime behavior while reducing disruption to the enterprise environment?

  • Turn off system security features and run the program to log unrestricted behavior

  • Use a review tool that examines the program's code structure for suspicious export functions

  • Launch the program in a dedicated environment and monitor system and network interactions

  • Start the program on a production server to gather event data from live logs

CompTIA SecurityX CAS-005
Security Operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot