00:15:00

CompTIA SecurityX Practice Test (CAS-005)

Use the form below to configure your CompTIA SecurityX Practice Test (CAS-005). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA SecurityX CAS-005
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA SecurityX CAS-005 Information

What is the CompTIA SecurityX Certification?

CompTIA SecurityX is a high-level cybersecurity certification. It used to be called CASP+ but was renamed in 2024 when the CAS-005 exam was released. This certification proves that you can design and manage secure systems in big, complex businesses.

Who is SecurityX For?

SecurityX is meant for advanced IT professionals. You should have at least 10 years of general IT experience and 5 years working directly with cybersecurity. If you're a senior engineer, architect, or lead, this certification is a good fit for you.

What Topics Does It Cover?

The SecurityX exam tests your skills in four main areas:

  • Security Architecture: Building secure systems and networks
  • Security Operations: Handling incidents and keeping systems running safely
  • Governance, Risk, and Compliance: Following laws and managing risk
  • Security Engineering and Cryptography: Using encryption and secure tools

What Is the Exam Like?

  • Questions: Up to 90 questions
  • Types: Multiple-choice and performance-based (real-world problems)
  • Time: 165 minutes
  • Languages: English, Japanese, and Thai
  • Passing Score: Pass/Fail (no number score is shown)

You’ll find out if you passed right after finishing the test.

Why Take the SecurityX Exam?

SecurityX shows that you can handle high-level security work. Many jobs, especially in the government or large companies, ask for this type of certification. It’s also approved by the U.S. Department of Defense (DoD 8140.03M).

Is There a Prerequisite?

There’s no required course or other exam before SecurityX, but CompTIA strongly recommends that you have 10 years in IT and 5 years in security. Without this experience, the exam may be too hard.

Should I take the SecurityX exam?

If you're already working in cybersecurity and want to prove your skills, SecurityX is a great choice. It shows that you’re ready to lead, solve complex problems, and keep organizations secure.

Free CompTIA SecurityX CAS-005 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Governance, Risk, and Compliance
    Security Architecture
    Security Engineering
    Security Operations

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 15

A medical provider wants employees to follow a uniform approach for handling unusual messages. Which choice best promotes consistent methods while meeting organizational goals?

  • Empower individual teams to establish what works best for them and keep private instructions

  • Distribute recommended approaches and let groups interpret them in their local environment

  • Develop step-by-step guidelines that undergo recurring evaluations at group sessions

  • Provide a revision of guidelines that employees can access, updated based on new concerns

Question 2 of 15

An employee gets a call from someone claiming to represent technical support, demanding sign-in details to address a pressing service interruption. The employee wants to keep information secure. Which response helps avoid unauthorized access?

  • Send an alert to coworkers and keep speaking with the caller

  • Disclose partial login details to confirm the caller’s truthfulness

  • Consult internal phone records and contact the help desk for validation

  • Provide information if the caller claims an IT role

Question 3 of 15

Guidelines are mandated instructions that staff must follow.

  • False

  • True

Question 4 of 15

A manufacturing organization has experienced repeated attempts by outsiders impersonating internal users through email messages. Which action supports staff readiness to handle these attempts?

  • Add encryption to inbound messages to safeguard data in transit

  • Extend the data retention timeframe for email logs to preserve historical records

  • Designate a contact in the IT department responsible for investigating suspicious messages

  • Provide regular education sessions that cover how to identify unusual messages and notify designated staff

Question 5 of 15

Which approach is the strongest for ensuring consistent status updates across relevant groups during a security threat?

  • Rely on an internal group chat shared by key personnel to provide real-time event details

  • Designate one individual to deliver a compiled summary after the threat has been neutralized

  • Require each group to maintain progress reports in a separate workspace to keep tasks focused

  • Schedule occasional phone calls with each team after the crisis is resolved to collect all updates

Question 6 of 15

Following a recent merge, a manager discovers that employees are missing important notices about new safety procedures. Which action is most effective for addressing this oversight across departments?

  • Provide specialized workshops for leadership on cutting-edge cryptographic methods

  • Post a single message about revised practices on the lobby bulletin board

  • Create a formal schedule of announcements, interactive sessions, and refresher briefings

  • Instruct divisions to move older protocols into archival storage for future reference

Question 7 of 15

An organization needs to define official requirements for employees that address data handling, remote work guidelines, and passphrase rules. This document requires stakeholder approval and aligns with broad objectives. Which governance document is best suited for this situation?

  • An informal set of recommendations

  • A step-by-step process document

  • A comprehensive policy

  • A department-based requirement list

Question 8 of 15

Which of the following best describes the practice of delivering risk and incident details to the correct people in a standardized format?

  • Organized exchange of event summaries that increases awareness and fosters collaboration among relevant groups

  • Using multiple backup routines to prevent data loss in hybrid environments

  • Requiring strong authentication mechanisms for account protection

  • Identifying unauthorized access attempts through ongoing log analysis

Question 9 of 15

After a surge of phone impersonations seeking restricted data from staff, a security manager decides to educate employees on suspicious callers. Which measure addresses these incidents most effectively?

  • Host recurring sessions that demonstrate examples of false callers and reporting steps

  • Set a strict policy requiring periodic passphrase resets for external accounts

  • Restrict international dialing capability across all departmental lines

  • Deploy an inbound network scanner that flags potential social engineering attempts

Question 10 of 15

Which approach best reduces infiltration attempts communicated as official notices to employees?

  • Provide scheduled user sessions focused on detecting suspicious requests

  • Block external community platforms at the firewall

  • Disable filtering tools on incoming mail for easier system updates

  • Mandate daily password changes with fewer complexity requirements

Question 11 of 15

Which approach is most effective to define accountability, involvement, and awareness for newly updated security instructions across different departments?

  • Empower the technology group to manage the new instructions based on their expertise without further coordination

  • Mention the changes briefly during a general meeting and revert to daily functions without further planning

  • Email instructions to all employees, requesting that department heads finalize the revised document independently

  • Create a structured chart that states who is assigned each decision, who offers suggestions, and who is kept updated throughout the process

Question 12 of 15

Guidelines are considered mandatory requirements that come with no flexibility for adaptation.

  • False

  • True

Question 13 of 15

An individual requests details about their own data in the organization’s care. Which action best satisfies the individual’s rights while maintaining data security?

  • Share a range of relevant records from the network for review purposes

  • Confirm the requester’s identity and provide them with information from their records

  • Decline the request based on the need to protect sensitive internal data

  • Verify the requester’s identity, compile relevant records, and respond within the required timeframe

Question 14 of 15

Documents that detail required encryption methods for data at rest are treated as suggestions rather than enforceable directives.

  • True

  • False

Question 15 of 15

A cross-functional leadership team notices duplicated work among various security-related assignments. Which method provides the clearest structure on who handles each task, who offers input, who oversees final approval, and who should be kept updated?

  • Implement mandatory advanced encryption for all data at rest and in transit

  • Design a chart that outlines who leads, who approves, who advises, and who remains informed for each task

  • Schedule monthly presentations for all business units to leadership

  • Require employees to complete routine security training modules