Free CAS-005 Practice Test Questions 2026

325 Questions


Last Updated On : 7-Apr-2026


A security analyst Detected unusual network traffic related to program updating processes The analyst collected artifacts from compromised user workstations. The discovered artifacts were binary files with the same name as existing, valid binaries but. with different hashes which of the following solutions would most likely prevent this situation from reoccurring?


A. Improving patching processes


B. Implementing digital signature


C. Performing manual updates via USB ports


D. Allowing only dies from internal sources





B.
  Implementing digital signature

Explanation:
The artifacts described—binary files that masquerade as legitimate software ("same name") but are actually malicious ("different hashes")—are a classic indicator of a binary spoofing or supply chain attack. The malicious actor is exploiting the software update process to distribute trojanized versions of legitimate programs.

Digital Signature Verification:
This is a cryptographic process that allows a system to verify that a piece of software (a binary file) is genuinely from a trusted publisher and has not been altered since it was signed.

How it Prevents Reoccurrence:
By implementing and enforcing digital signature verification (e.g., through application allow-listing policies like Windows Defender Application Control), the system will block any binary that does not have a valid, trusted signature. Even if the malicious file has the same name as a valid binary, the system will check its digital signature, see that it is invalid or untrusted, and prevent it from executing. This directly stops the attack vector being exploited.

Analysis of Incorrect Options:

A. Improving patching processes:
While important, this is too vague. The problem isn't necessarily that the patching process is slow; it's that the update mechanism itself was compromised to deliver malicious files. A better patching process might not prevent an attacker from hijacking the update channel. Digital signature verification is a more specific and technical control that directly validates the integrity of each file.

C. Performing manual updates via USB ports:
This is a highly insecure and impractical recommendation. It introduces a significant physical security risk (USB-borne malware, loss/theft of drives) and is not scalable for an enterprise. It also does not inherently verify the integrity of the files on the USB drive; they could still be malicious.

D. Allowing only files from internal sources:
This is a good principle (network segmentation/air-gapping for critical systems), but it is often impractical for software that requires updates from the internet. More importantly, it is not foolproof. If an internal source (like a local update server) itself becomes compromised, it would distribute the malicious binaries to all workstations. Digital signature verification provides a stronger guarantee of file integrity, regardless of the source.

Reference:

This defense is a core component of Domain 3.6:
Cryptography and Domain 3.1: Identity and Access Management (specifically application control) in the CAS-005 exam. The principle is:

Code Integrity:
Ensuring that only authorized code from trusted publishers can execute on a system. Digital signatures are the primary mechanism for enforcing code integrity.

The most direct and effective way to prevent the execution of trojanized binaries, regardless of their source or name, is to implement and enforce digital signature verification (B) on all endpoints.

During a gap assessment, an organization notes that OYOD usage is a significant risk. The organization implemented administrative policies prohibiting BYOD usage However, the organization has not implemented technical controls to prevent the unauthorized use of BYOD assets when accessing the organization's resources. Which of the following solutions should the organization implement to b»« reduce the risk of OYOD devices? (Select two).


A. Cloud 1AM to enforce the use of token based MFA


B. Conditional access, to enforce user-to-device binding


C. NAC, to enforce device configuration requirements


D. PAM. to enforce local password policies


E. SD-WAN. to enforce web content filtering through external proxies


F. DLP, to enforce data protection capabilities





B.
  Conditional access, to enforce user-to-device binding

C.
  NAC, to enforce device configuration requirements

Explanation:
The organization has a policy against BYOD but lacks the technical controls to enforce it. The goal is to technically prevent unauthorized BYOD devices from accessing corporate resources. The solutions must act as gatekeepers.

B. Conditional Access (to enforce user-to-device binding):
Modern Cloud Identity and Access Management (IAM) platforms (like Azure AD) include Conditional Access policies. These policies can require that a device be marked as compliant (e.g., by Intune) or domain-joined before it is allowed to access applications. This effectively enforces "user-to-device binding," ensuring that access is only granted from company-managed and approved devices, thus blocking BYOD devices that do not meet this criteria.

C. NAC (Network Access Control, to enforce device configuration requirements):
NAC solutions act as a network gatekeeper. They can check devices attempting to connect to the corporate network (wired or wireless) for specific attributes:

Is the device a corporate asset? (e.g., does it have a specific certificate installed?)

Does it meet security requirements? (e.g., is the OS patched, is an antivirus running?)

Devices that fail these checks (including unauthorized BYOD devices) can be placed in a quarantine VLAN or denied access entirely, preventing them from reaching any internal resources.

Together, these solutions provide a layered defense: Conditional Access protects cloud applications, and NAC protects the internal network.

Analysis of Incorrect Options:

A. Cloud IAM to enforce the use of token based MFA:
MFA is a critical security control, but it authenticates the user, not the device. A user could simply authenticate from their personal BYOD phone or laptop using a token. This does nothing to enforce the policy against BYOD usage; it just adds a layer of user authentication.

D. PAM (Privileged Access Management, to enforce local password policies):
PAM solutions manage and secure privileged accounts and credentials. They are not designed to control which devices can access the network or resources. Enforcing local password policies on endpoints does not prevent a BYOD device from connecting.

E. SD-WAN (Software-Defined Wide Area Network, to enforce web content filtering through external proxies):
SD-WAN optimizes and manages network traffic between branch offices and data centers. While it can include security features like content filtering, it operates at the network perimeter and is not designed to identify and block specific BYOD devices attempting to access the network. It lacks the device-level visibility and control of NAC.

F. DLP (Data Loss Prevention, to enforce data protection capabilities):
DLP is designed to protect data from being exfiltrated or misused. It is a data-centric control, not a device-centric one. It might prevent data from being copied to a BYOD device after access has been granted, but it does nothing to prevent the BYOD device from accessing the resources in the first place, which is the core requirement.

Reference:
This solution aligns with Domain 3.5: Identity and Access Management and Domain 3.4: Secure Network Architecture of the CAS-005 exam. The key concepts are:

Zero Trust / Device Compliance: Using Conditional Access policies to enforce that only compliant, managed devices can access resources.

Network Enforcement: Using NAC as a technical control to physically block unauthorized devices from connecting to the network.

To technically enforce a no-BYOD policy, the organization must implement controls that explicitly identify and block unauthorized devices. Conditional Access (B) and NAC (C) are the two primary technical controls designed for this exact purpose.

An organization wants to manage specialized endpoints and needs a solution that provides the ability to

* Centrally manage configurations

* Push policies.

• Remotely wipe devices

• Maintain asset inventory

Which of the following should the organization do to best meet these requirements?


A. Use a configuration management database


B. Implement a mobile device management solution.


C. Configure contextual policy management


D. Deploy a software asset manager





B.
   Implement a mobile device management solution.

Explanation:
The requirements listed are the core, defining functions of a Mobile Device Management (MDM) system. While the term "mobile" is in the name, modern MDM solutions (often called Unified Endpoint Management or UEM) extend these capabilities to a wide range of "specialized endpoints," including:

Mobile phones and tablets (iOS, Android)

Laptops (Windows, macOS, ChromeOS)

IoT devices

Other specialized endpoints

Let's map the requirements to MDM capabilities:

Centrally manage configurations:
MDM provides a central console to create and manage configuration profiles (e.g., Wi-Fi settings, VPN settings, security baselines).

Push policies:
MDM automatically deploys these configurations and compliance policies to enrolled devices over-the-air.

Remotely wipe devices:
This is a fundamental security feature of any MDM solution, allowing an admin to remotely erase a device if it is lost or stolen.

Maintain asset inventory:
MDM automatically maintains a detailed inventory of all enrolled devices, including hardware specs, OS versions, and installed applications.

Analysis of Incorrect Options:

A. Use a configuration management database (CMDB):
A CMDB is a repository that stores information about IT assets and their relationships. It is used for IT Service Management (ITSM) and provides visibility into what assets exist. However, a CMDB is a passive inventory tool. It cannot actively push configurations, enforce policies, or remotely wipe devices. It is for tracking, not for management.

C. Configure contextual policy management:
This is a feature or capability, not a product or solution. "Contextual policy management" refers to making access decisions based on context (user, device, location). This functionality is often a part of a larger solution like an MDM or Identity and Access Management (IAM) platform. This option does not describe a solution that can perform all the required tasks, especially remote wipe and centralized configuration.

D. Deploy a software asset manager:
Software Asset Management (SAM) tools are focused on managing software licenses, ensuring compliance, and optimizing software spend. They help track software installations but are not designed to manage device configurations, push security policies, or perform remote wipes. Their focus is financial and legal compliance, not endpoint security management.

Reference:
This solution falls under Domain 4.3: Automation of Security Operations and Domain 3.5: Identity and Access Management of the CAS-005 exam. MDM/UEM is the standard tool for automating the management and security of endpoints at scale.

An MDM solution (B) is purpose-built to meet all the listed requirements for managing specialized endpoints effectively and securely.

An organization is developing on Al-enabled digital worker to help employees complete common tasks such as template development, editing, research, and scheduling. As part of the Al workload the organization wants to Implement guardrails within the platform. Which of the following should the company do to secure the Al environment?


A. Limn the platform's abilities to only non-sensitive functions


B. Enhance the training model's effectiveness.


C. Grant the system the ability to self-govern


D. Require end-user acknowledgement of organizational policies.





A.
  Limn the platform's abilities to only non-sensitive functions

Explanation:
The core concept of implementing "guardrails" in an AI system is to create boundaries and constraints that prevent the AI from causing harm, making mistakes, or being misused.

Principle of Least Functionality:
This answer embodies a fundamental security principle: only allow the minimum level of access and capability necessary for a system to perform its intended function. By restricting the AI digital worker to only non-sensitive functions, the organization creates a powerful guardrail.

How it Secures the Environment:
This limitation directly mitigates a wide range of risks:

Data Exfiltration/Loss:
Prevents the AI from processing, storing, or transmitting sensitive personal data (PII), intellectual property, or financial information.

Harmful Actions:
Prevents the AI from taking autonomous actions that could have serious consequences (e.g., sending emails, making calendar changes, editing sensitive documents) without human review.

Reputational Risk:
Reduces the chance of the AI generating incorrect or inappropriate content based on sensitive data.

This is a proactive, architectural control that defines the AI's operational boundaries from the outset.

Analysis of Incorrect Options:

B. Enhance the training model's effectiveness.
While improving the model's accuracy and reducing errors is important, it is not a "guardrail." A more effective model might be better at its tasks, but it does not inherently prevent it from operating on sensitive data or performing unauthorized actions. This is about improving core functionality, not implementing security boundaries.

C. Grant the system the ability to self-govern.
This is the opposite of implementing guardrails. "Self-governance" implies giving the AI system autonomy to make its own decisions about what is right or wrong. Without predefined, human-created guardrails, this is extremely dangerous and could lead to unpredictable and uncontrollable outcomes. Guardrails are external controls imposed on the AI system.

D. Require end-user acknowledgement of organizational policies.
This is an administrative control aimed at users, not a technical control for the AI platform itself. While user training and policy acknowledgment are important, they are unreliable as a sole security measure. Users can make mistakes, ignore policies, or find ways to misuse the technology. A technical guardrail built into the system itself is a far more secure and enforceable method.

Reference:
This approach aligns with Domain 2.0: Security Architecture and Domain 1.0: Governance, Risk, and Compliance of the CAS-005 exam. The key principles are:

Secure by Design: Building security into the architecture of a system from the beginning, which includes limiting its capabilities to a well-defined scope.

Risk Mitigation: Proactively identifying and reducing the attack surface and potential for misuse.

The most effective way to secure the AI environment with guardrails is to technically restrict its capabilities (A), ensuring it cannot be used in a way that poses a risk to the organization, even accidentally.

All organization is concerned about insider threats from employees who have individual access to encrypted material. Which of the following techniques best addresses this issue?


A. SSO with MFA


B. Sating and hashing


C. Account federation with hardware tokens


D. SAE


E. Key splitting





E.
  Key splitting

Explanation:
The specific concern is an insider threat where a single employee with individual access to encrypted material could potentially misuse that access (e.g., decrypt and steal sensitive data). The goal is to technically prevent any one person from having the complete ability to access the encrypted data on their own.

Key Splitting (Sharding):
This is a cryptographic technique where a decryption key is divided into multiple unique parts (shards). A certain number of these shards (e.g., 3 out of 5) are required to reconstruct the original key and decrypt the data.

How it Addresses Insider Threat:
This technique implements a separation of duties and dual control for cryptographic access. No single employee ever possesses the entire key. To decrypt the material, multiple employees (e.g., from different departments) must collaborate and provide their individual key shards. This effectively mitigates the risk of a lone insider acting maliciously, as they cannot act alone.

Analysis of Incorrect Options:
A. SSO with MFA (Single Sign-On with Multi-Factor Authentication):
This improves authentication security by requiring a second factor to prove identity. However, once authenticated, the employee still has individual, complete access to the encrypted material. It does nothing to prevent a malicious insider from using their legitimate access to decrypt data.

B. Salting and hashing:
These are techniques used to protect stored passwords. A salt is added to a password before it is hashed to defeat precomputed rainbow table attacks. This is irrelevant to controlling access to encrypted data and does not address the insider threat scenario.

C. Account federation with hardware tokens:
Federation allows users to access multiple systems with a single set of credentials, and hardware tokens provide strong authentication. Similar to SSO, this is an access mechanism. It does not change the fact that once access is granted, the user has individual control over the encrypted material. It strengthens the gate but doesn't change what's behind it.

D. SAE (Simultaneous Authentication of Equals):
SAE is a cryptographic protocol used in Wi-Fi networks (WPA3) for establishing a secure connection. It is designed to prevent offline dictionary attacks on Wi-Fi passwords and is not relevant for managing access to stored encrypted data or mitigating insider threats.

Reference:
This solution falls under Domain 3.6: Cryptography and Domain 1.0: Governance, Risk, and Compliance of the CAS-005 exam. Key concepts include:

Cryptographic Key Management: Implementing controls like key splitting to enforce separation of duties.

Principle of Least Privilege and Dual Control: Ensuring that critical actions (like decrypting sensitive data) require the collaboration of multiple parties, preventing any single point of failure or misuse.

Key splitting (E) is the only technique that directly and technically addresses the risk of a single insider misusing their individual access to encrypted material.

After some employees were caught uploading data to online personal storage accounts, a company becomes concerned about data leaks related to sensitive, internal documentation. Which of the following would the company most likely do to decrease this type of risk?


A. Improve firewall rules to avoid access to those platforms.


B. Implement a cloud-access security broker


C. Create SIEM rules to raise alerts for access to those platforms


D. Deploy an internet proxy that filters certain domains





B.
  Implement a cloud-access security broker

Explanation:
The problem is data exfiltration to unsanctioned cloud applications (personal storage accounts like Dropbox, Google Drive, etc.). The goal is to not just block or alert, but to actively monitor and control the data that is being sent to cloud services.

Cloud-Access Security Broker (CASB):
A CASB is a security policy enforcement point that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure. It acts as a gatekeeper to ensure secure cloud usage.

How it Decreases Risk:
A CASB provides several critical functions that directly address this risk:

Discovery & Visibility:
It identifies all cloud services in use (sanctioned and unsanctioned).

Data Loss Prevention (DLP):
This is the key feature. A CASB can inspect data in motion to the cloud. It can identify sensitive content (based on patterns, fingerprints, or labels) being uploaded to personal storage sites and block the upload in real-time.

Access Control:
It can enforce policies to allow, block, or limit access to specific cloud applications based on user, device, or location.

A CASB provides a proactive, data-centric control designed specifically for the cloud era.

Analysis of Incorrect Options:
A. Improve firewall rules to avoid access to those platforms & D. Deploy an internet proxy that filter certain domains:

These are similar network-based blocking solutions. While they can technically block access to the domains of popular storage platforms, they are very coarse and ineffective controls.

* Easy to Bypass: Employees can use personal devices on cellular networks to bypass corporate proxies and firewalls.

* Too Broad: It blocks the entire application, which might be used legitimately for non-sensitive work. A CASB offers much more granular control.

* Reactive: The list of personal storage sites is endless; new ones pop up constantly, making it a game of whack-a-mole.

C. Create SIEM rules to raise alerts for access to those platforms:
A SIEM is a detective control. It can alert after the data has already been exfiltrated. By the time the SOC analyst sees the alert, the sensitive data is already on a server outside the company's control. The requirement is to decrease the risk (prevent the leak), not just to discover it after the fact.

Reference:
This solution is a core component of Domain 3.4: Secure Network Architecture and Domain 1.4: Data Security of the CAS-005 exam. CASBs are a critical technology for implementing a data-centric security strategy in a hybrid cloud world.

While the other options provide partial, often ineffective solutions, implementing a CASB (B) is the most comprehensive and effective way to directly decrease the risk of data leaks to personal cloud storage accounts by inspecting and controlling the data itself.

Which of the following is the main reason quantum computing advancements are leading companies and countries to deploy new encryption algorithms?


A. Encryption systems based on large prime numbers will be vulnerable to exploitation


B. Zero Trust security architectures will require homomorphic encryption.


C. Perfect forward secrecy will prevent deployment of advanced firewall monitoring techniques


D. Quantum computers will enable malicious actors to capture IP traffic in real time





A.
  Encryption systems based on large prime numbers will be vulnerable to exploitation

Explanation:
The threat posed by quantum computing is highly specific to certain types of cryptographic algorithms.

Shor's Algorithm:
This is a quantum algorithm that, if run on a sufficiently powerful quantum computer, can efficiently solve the mathematical problems that underpin the security of most widely used public-key cryptography.

Vulnerable Algorithms:

These include:

RSA:
Based on the practical difficulty of factoring the product of two large prime numbers.

Diffie-Hellman & ECC (Elliptic-Curve Cryptography):
Based on the difficulty of the discrete logarithm problem.

The Risk:
A cryptographically relevant quantum computer (CRQC) could use Shor's algorithm to break these encryption and digital signature schemes, rendering them useless. This would compromise the security of virtually all secure web traffic (TLS/SSL), digital signatures, and encrypted data that has been stored for future decryption. This specific and existential threat to current standards is the primary driver for the development and deployment of Post-Quantum Cryptography (PQC) – new encryption algorithms designed to be secure against both classical and quantum computer attacks.

Analysis of Incorrect Options:

B. Zero Trust security architectures will require homomorphic encryption.
Zero Trust is a security model centered on the belief that organizations should not automatically trust anything inside or outside its perimeters. While homomorphic encryption (performing computations on encrypted data) is an advanced cryptographic technique, it is not a requirement for Zero Trust. Zero Trust primarily relies on strong identity verification and access controls. The push for new algorithms is driven by quantum threats, not by Zero Trust architecture needs.

C. Perfect forward secrecy will prevent deployment of advanced firewall monitoring techniques.
Perfect Forward Secrecy (PFS) is a feature of key agreement protocols that ensures a session key derived from a set of long-term keys cannot be compromised if one of the long-term keys is compromised in the future. PFS is a security benefit, not a hindrance. It does not prevent advanced firewall monitoring; firewalls can still inspect TLS traffic if they are configured as a trusted man-in-the-middle. This option is a distractor and not related to the quantum threat.

D. Quantum computers will enable malicious actors to capture IP traffic in real time.
The ability to capture IP traffic is a function of network access (e.g., through a compromised node or wiretap), not computational power. Quantum computers do not provide a new capability to capture traffic; they threaten the ability to decrypt the captured traffic that was encrypted using vulnerable algorithms. The threat is to breaking the encryption, not the capture itself.

Reference:
This topic is a key part of Domain 3.6: Cryptography in the CAS-005 exam. It requires an understanding of:

Quantum Threats: The specific risk that quantum computing poses to asymmetric cryptography based on integer factorization and discrete logarithm problems.

Cryptographic Agility: The need to prepare for the migration to post-quantum cryptographic algorithms, a effort being led by standards bodies like NIST.

The main and direct reason for deploying new encryption algorithms is the vulnerability of current prime number-based systems to quantum attacks, as described in option A.

During DAST scanning, applications are consistently reporting code defects in open-source libraries that were used to build web applications. Most of the code defects are from using libraries with known vulnerabilities. The code defects are causing product deployment delays. Which of the following is the best way to uncover these issues earlier in the life cycle?


A. Directing application logs to the SIEM for continuous monitoring


B. Modifying the WAF policies to block against known vulnerabilities


C. Completing an IAST scan against the web application


D. Using a software dependency management solution





D.
  Using a software dependency management solution

An external threat actor attacks public infrastructure providers. In response to the attack and during follow-up activities, various providers share information obtained during response efforts. After the attack, energy sector companies share their status and response data:
Company
SIEM
UEBA
DLP
ISAC Member
TIP Integration
Time to Detect
Time to Respond
1
Yes
No
Yes
Yes
Yes
10 minutes
20 minutes
2
Yes
Yes
Yes
Yes
No
20 minutes
40 minutes
Yes
Yes
No
No
Yes
12 minutes
24 minutes
Which of thefollowing is the most important issue to address to defend against future attacks?


A. Failure to implement a UEBA system


B. Failure to implement a DLP system


C. Failure to join the industry ISAC


D. Failure to integrate with the TIP





C.
  Failure to join the industry ISAC

A security officer performs due diligence activities before implementing a third-party solution into the enterprise environment. The security officer needs evidence from the third party that a data subject access request handling process is in place. Which of the following is the security officer most likely seeking to maintain compliance?


A. Information security standards


B. E-discovery requirements


C. Privacy regulations


D. Certification requirements


E. Reporting frameworks





C.
  Privacy regulations

Previously intercepted communications must remain secure even if a current encryption key is compromised in the future. Which of the following best supports this requirement?


A. Tokenization


B. Key stretching


C. Forward secrecy


D. Simultaneous authentication of equals





C.
  Forward secrecy

A network security architect for an organization with a highly remote workforce implements an always-on VPN to meet business requirements. Which of the following best explains why the architect is using this approach?


A. To facilitate device authentication using on-premises directory services


B. To allow access to directly connected print and scan resources


C. To enable usability of locally attached removable storage


D. To authorize updates to change the PIN on a smart card





A.
  To facilitate device authentication using on-premises directory services


Page 9 out of 28 Pages
PreviousNext
5678910111213
CAS-005 Practice Test Home

What Makes Our CompTIA SecurityX Certification Practice Test So Effective?

Real-World Scenario Mastery: Our CAS-005 practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.

Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before CompTIA SecurityX Certification exam day arrives.

Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive CAS-005 practice exam questions pool covering all topics, the real exam feels like just another practice session.