00:15:00

CompTIA SecurityX Practice Test (CAS-005)

Use the form below to configure your CompTIA SecurityX Practice Test (CAS-005). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA SecurityX CAS-005
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA SecurityX CAS-005 Information

What is the CompTIA SecurityX Certification?

CompTIA SecurityX is a high-level cybersecurity certification. It used to be called CASP+ but was renamed in 2024 when the CAS-005 exam was released. This certification proves that you can design and manage secure systems in big, complex businesses.

Who is SecurityX For?

SecurityX is meant for advanced IT professionals. You should have at least 10 years of general IT experience and 5 years working directly with cybersecurity. If you're a senior engineer, architect, or lead, this certification is a good fit for you.

What Topics Does It Cover?

The SecurityX exam tests your skills in four main areas:

  • Security Architecture: Building secure systems and networks
  • Security Operations: Handling incidents and keeping systems running safely
  • Governance, Risk, and Compliance: Following laws and managing risk
  • Security Engineering and Cryptography: Using encryption and secure tools

What Is the Exam Like?

  • Questions: Up to 90 questions
  • Types: Multiple-choice and performance-based (real-world problems)
  • Time: 165 minutes
  • Languages: English, Japanese, and Thai
  • Passing Score: Pass/Fail (no number score is shown)

You’ll find out if you passed right after finishing the test.

Why Take the SecurityX Exam?

SecurityX shows that you can handle high-level security work. Many jobs, especially in the government or large companies, ask for this type of certification. It’s also approved by the U.S. Department of Defense (DoD 8140.03M).

Is There a Prerequisite?

There’s no required course or other exam before SecurityX, but CompTIA strongly recommends that you have 10 years in IT and 5 years in security. Without this experience, the exam may be too hard.

Should I take the SecurityX exam?

If you're already working in cybersecurity and want to prove your skills, SecurityX is a great choice. It shows that you’re ready to lead, solve complex problems, and keep organizations secure.

Free CompTIA SecurityX CAS-005 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Governance, Risk, and Compliance
    Security Architecture
    Security Engineering
    Security Operations
Question 1 of 15

A retailer plans to serve a new region and gather personal data to tailor promotions, with potential sharing of details to outside vendors. Which approach best shows care for keeping individuals informed about data collection practices?

  • Use a procedure to address inquiries about data collection and respond in a timely manner

  • Store customer details for archival purposes without reviewing them for removal

  • Hold off on explaining data practices until regional operations begin

  • Send a notification if data handling methods shift but provide no other updates

Question 2 of 15

A manufacturing company needs to gather logs from specialized controllers and other devices into a unified environment for threat analysis. Some logs contain sensitive data like equipment parameters and login tokens. Which approach best protects these combined records from unauthorized disclosure while allowing analysts to review them together?

  • Place logs in a shared repository with open read access for operational convenience

  • Use manual file transfers and merges in a shared folder governed by file permissions

  • Store logs in separate local storages without encryption for simpler retrieval

  • Collect logs in a central system with encryption and restricted queries

Question 3 of 15

A thorough review of prospective vendors across different regions is advised to avoid legal complications that can result from failing local regulations and contractual obligations.

  • False

  • True

Question 4 of 15

An organization has flagged a web link from a recent email and wants to check if it is associated with malicious activity by gathering publicly available information. Which approach offers a thorough assessment?

  • Search phone directories to find a listed owner and verify their contact details

  • Scan a single website for references to the flagged link

  • Check internal firewall reports to see if the link was ever accessed

  • Use a multi-source platform that combines threat reports and archived postings from various communities

Question 5 of 15

A company plans to add a modern authentication service. The team must connect the service to an older directory used by a partner, without major rewrites. Which method best promotes synergy among these environments?

  • Replace existing directories with the new platform

  • Develop a data encryption process tailored to the new service

  • Replicate accounts by synchronizing records

  • Set up a gateway that translates credentials for both environments

Question 6 of 15

A company seeks to enhance its production infrastructure and needs to determine how a short-term outage could impact revenue. Leadership wants to prioritize investment based on clear financial consequences. Which solution provides the most accurate measurement of direct financial impact?

  • Conduct interviews with department leaders to gather opinions on brand damage

  • Follow external guidelines to set spending levels for the entire remediation effort

  • Adopt a category-based approach with severity labels for each hazard

  • Estimate the potential revenue gap, staff expenses, and overhead costs for a numeric calculation

Question 7 of 15

A honeynet is a collection of decoy hosts designed to observe unauthorized intrusions without exposing actual production devices.

  • False

  • True

Question 8 of 15

During a routine assessment, logs reveal repeated efforts to scan RAM on a user workstation for tokens. The attacker aims to gather account information to break into other systems. Which approach are they using?

  • Planting malicious instructions in a background service

  • Injecting harmful content into a legitimate update process

  • Overriding a driver to gain elevated privileges

  • Acquiring ephemeral session data from active logins

Question 9 of 15

A company wants to protect sensitive information when it is transferred between different parts of its infrastructure. Which measure is the BEST choice to maintain confidentiality if attackers monitor the traffic?

  • Establish an encrypted tunnel that periodically generates new session keys

  • Use a shared secret for transfers and implement an access list on each node

  • Stop transmissions until an assessment engine finishes scanning each packet

  • Rely on open connections and log activities for post-event detection

Question 10 of 15

During a routine investigation, a security team discovers that an employee is running a series of scanners against various hosts. Which method discovers these unauthorized probes most effectively?

  • Subscribing to a threat intelligence platform to track external hazards

  • Observing external domain name records for unusual requests

  • Deploying a decoy server that appears to host valuable services

  • Collecting and reviewing logs from external web servers for unusual connections

Question 11 of 15

Which approach is most likely to unify security measures across multiple environments?

  • Adopting a consistent reference from an external control library

  • Creating separate security policies for every location

  • Tuning security awareness sessions for each division

  • Building an internal cryptosystem from scratch

Question 12 of 15

An Industrial Control System environment is using a unique microcontroller with minimal memory. The device cannot support new updates, yet it is essential for operations. The security team wants to reduce external exposure. Which approach best preserves operational requirements while reducing unauthorized access attempts?

  • Swap out the device with equivalent hardware following each detected issue

  • Disable monitoring on the device to reduce network demands

  • Continue to push patches frequently to address potential weaknesses

  • Use isolated network segmentation for the device to limit potential infiltration

Question 13 of 15

Which technique helps confirm that a software executable has not been altered by an unknown party and is from a valid publisher?

  • Attaching a digital signature to the executable with a secret key and verifying it with a related public key

  • Restricting the executable behind portal defenses for network connections

  • Protecting the executable with a passphrase before it is sent

  • Encrypting the executable with system-level disk protection mechanisms

Question 14 of 15

An organization must store confidential items on-site to satisfy mandatory compliance rules. Which measure is best to ensure these remain safe from unauthorized attempts?

  • A shared network folder that is protected by a single passcode

  • A portable software-based vault stored on general-purpose systems

  • Individual containers residing on employee devices for quick local access

  • Dedicated hardware that prevents direct manipulation by unauthorized users

Question 15 of 15

An analyst is reviewing multiple warnings from a network aggregator. The aggregator logs suspicious connections from different endpoints and services. One endpoint hosts sensitive customer records. Which approach ensures more attention is given to events that pose a larger risk, based on their potential harm?

  • Concentrate on the sources generating the greatest number of alerts first

  • Filter by severity and potential harm, giving priority to endpoints hosting confidential information

  • Pick alerts randomly for review to ensure equal attention is given to each potential threat

  • Investigate warnings in chronological order, starting with the oldest alerts