CompTIA SecurityX CAS-005 Practice Question

While investigating unexplained restarts on a server, you discover that a malicious program is able to launch itself at boot without user intervention and hide from typical process monitoring. Which method is best for detecting and removing the hidden code?

  • Use a live memory analysis tool to check for suspicious processes and evaluate whether startup changes are legitimate

  • Collect real-time network flow logs and rely on signature-based scans for new patterns

  • Compare key system components against a clean reference and isolate unusual files for deeper analysis

  • Reboot on random intervals to disrupt malicious processes that remain active

CompTIA SecurityX CAS-005
Security Operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot