CAS-005 security operations questions reward evidence-first incident and monitoring judgment. The exam expects you to validate telemetry quality, prioritize alerts by risk, reduce exploitable attack paths, hunt from behavior, and preserve artifacts before destroying state. Treat every operations scenario as a timeline problem: what signal was collected, whether it was normalized and retained, what behavior it proves, and which response action preserves or validates the truth.
Official Objective Mapping: Security operations; related CAS-005 objective areas: security monitoring and alerting, SIEM data quality, parser normalization, log source health, baselines, threat intelligence, vulnerability context, dashboards, and response metrics.
Plain-English Understanding: This topic tests whether you can tell the difference between having logs and having usable detection data. SIEM analytics depend on reporting devices, parser health, normalized fields, retention, baseline quality, and risk-based prioritization.
Key Concepts: parser normalization; log source heartbeat; retention; duplicate events; baseline; correlation rule; asset criticality; MTTD / MTTR.
Exam Focus: collected, parsed, normalized, retained, enriched, prioritized, and measured telemetry before alert tuning.
Practice Question: A correlation rule never triggers after an application upgrade, but raw logs are still arriving. What is the most likely monitoring dependency?
A. Parser normalization failed and required fields are no longer extracted B. The SOC needs a new logo C. Users need longer passwords D. The firewall must allow all inbound traffic
Correct Answer: A
Explanation: A is correct because the rule depends on normalized fields, not merely raw event arrival. An application upgrade can change log format and break parser extraction. Logo design, password policy, and broad firewall access do not explain why the same raw logs no longer trigger correlation.
Practice Question: A SOC wants to reduce alert fatigue without missing critical incidents. What should drive prioritization?
A. Alphabetical order of hostnames B. The analyst who opened the console first C. Random sampling of all alerts D. Asset criticality, data classification, impact, vulnerability context, and confidence
Correct Answer: D
Explanation: D is correct because prioritization should reflect risk and confidence. Critical assets, sensitive data, exploitability, and validated context tell analysts where impact is highest. Alphabetical order, analyst order, and random sampling are not security-priority models.
Exam Takeaway: Fix collection, parsing, normalization, enrichment, retention, and risk scoring before tuning alert thresholds or dashboard appearance.
What this topic really tests: can you validate detection input before debating alert output? A SIEM rule is only as good as the logs, parser, timestamp, normalized fields, retention window, and asset context behind it. If a critical database is silent or parsed incorrectly, dashboards can look busy while detection coverage is broken. The exam often describes too many alerts and one missed critical event to see whether you inspect telemetry quality first.
Beginner-friendly grounding: For SIEM questions, fix data quality before tuning alerts. A rule cannot detect what is not collected, parsed, normalized, enriched, prioritized, or retained.
Exam transformation: wrong options usually appear as tuning dashboard colors before fixing parser failure; deleting noisy alerts before checking source health; prioritizing by arrival order; assuming raw logs are enough for correlation. These options can sound professional, but they solve the wrong layer or skip the state that must be proven. The correct option matches the security property, operational phase, and evidence requirement described by the stem.
| Object | Attribute | Value Range | Default State | Dependency | Failure State |
|---|---|---|---|---|---|
| SIEM parser | Event normalization status | Parsed, partially parsed, failed | Raw-only ingestion | Log source format and schema | Correlation rules miss events because fields are not normalized |
| Log source | Reporting and retention state | Active, silent, duplicated, expired | Unmonitored device | Forwarder and storage policy | Critical evidence is absent or overwritten during investigation |
| Behavior baseline | Normal activity model | User, system, network, application | No baseline | Historical telemetry | Alerts lack context and produce false positives or missed anomalies |
| Alert priority | Risk ranking factors | Asset criticality, impact, residual risk, data classification | First-seen order | Analysts chase low-impact alerts while critical assets remain exposed |
Command and evidence confidence: Use vendor-supported consoles, management APIs, SIEM/EDR views, GRC workflow evidence, repository settings, cloud audit views, or version-aware CLI verification for the deployed platform. Treat generic shell snippets, sample queries, and tabletop rehearsals as lab rehearsal unless they are validated against the organization's active tool version.
The chain starts with a device, application, cloud service, or identity platform emitting an event. The forwarder sends it, the parser normalizes fields, the SIEM stores it for retention, enrichment adds asset and vulnerability context, and correlation rules create alerts. If any upstream step fails, downstream metrics and dashboards become misleading. The correct response repairs data quality and priority logic before superficial tuning.
A strong exam answer follows this chain without skipping layers. First identify the event or requirement, then the object that controls it, then the dependency that must be valid, then the evidence source that proves the state. If the option jumps straight to remediation while the controlling dependency is unknown, it is usually a distractor.
| Task | Precise Command or Path | Verification Standard |
|---|---|---|
| Check parser health | SIEM admin: log source > parser status > field extraction preview | Critical events are parsed into normalized fields required by correlation rules |
| Validate source reporting | SIEM query: log sources with last event time older than reporting threshold | No critical log source is silent beyond the approved heartbeat window |
| Review alert prioritization | SIEM rule details: risk score factors > asset criticality > data classification | Priority calculation reflects critical assets and high-impact data |
| Inspect monitoring metrics | SOC dashboard: false positives, false negatives, non-reporting devices, retention status | Metrics expose coverage gaps and trend movement for remediation |
Official Objective Mapping: Security operations; related CAS-005 objective areas: vulnerability management and attack surface reduction, secure coding mitigations, dependency management, threat hunting, threat intelligence sharing, Sigma, YARA, Snort, STIX/TAXII, honeypots, UBA, and hypothesis-driven searches.
Plain-English Understanding: This topic tests whether you can reduce the actual attack path and hunt for behavior that proves or disproves a hypothesis. A CVE score, IoC, or rule format is useful only when tied to exposed assets, exploit path, telemetry, and deployable detection.
Key Concepts: attack surface; exploitability; compensating control; SSRF; deserialization; Sigma; YARA; Snort; STIX/TAXII; UBA; honeypot; hunt hypothesis.
Exam Focus: exploit path, exposed asset, compensating control, behavior-based hunting, and rule format matched to telemetry.
Practice Question: A critical CVE affects an internal-only library, while a medium SSRF finding is internet-facing and can reach metadata services. Which should be prioritized first?
A. The exposed SSRF path, because exploit path and impact can outweigh raw CVSS score B. The critical CVE only, because CVSS is the only factor C. Neither, because application findings are not security issues D. The finding with the shortest title
Correct Answer: A
Explanation: A is correct because attack surface priority is driven by exploitability, exposure, impact, and reachable dependencies. An internet-facing SSRF path to metadata services may enable credential theft even if the raw CVSS score is lower. CVSS-only triage misses context, and application findings can absolutely be security issues.
Practice Question: A hunt team suspects misuse of cloud metadata credentials but has no confirmed IoC. What is the best hunt design?
A. Search only for one known malicious IP address B. Search for behavior such as unusual metadata endpoint access, token retrieval, rare user-agent patterns, and follow-on API calls C. Disable logging to reduce noise D. Wait for a ransomware note
Correct Answer: B
Explanation: B is correct because the team has a hypothesis, not a confirmed indicator. Behavior-based hunting looks for the sequence an attacker would need: metadata access, token retrieval, unusual client behavior, and subsequent API use. A single IP search is too narrow, and disabling logs or waiting for impact is backwards.
Exam Takeaway: Prioritize exploitable paths with meaningful impact, then hunt for behavior in telemetry that can actually observe the suspected technique.
What this topic really tests: can you connect vulnerability evidence to attack feasibility and detection evidence? Attack surface reduction is not just patching; it may require egress restriction, dependency update, input validation, cloud metadata protection, least privilege, or code signing. Threat hunting starts with a behavioral hypothesis and available telemetry, then uses intelligence or detection rules only if they fit the tool and data source.
Beginner-friendly grounding: Attack surface work is about reachable paths, not just severity labels. Threat hunting starts with behavior you expect an attacker to perform, then checks whether telemetry can prove or disprove it.
Exam transformation: wrong options usually appear as patching by CVSS alone; using YARA where network telemetry is needed; searching only known IoCs for novel behavior; accepting application risk because it is not infrastructure. These options can sound professional, but they solve the wrong layer or skip the state that must be proven. The correct option matches the security property, operational phase, and evidence requirement described by the stem.
| Object | Attribute | Value Range | Default State | Dependency | Failure State |
|---|---|---|---|---|---|
| Vulnerability finding | Exploitability and exposure | Critical, high, medium, low, compensating control | Untriaged scan result | Asset context and patch path | Teams patch by CVSS alone and miss exposed business-critical paths |
| Mitigation control | Attack class reduction | Input validation, output encoding, safe functions, least privilege, code signing | Generic hardening | Application and platform design | The root vulnerability remains because the control targets a different failure mode |
| Hunt hypothesis | Behavioral search premise | Technique, anomaly, actor behavior, asset scope | Indicator-only search | Telemetry and intelligence source | Hunt misses novel behavior not tied to known IoCs |
| Detection rule | Rule language and deployment state | Sigma, YARA, Snort, Rita | Local analyst note | SIEM, EDR, NIDS, malware sandbox | Detection cannot execute in the target tool or produces untested noise |
Command and evidence confidence: Use vendor-supported consoles, management APIs, SIEM/EDR views, GRC workflow evidence, repository settings, cloud audit views, or version-aware CLI verification for the deployed platform. Treat generic shell snippets, sample queries, and tabletop rehearsals as lab rehearsal unless they are validated against the organization's active tool version.
The chain starts with an exposed weakness, dependency, misconfiguration, or suspicious behavior. Asset context and exploitability determine priority. Mitigation closes the path by changing code, configuration, privilege, network reachability, or dependency version. Hunting then searches telemetry for behavior that would occur if the path were abused. Intelligence becomes operational only after it is translated into deployable and tested Sigma, YARA, Snort, STIX/TAXII, SIEM, EDR, or NIDS content.
A strong exam answer follows this chain without skipping layers. First identify the event or requirement, then the object that controls it, then the dependency that must be valid, then the evidence source that proves the state. If the option jumps straight to remediation while the controlling dependency is unknown, it is usually a distractor.
| Task | Precise Command or Path | Verification Standard |
|---|---|---|
| Validate vulnerability context | Vulnerability platform: finding > asset criticality > exploitability > compensating controls | Priority includes exploit path, business impact, and exposure state |
| Inspect mitigation coverage | Application security tracker: vulnerability class > remediation evidence > retest result | Mitigation addresses the specific failure mode and has passing retest evidence |
| Run hypothesis hunt | SIEM or EDR hunt query: behavior pattern by asset group and time window | Results confirm or disprove the behavior premise with enough context for escalation |
| Check rule deployment | Detection platform: rule content > test result > alert volume > enabled state | Rule compiles, triggers on authorized test data, and has acceptable noise level |
Official Objective Mapping: Security operations; related CAS-005 objective areas: incident response, forensics, malware analysis, cloud workload evidence, chain of custody, timeline reconstruction, insider threat, metadata analysis, JTAG/specialized acquisition, and root-cause validation.
Plain-English Understanding: This topic tests whether you can preserve evidence before destroying state and then reconstruct what happened. The first action depends on volatility, containment risk, legal needs, and which artifact proves scope or root cause.
Key Concepts: volatile memory; chain of custody; malware sandbox; file metadata; network capture; cloud audit log; CWPP; timeline; root cause.
Exam Focus: evidence volatility, collection order, custody, malware containment, cloud workload actions, and timeline-based root cause.
Practice Question: A suspected malware host is still running and may contain encryption keys in memory. What should be prioritized before rebooting?
A. Rebooting immediately to clear memory B. Deleting all event logs C. Volatile evidence capture with hashing, timestamping, and chain-of-custody documentation D. Marking the incident closed because malware is suspected
Correct Answer: C
Explanation: C is correct because memory and live process state may disappear after reboot. Capturing volatile evidence with hashes, timestamps, and custody records preserves investigative value. Rebooting or deleting logs destroys evidence, and closing the incident skips scope and root-cause analysis.
Practice Question: Cloud audit logs show unusual API calls from a workload identity after a container alert. Which evidence best supports root-cause reconstruction?
A. A generic statement that containers are risky B. A screenshot of the cloud provider home page C. A decision to delete the entire tenant before analysis D. Timeline linking container execution, workload identity API calls, resource changes, network events, and containment actions
Correct Answer: D
Explanation: D is correct because root cause depends on sequence. The timeline connects container behavior, identity use, resource changes, network activity, and response actions. Generic risk statements and screenshots are not evidence, and deleting the tenant destroys scope information.
Exam Takeaway: Preserve volatile and high-value evidence before containment steps that destroy state, then prove root cause through a correlated timeline.
What this topic really tests: can you choose evidence order and prove root cause without contaminating artifacts? Volatile data disappears quickly; cloud workload evidence may be ephemeral; malware samples must be analyzed in containment; chain-of-custody protects legal value; timelines prevent false conclusions. The best answer preserves the artifact that will be lost first while still controlling damage.
Beginner-friendly grounding: Incident response questions often turn on evidence order. Capture what will disappear first, preserve custody, and build the timeline before actions such as rebooting, deleting, or rebuilding destroy proof.
Exam transformation: wrong options usually appear as powering off a live suspect host before memory capture; deleting identities before collecting audit evidence; calling the root cause malware without timeline proof; executing malware on production systems. These options can sound professional, but they solve the wrong layer or skip the state that must be proven. The correct option matches the security property, operational phase, and evidence requirement described by the stem.
| Object | Attribute | Value Range | Default State | Dependency | Failure State |
|---|---|---|---|---|---|
| Volatile evidence | Memory and running state | Captured, live, lost | Not collected | Acquisition order and chain of custody | Malware process, keys, or network sessions disappear after reboot |
| Malware sample | Analysis state | Detonated, static reviewed, decompiled, contained | Uncontained sample | Sandbox and reverse-engineering workflow | Sample execution infects analysis environment or attribution is unsupported |
| Timeline artifact | Event sequence | File, process, network, identity, cloud, metadata | Uncorrelated notes | Time synchronization and evidence sources | Root cause is misidentified because events are out of order |
| Cloud workload evidence | CWPP and cloud audit context | Container, serverless, VM, identity action | Cloud logs disabled | Cloud provider logging and workload protection | Incident scope misses ephemeral workload activity |
Command and evidence confidence: Use vendor-supported consoles, management APIs, SIEM/EDR views, GRC workflow evidence, repository settings, cloud audit views, or version-aware CLI verification for the deployed platform. Treat generic shell snippets, sample queries, and tabletop rehearsals as lab rehearsal unless they are validated against the organization's active tool version.
The chain starts with a detection, report, or suspicious artifact. Responders stabilize the scene, collect volatile and high-value evidence, preserve hashes and custody records, analyze malware or behavior in a controlled environment, correlate host, network, identity, cloud, and metadata events, then identify initial access and propagation. If evidence is destroyed early, root cause becomes assumption rather than reconstruction.
A strong exam answer follows this chain without skipping layers. First identify the event or requirement, then the object that controls it, then the dependency that must be valid, then the evidence source that proves the state. If the option jumps straight to remediation while the controlling dependency is unknown, it is usually a distractor.
| Task | Precise Command or Path | Verification Standard |
|---|---|---|
| Verify volatile capture | Forensics case system: memory image > hash > acquisition timestamp > tool version | Memory capture is hashed, time-stamped, and linked to chain-of-custody record |
| Review sandbox results | Malware analysis platform: sample > behavior report > extracted IoCs | Behavior, network indicators, file changes, and confidence notes are documented |
| Correlate cloud workload actions | Cloud audit or CWPP console: workload identity > API calls > resource changes | Unusual API calls are tied to workload identity, source, timestamp, and affected resource |
| Validate root-cause timeline | Incident case timeline: evidence source overlays by timestamp | Initial cause, propagation path, containment point, and recovery evidence are traceable |
What should a SOC check first when SIEM alerts suddenly drop after new log sources are added?
Check ingestion status, parser normalization, timestamp handling, required field mapping, log source health, and correlation rule dependencies.
SIEM detections depend on usable telemetry. Logs that arrive late, lack normalized fields, or use broken parsers may not trigger correlation rules even when security activity is present. CAS-005 operations questions frequently test data quality before alert tuning.
Demand Score: 93
Exam Relevance Score: 98
How should vulnerability findings be prioritized in security operations?
Prioritize by exploitability, asset criticality, exposure, business impact, active exploitation, compensating controls, and remediation feasibility.
Raw severity alone is not enough. A medium finding on an internet-facing critical asset with active exploitation may be more urgent than a higher-scored issue on an isolated low-value system. CAS-005 expects risk-based operational prioritization.
Demand Score: 92
Exam Relevance Score: 97
What is the best way to begin a threat hunt for suspected credential abuse?
Define a hypothesis and search identity, endpoint, network, and cloud telemetry for abnormal authentication and authorization patterns.
Threat hunting is hypothesis-driven. Useful indicators may include impossible travel, unusual token use, new privileged sessions, abnormal access times, suspicious MFA events, and first-time access to sensitive systems.
Demand Score: 89
Exam Relevance Score: 95
What evidence should be collected to reconstruct root cause after a cloud workload compromise?
Collect cloud audit logs, identity events, workload logs, network flow data, configuration changes, secret access records, and affected data access logs.
Cloud incidents often involve identity abuse, API calls, exposed secrets, role changes, or workload misconfiguration. Root cause reconstruction requires a timeline built from multiple trusted evidence sources instead of one isolated alert.
Demand Score: 90
Exam Relevance Score: 96
Why is chain of custody important during forensic response?
It documents who collected, handled, transferred, stored, and analyzed evidence so integrity and admissibility can be defended.
Forensic conclusions can be challenged if evidence handling is unclear. Chain of custody supports legal, regulatory, HR, and disciplinary processes by showing that evidence was protected from tampering, substitution, or confusion.
Demand Score: 84
Exam Relevance Score: 92
How should SOC metrics be used to improve incident response?
Track metrics such as mean time to detect, mean time to respond, false-positive rate, alert fidelity, coverage gaps, and recurrence of similar incidents.
Operations metrics should drive improvement rather than act as decoration for reporting. They help identify weak detections, overloaded analysts, missing telemetry, inefficient response steps, and controls that fail to prevent repeated incidents.
Demand Score: 86
Exam Relevance Score: 93