comptia cas-005 practice test

CompTIA SecurityX

Last exam update: Nov 18 ,2025
Page 1 out of 20. Viewing questions 1-15 out of 290

Question 1

[Identity and Access Management (IAM)]
A security analyst is reviewing the following authentication logs:

Which of thefollowing should the analyst do first?

  • A. Disable User2's account
  • B. Disable User12's account
  • C. Disable User8's account
  • D. Disable User1's account
Mark Question:
Answer:

D


Explanation:
Based on the provided authentication logs, we observe that User1's accountexperienced multiple
failed login attempts within a very short time span (at 8:01:23 AM on 12/15). This pattern indicates a
potential brute-force attack or an attempt to gain unauthorized access. Here’s a breakdown of why
disabling User1's account is the appropriate first step:
Failed Login Attempts: The logs show that User1 had four consecutive failed login attempts:
VM01 at 8:01:23 AM
VM08 at 8:01:23 AM
VM01 at 8:01:23 AM
VM08 at 8:01:23 AM
Security Protocols and Best Practices: According to CompTIA Security+ guidelines, multiple failed
login attempts within a short timeframe should trigger an immediate response to prevent further
potential unauthorized access attempts. This typically involves temporarily disabling the account to
stop ongoing brute-force attacks.
Account Lockout Policy: Implementing an account lockout policy is a standard practice to thwart
brute-force attacks. Disabling User1's account will align with these best practices and prevent further
failed attempts, which might lead to successful unauthorized access if not addressed.
Reference:
CompTIA Security+ SY0-601 Study Guide by Mike Chapple and David Seidl
CompTIA Security+ Certification Exam Objectives
NIST Special Publication 800-63B: Digital Identity Guidelines
By addressing User1's account first, we effectively mitigate the immediate threat of a brute-force
attack, ensuring that further investigation can be conducted without the risk of unauthorized access
continuing during the investigation period.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

[Emerging Technologies and Threats]
Which of the following AI concerns is most adequately addressed by input sanitation?

  • A. Model inversion
  • B. Prompt Injection
  • C. Data poisoning
  • D. Non-explainable model
Mark Question:
Answer:

B


Explanation:
Input sanitation is a critical process in cybersecurity that involvesvalidating and cleaning data
provided by users to prevent malicious inputs from causing harm. In the context of AI concerns:
A . Model inversion involves an attacker inferring sensitive data from model outputs, typically
requiring sophisticated methods beyond just manipulating input data.
B . Prompt Injection is a form of attack where an adversary provides malicious input to manipulate
the behavior of AI models, particularly those dealing with natural language processing (NLP). Input
sanitation directly addresses this by ensuring that inputs are cleaned and validated to remove
potentially harmful commands or instructions that could alter the AI's behavior.
C . Data poisoning involves injecting malicious data into the training set to compromise the model.
While input sanitation can help by filtering out bad data, data poisoning is typically addressed
through robust data validation and monitoring during the model training phase, rather than real-
time input sanitation.
D . Non-explainable model refers to the lack of transparency in how AI models make decisions. This
concern is not addressed by input sanitation, as it relates more to model design and interpretability
techniques.
Input sanitation is most relevant and effective for preventing Prompt Injection attacks, where the
integrity of user inputs directly impacts the performance and security of AI models.
Reference:
CompTIA Security+ Study Guide
"Security of Machine Learning" by Battista Biggio, Blaine Nelson, and Pavel Laskov
OWASP (Open Web Application Security Project) guidelines on input validation and injection attacks
Top of Form
Bottom of Form

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

[Governance, Risk, and Compliance (GRC)]
A systems administrator wants to introduce a newly released feature for an internal application. The
administrate docs not want to test the feature in the production environment. Which of the following
locations is the best place to test the new feature?

  • A. Staging environment
  • B. Testing environment
  • C. CI/CO pipeline
  • D. Development environment
Mark Question:
Answer:

A


Explanation:
The best location to test a newly released feature for an internal application, without affecting the
production environment, is the staging environment. Here’s a detailed explanation:
Staging Environment: This environment closely mirrors the production environment in terms of
hardware, software, configurations, and settings. It serves as a final testing ground before deploying
changes to production. Testing in the staging environment ensures that the new feature will behave
as expected in the actual production setup.
Isolation fromProduction: The staging environment is isolated from production, which means any
issues arising from the new feature will not impact the live users or the integrity of the production
data. This aligns with best practices in change management and risk mitigation.
Realistic Testing: Since the staging environment replicates the production environment, it provides
realistic testing conditions. This helps in identifying potential issues that might not be apparent in a
development or testing environment, which often have different configurations and workloads.
Reference:
CompTIA Security+ SY0-601 Official Study Guide by Quentin Docter, Jon Buhagiar
NIST Special Publication 800-53: Security and Privacy Controls for Information Systems and
Organizations

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

[Security Operations]
A cybersecurity architect is reviewing the detection and monitoring capabilities for a global company
that recently made multiple acquisitions. The architect discovers that the acquired companies use
different vendors for detection and monitoring The architect's goal is to:
• Create a collection of use cases to help detect known threats
• Include those use cases in a centralized library for use across all of the companies
Which of the following is the best way to achieve this goal?

  • A. Sigma rules
  • B. Ariel Query Language
  • C. UBA rules and use cases
  • D. TAXII/STIX library
Mark Question:
Answer:

A


Explanation:
To create a collection of use cases for detecting known threats and include them in a centralized
library for use across multiple companies withdifferent vendors, Sigma rules are the best option.
Here’s why:
Vendor-Agnostic Format: Sigma rules are a generic and open standard for writing SIEM (Security
Information and Event Management) rules. They can be translated to specific query languages of
different SIEM systems, making them highly versatile and applicable across various platforms.
Centralized Rule Management: By using Sigma rules, the cybersecurity architect can create a
centralized library of detection rules that can be easily shared and implemented across different
detection and monitoring systems used by the acquired companies. This ensures consistency in
threat detection capabilities.
Ease of Use and Flexibility: Sigma provides a structured and straightforward format for defining
detection logic. It allows for the easy creation, modification, and sharing of rules, facilitating
collaboration and standardization across the organization.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

[Emerging Technologies and Threats]
After an incident occurred, a team reported during the lessons-learned review that the team.
* Lost important Information for further analysis.
* Did not utilize the chain of communication
* Did not follow the right steps for a proper response
Which of the following solutions is the best way to address these findinds?

  • A. Requestingbudget for better forensic tools to Improve technical capabilities for Incident response operations
  • B. Building playbooks for different scenarios and performing regular table-top exercises
  • C. Requiring professional incident response certifications tor each new team member
  • D. Publishing the incident response policy and enforcing it as part of the security awareness program
Mark Question:
Answer:

B


Explanation:
Building playbooks for different scenarios and performing regular table-top exercises directly
addresses the issues identified in the lessons-learned review. Here's why:
Lost important information for further analysis: Playbooks outline step-by-step procedures for
incident response, ensuring that team members know exactly what to document and how to
preserve evidence.
Did not utilize the chain of communication: Playbooks include communication protocols, specifying
who to notify and when. Regular table-top exercises reinforce these communication channels,
ensuring they are followed during actual incidents.
Did not follow the right steps for a proper response: Playbooks provide a clear sequence of actions to
be taken during various types of incidents, helping the team to respond in a structured and effective
manner. Regular exercises allow the team to practice these steps, identifying and correcting any
deviations from the plan.
Investing in better forensic tools (Option A) or requiring certifications (Option C) are also valuable,
but they do not directly address the procedural and communication gaps identified. Publishing and
enforcing the incident response policy (Option D) is important but not as practical and hands-on as
playbooks and exercises in ensuring the team is prepared.
Reference:
CompTIA Security+ Study Guide
NIST SP 800-61 Rev. 2, "Computer Security Incident Handling Guide"
SANS Institute, "Incident Handler's Handbook"

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

[Security Architecture]
After remote desktop capabilities were deployed in the environment, various vulnerabilities were
noticed.
• Exfiltration of intellectual property
• Unencrypted files
• Weak user passwords
Which of the following is the best way to mitigate these vulnerabilities? (Select two).

  • A. Implementing data loss prevention
  • B. Deploying file integrity monitoring
  • C. Restricting access to critical file services only
  • D. Deployingdirectory-based group policies
  • E. Enabling modem authentication that supports MFA
  • F. Implementing a version control system
  • G. Implementing a CMDB platform
Mark Question:
Answer:

A,E


Explanation:
To mitigate the identified vulnerabilities, the followingsolutions are most appropriate:
A . Implementing data loss prevention (DLP): DLP solutions help prevent the unauthorized transfer of
data outside the organization. This directly addresses the exfiltration of intellectual property by
monitoring, detecting, and blocking sensitive data transfers.
E . Enabling modern authentication that supports Multi-Factor Authentication (MFA): This
significantly enhances security by requiring additional verification methods beyond just passwords. It
addresses the issue of weak user passwords by making it much harder for unauthorized users to gain
access, even if they obtain the password.
Other options, while useful in specific contexts, do not address all the vulnerabilities mentioned:
B . Deploying file integrity monitoring helps detect changes to files but does not prevent data
exfiltration or address weak passwords.
C . Restricting access to critical file services improves security but is not comprehensive enough to
mitigate all identified vulnerabilities.
D . Deploying directory-based group policies can enforce security policies but might not directly
prevent data exfiltration or ensure strong authentication.
F . Implementing a version control system helps manage changes to files but is not a security
measure for preventing the identified vulnerabilities.
G . Implementing a CMDB platform (Configuration Management Database) helps manage IT assets
but does not address the specific security issues mentioned.
Reference:
CompTIA Security+ Study Guide
NIST SP 800-53 Rev. 5, "Security and Privacy Controls for Information Systems and Organizations"
CIS Controls, "Control 13: Data Protection" and "Control 16: Account Monitoring and Control"

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
G
50%
Discussions
vote your answer:
A
B
C
D
E
F
G
0 / 1000

Question 7

[Security Architecture]
A systems engineer is configuring a system baseline for servers that will provide email services. As
part of the architecture design, the engineer needs to improve performance of the systems by using
an access vector cache, facilitating mandatory access control and protecting against:
• Unauthorized reading and modification of data and programs
• Bypassing application security mechanisms
• Privilege escalation
• interference with other processes
Which of the following is the most appropriate for the engineer to deploy?

  • A. SELinux
  • B. Privileged access management
  • C. Self-encrypting disks
  • D. NIPS
Mark Question:
Answer:

A


Explanation:
The most appropriate solution for the systems engineer to deploy is SELinux (Security-Enhanced
Linux). Here's why:
Mandatory Access Control (MAC): SELinux enforces MAC policies, ensuring that only authorized
users and processes can access specific resources. This helps in preventing unauthorized reading and
modification of data and programs.
Access Vector Cache: SELinux utilizes an access vector cache (AVC) to improve performance. The AVC
caches access decisions, reducing the need for repetitive policy lookups and thus improving system
efficiency.
Security Mechanisms: SELinux provides a robust framework to enforce security policies and prevent
bypassing of application security mechanisms. It controls access based on defined policies, ensuring
that security measures are consistently applied.
Privilege Escalation and Process Interference: SELinux limits the ability of processes to escalate
privileges and interfere with each other by enforcing strict access controls. This containment helps in
isolating processes and minimizing the risk of privilege escalation attacks.
Reference:
CompTIA Security+ SY0-601 Study Guide by Mike Chapple and David Seidl
NSA's Guide to the Secure Configuration of Red Hat Enterprise Linux 5 (SELinux)
NIST Special Publication 800-53: Security and Privacy Controls for Information Systems and
Organizations

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

[Emerging Technologies and Threats]
A company lined an email service provider called my-email.com to deliver company emails. The
company stalled having several issues during the migration. A security engineer is troubleshooting
and observes the following configuration snippet:

Which of the following should the security engineer modify to fix the issue? (Select two).

  • A. The email CNAME record must be changed to a type A record pointing to 192.168.111
  • B. The TXT record must be Changed to "v=dmarc ip4:192.168.1.10 include:my-email.com -all"
  • C. The srvo1 A record must be changed to a type CNAME record pointing to the email server
  • D. The email CNAMErecord must be changed to a type A record pointing to 192.168.1.10
  • E. The TXT record must be changed to "v=dkim ip4:l92.168.1.11 include my-email.com -ell"
  • F. The TXT record must be Changed to "v=dkim ip4:192.168.1.10 include:email-all"
  • G. The srv01 A record must be changed to a type CNAME record pointing to the web01 server
Mark Question:
Answer:

B,D


Explanation:
The security engineer should modify the following to fix the email migration issues:
Email CNAME Record: The email CNAME record must be changed to a type A record pointing to
192.168.1.10. This is because CNAME records should not be used where an IP address (A record) is
required. Changing it to an A record ensures direct pointing to the correct IP.
TXT Record for DMARC: The TXT record must be changed to "v=dmarc ip4:192.168.1.10 include
com -all". This ensures proper configuration of DMARC (Domain-based Message Authentication,
Reporting & Conformance) to include the correct IP address and the email service provider domain.
DMARC: Ensuring the DMARC record is correctly set up helps in preventing email spoofing and
phishing, aligning with email security best practices.
Reference:
CompTIA Security+ SY0-601 Study Guide by Mike Chapple and David Seidl
RFC 7489: Domain-based Message Authentication, Reporting & Conformance (DMARC)
NIST Special Publication 800-45: Guidelines on Electronic Mail Security

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
G
50%
Discussions
vote your answer:
A
B
C
D
E
F
G
0 / 1000

Question 9

[Security Architecture]
Within a SCADA a business needs access to the historian server in order together metric about the
functionality of the environment. Which of the following actions should be taken to address this
requirement?

  • A. Isolating the historian server for connections only from The SCADA environment
  • B. Publishing the C$ share from SCADA to the enterprise
  • C. Deploying a screened subnet between 11 and SCADA
  • D. Adding the business workstations to the SCADA domain
Mark Question:
Answer:

A


Explanation:
The best action to address the requirement of accessing the historian server within a SCADA system
is to isolate the historian server for connections only from the SCADAenvironment. Here’s why:
Security and Isolation: Isolating the historian server ensures that only authorized devices within the
SCADA environment can connect to it. This minimizes the attack surface and protects sensitive data
from unauthorized access.
Access Control: By restricting access to the historian server to only SCADA devices, the organization
can better control and monitor interactions, ensuring that only legitimate queries and data retrievals
occur.
Best Practices for Critical Infrastructure: Following the principle of least privilege, isolating critical
components like the historian server is a standard practice in securing SCADA systems, reducing the
risk of cyberattacks.
Reference:
CompTIA Security+ SY0-601 Study Guide by Mike Chapple and David Seidl
NIST Special Publication 800-82: Guide to Industrial Control Systems (ICS) Security
ISA/IEC 62443 Standards: Security for Industrial Automation and Control Systems

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

[Security Architecture]
All organization is concerned about insider threats from employees who have individual access to
encrypted material. Which of the following techniques best addresses this issue?

  • A. SSO with MFA
  • B. Sating and hashing
  • C. Account federation with hardware tokens
  • D. SAE
  • E. Key splitting
Mark Question:
Answer:

E


Explanation:
The technique that best addresses the issue of insider threats from employees who have individual
access to encrypted material is key splitting. Here’s why:
Key Splitting: Key splitting involves dividing a cryptographic key into multiple parts anddistributing
these parts among different individuals or systems. This ensures that no single individual has
complete access to the key, thereby mitigating the risk of insider threats.
Increased Security: By requiring multiple parties to combine their key parts to access encrypted
material, key splitting provides an additional layer of security. This approach is particularly useful in
environments where sensitive data needs to be protected from unauthorized access by insiders.
Compliance and Best Practices: Key splitting aligns with best practices and regulatory requirements
for handling sensitive information, ensuring that access is tightly controlled and monitored.
Reference:
CompTIA Security+ SY0-601 Study Guide by Mike Chapple and David Seidl
NIST Special Publication 800-57: Recommendation for Key Management
ISO/IEC 27002:2013: Information Technology - Security Techniques - Code of Practice for Information
Security Controls
By employing key splitting, organizations can effectively reduce the risk ofinsider threats and
enhance the overall security of encrypted material.

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 11

[Security Architecture]
A vulnerability can on a web server identified the following:

Which of the following actions would most likely eliminate on path decryption attacks? (Select two).

  • A. Disallowing cipher suites that use ephemeral modes of operation for key agreement
  • B. Removing support for CBC-based key exchange and signing algorithms
  • C. Adding TLS_ECDHE_ECDSA_WITH_AE3_256_GCMS_HA256
  • D. Implementing HIPS rules to identify and block BEAST attack attempts
  • E. Restricting cipher suites to only allow TLS_RSA_WITH_AES_128_CBC_SHA
  • F. Increasing the key length to 256 for TLS_RSA_WITH_AES_128_CBC_SHA
Mark Question:
Answer:

B,C


Explanation:
On-path decryption attacks, such as BEAST (Browser Exploit Against SSL/TLS) and other related
vulnerabilities, often exploit weaknesses in the implementation of CBC (Cipher Block Chaining)
mode. To mitigate these attacks, the following actions are recommended:
B . Removing support for CBC-based key exchange and signing algorithms: CBC mode is vulnerable to
certain attacks like BEAST. By removing support for CBC-based ciphers, you can eliminate one of the
primary vectors for these attacks. Instead, use modern cipher modes like GCM (Galois/Counter
Mode) which offer better security properties.
C . Adding TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA256: This cipher suite uses Elliptic Curve
Diffie-Hellman Ephemeral (ECDHE) for key exchange, which provides perfect forward secrecy. It also
uses AES in GCM mode, which is not susceptible to the same attacks as CBC. SHA-256 is a strong hash
function that ensures data integrity.
Reference:
CompTIA Security+ Study Guide
NIST SP 800-52 Rev. 2, "Guidelines for the Selection, Configuration, and Use of Transport Layer
Security (TLS) Implementations"
OWASP (Open Web Application Security Project) guidelines on cryptography and secure
communication

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 12

[Security Operations]
The identity and access management team is sending logs to the SIEM for continuous monitoring.
The deployed log collector isforwarding logs to
the SIEM. However, only false positive alerts are being generated. Which of the following is the most
likely reason for the inaccurate alerts?

  • A. The compute resources are insufficient to support the SIEM
  • B. The SIEM indexes are 100 large
  • C. The data is not being properly parsed
  • D. The retention policy is not property configured
Mark Question:
Answer:

C


Explanation:
Proper parsing of data is crucial for the SIEM to accurately interpret and analyze the logs being
forwarded by the log collector. If the data is not parsed correctly, the SIEM may misinterpret the logs,
leading to false positives and inaccurate alerts. Ensuring that the log data is correctly parsed allows
the SIEM to correlate and analyze the logs effectively, which is essential for accurate alerting and
monitoring.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

[Security Operations]
An incident response team is analyzing malware and observes the following:
• Does not execute in a sandbox
• No network loCs
• No publicly known hash match
• No process injection method detected
Which of thefollowing should the team do next to proceed with further analysis?

  • A. Use an online vims analysis tool to analyze the sample
  • B. Check for an anti-virtualization code in the sample
  • C. Utilize a new deployed machine to run the sample.
  • D. Search oilier internal sources for a new sample.
Mark Question:
Answer:

B


Explanation:
Malware that does not execute in a sandbox environment often contains anti-analysis techniques,
such as anti-virtualization code. This code detects when the malware is running in a virtualized
environment and alters its behavior to avoid detection. Checking for anti-virtualization code is a
logical next step because:
It helps determine if the malware is designed to evade analysis tools.
Identifying such code can provide insights into themalware's behavior and intent.
This step can also inform further analysis methods, such as running the malware on physical
hardware.
Reference:
CompTIA Security+ Study Guide
SANS Institute, "Malware Analysis Techniques"
"Practical Malware Analysis" by Michael Sikorski and Andrew Honig

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

[Governance, Risk, and Compliance (GRC)]
Which of the following best explains the importance of determining organization risk appetite when
operating with a constrained budget?

  • A. Risk appetite directly impacts acceptance of high-impact low-likelihood events.
  • B. Organizational risk appetite varies from organization to organization
  • C. Budgetary pressure drives risk mitigation planning in all companies
  • D. Risk appetite directly influences which breaches are disclosed publicly
Mark Question:
Answer:

A


Explanation:
Risk appetite is the amount of risk an organization is willing to accept to achieve its objectives. When
operating with a constrained budget, understanding the organization's risk appetite is crucial
because:
It helps prioritize security investments based on the level of risk the organization is willing to
tolerate.
High-impact, low-likelihood events may be deemed acceptable if they fall within the organization's
risk appetite, allowing for budget allocation to other critical areas.
Properly understanding and defining risk appetite ensures that limited resources are used effectively
to manage risks that align with the organization's strategic goals.
Reference:
CompTIA Security+ Study Guide
NIST Risk Management Framework (RMF) guidelines
ISO 31000, "Risk Management – Guidelines"

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

[Security Engineering and Cryptography]
Developers have been creating and managing cryptographic material on their personal laptops fix
use in production environment. A security engineer needs to initiate a more secure process. Which
of thefollowing is the best strategy for the engineer to use?

  • A. Disabling the BIOS and moving to UEFI
  • B. Managing secrets on the vTPM hardware
  • C. Employing shielding lo prevent LMI
  • D. Managing key material on a HSM
Mark Question:
Answer:

D


Explanation:
The beststrategy for securely managing cryptographic material is to use a Hardware Security Module
(HSM). Here’s why:
Security and Integrity: HSMs are specialized hardware devices designed to protect and manage
digital keys. They provide high levels of physical and logical security, ensuring that cryptographic
material is well protected against tampering and unauthorized access.
Centralized Key Management: Using HSMs allows for centralized management of cryptographic keys,
reducing the risks associated with decentralized and potentially insecure key storage practices, such
as on personal laptops.
Compliance and Best Practices: HSMs comply with various industry standards and regulations (such
as FIPS 140-2) for secure key management. This ensures that the organization adheres to best
practices and meets compliance requirements.
Reference:
CompTIA Security+ SY0-601 Study Guide by Mike Chapple and David Seidl
NIST Special Publication 800-57: Recommendation for Key Management
ISO/IEC 19790:2012: Information Technology - Security Techniques - Security Requirements for
Cryptographic Modules

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2