CompTIA CAS-005 CompTIA SecurityX Certification Exam Online Training
CompTIA CAS-005 Online Training
The questions for CAS-005 were last updated at May 06,2025.
- Exam Code: CAS-005
- Exam Name: CompTIA SecurityX Certification Exam
- Certification Provider: CompTIA
- Latest update: May 06,2025
An audit finding reveals that a legacy platform has not retained loos for more than 30 days The platform has been segmented due to its interoperability with newer technology. As a temporary solution, the IT department changed the log retention to 120 days .
Which of the following should the security engineer do to ensure the logs are being properly retained?
- A . Configure a scheduled task nightly to save the logs
- B . Configure event-based triggers to export the logs at a threshold.
- C . Configure the SIEM to aggregate the logs
- D . Configure a Python script to move the logs into a SQL database.
A security analyst is reviewing the following log:
Which of the following possible events should the security analyst investigate further?
- A . A macro that was prevented from running
- B . A text file containing passwords that were leaked
- C . A malicious file that was run in this environment
- D . A PDF that exposed sensitive information improperly
A security analyst is troubleshooting the reason a specific user is having difficulty accessing company resources.
The analyst reviews the following information:
Which of the following is most likely the cause of the issue?
- A . The local network access has been configured to bypass MFA requirements.
- B . A network geolocation is being misidentified by the authentication server
- C . Administrator access from an alternate location is blocked by company policy
- D . Several users have not configured their mobile devices to receive OTP codes
A software development team requires valid data for internal tests. Company regulations, however do not allow the use of this data in cleartext .
Which of the following solutions best meet these requirements?
- A . Configuring data hashing
- B . Deploying tokenization
- C . Replacing data with null record
- D . Implementing data obfuscation