CompTIA CAS-005 CompTIA SecurityX Certification Exam Online Training
CompTIA CAS-005 Online Training
The questions for CAS-005 were last updated at Nov 01,2025.
- Exam Code: CAS-005
 - Exam Name: CompTIA SecurityX Certification Exam
 - Certification Provider: CompTIA
 - Latest update: Nov 01,2025
 
An audit finding reveals that a legacy platform has not retained loos for more than 30 days The platform has been segmented due to its interoperability with newer technology. As a temporary solution, the IT department changed the log retention to 120 days .
Which of the following should the security engineer do to ensure the logs are being properly retained?
- A . Configure a scheduled task nightly to save the logs
 - B . Configure event-based triggers to export the logs at a threshold.
 - C . Configure the SIEM to aggregate the logs
 - D . Configure a Python script to move the logs into a SQL database.
 
A security analyst is reviewing the following log:

Which of the following possible events should the security analyst investigate further?
- A . A macro that was prevented from running
 - B . A text file containing passwords that were leaked
 - C . A malicious file that was run in this environment
 - D . A PDF that exposed sensitive information improperly
 
A security analyst is troubleshooting the reason a specific user is having difficulty accessing company resources.
The analyst reviews the following information: 

Which of the following is most likely the cause of the issue?
- A . The local network access has been configured to bypass MFA requirements.
 - B . A network geolocation is being misidentified by the authentication server
 - C . Administrator access from an alternate location is blocked by company policy
 - D . Several users have not configured their mobile devices to receive OTP codes
 
A software development team requires valid data for internal tests. Company regulations, however do not allow the use of this data in cleartext .
Which of the following solutions best meet these requirements?
- A . Configuring data hashing
 - B . Deploying tokenization
 - C . Replacing data with null record
 - D . Implementing data obfuscation