Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CAS-005 CompTIA SecurityX Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CAS-005 Practice Questions

CompTIA SecurityX Certification Exam

Last Update 4 days ago
Total Questions : 344

Dive into our fully updated and stable CAS-005 practice test platform, featuring all the latest CompTIA CASP exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free CompTIA CASP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CAS-005. Use this test to pinpoint which areas you need to focus your study on.

CAS-005 PDF

CAS-005 PDF (Printable)
$43.75
$124.99

CAS-005 Testing Engine

CAS-005 PDF (Printable)
$50.75
$144.99

CAS-005 PDF + Testing Engine

CAS-005 PDF (Printable)
$63.7
$181.99
Question # 41

Company A acquired Company

B.  

During an audit, a security engineer found Company B's environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B's infrastructure could be integrated into Company A's security program. Which of the following risk-handling techniques was used?

Options:

A.  

Accept

B.  

Avoid

C.  

Transfer

D.  

Mitigate

Discussion 0
Question # 42

A security analyst is reviewing the following code in the public repository for potential risk concerns:

typescript

CopyEdit

include bouncycastle-1.4.jar;

include jquery-2.0.2.jar;

public static void main() {...}

public static void territory() { ... }

public static void state() { ... }

public static String code = "init";

public static String access_token = "spat-hfeiw-sogur-werdb-werib";

Which of the following should the security analyst recommend first to remediate the vulnerability?

Options:

A.  

Developing role-based security awareness training

B.  

Revoking the secret used in the solution

C.  

Purging code from public view

D.  

Scanning the application with SAST

Discussion 0
Question # 43

An organization is developing an in-house software platform to support capital planning and reporting functions. In addition to role-based access controls and auditing/logging capabilities, the product manager must include requirements associated with archiving data and immutable backups. Which of the following organizational considerations are most likely associated with this requirement? (Select two)

Options:

A.  

Crypto-export management controls

B.  

Supply chain weaknesses

C.  

Device attestation

D.  

Quality assurance

E.  

Legal hold compliance

F.  

Ransomware resilience

Discussion 0
Question # 44

A company implemented a NIDS and a NIPS on the most critical environments. Since this implementation, the company has been experiencing network connectivity issues. Which of the following should the security architect recommend for a new NIDS/NIPS implementation?

Options:

A.  

Implementing the NIDS with a port mirror in the core switch and the NIPS in the main firewall

B.  

Implementing the NIDS and the NIPS together with the main firewall

C.  

Implementing a NIDS without a NIPS to increase the detection capability

D.  

Implementing the NIDS in the bastion host and the NIPS in the branch network router

Discussion 0
Question # 45

A security engineer needs to review the configurations of several devices on the network to meet the following requirements:

• The PostgreSQL server must only allow connectivity in the 10.1.2.0/24

subnet.

• The SSH daemon on the database server must be configured to listen

to port 4022.

• The SSH daemon must only accept connections from a Single

workstation.

• All host-based firewalls must be disabled on all workstations.

• All devices must have the latest updates from within the past eight

days.

•All HDDs must be configured to secure data at rest.

• Cleartext services are not allowed.

• All devices must be hardened when possible.

Instructions:

Click on the various workstations and network devices to review the posture assessment results. Remediate any possible issues or indicate that no issue is found.

Click on Server A to review output data. Select commands in the appropriate tab to remediate connectivity problems to the pOSTGREsql DATABASE VIA ssh

Question # 45

WAP A

Question # 45

PC A

Question # 45

Laptop A

Question # 45

Switch A

Question # 45

Switch B:

Question # 45

Laptop B

Question # 45

PC B

Question # 45

PC C

Question # 45

Server A

Question # 45

Question # 45

Question # 45

Question # 45

Question # 45

Options:

Discussion 0
Question # 46

An analyst reviews a SIEM and generates the following report:

Question # 46

OnlyHOST002is authorized for internet traffic. Which of the following statements is accurate?

Options:

A.  

The VM002 host is misconfigured and needs to be revised by the network team.

B.  

The HOST002 host is under attack, and a security incident should be declared.

C.  

The SIEM platform is reporting multiple false positives on the alerts.

D.  

The network connection activity is unusual, and a network infection is highly possible.

Discussion 0
Question # 47

Emails that the marketing department is sending to customers are going to the customers' spam folders. The security team is investigating the issue and discovers that the certificates used by the email server were reissued, but DNS records had not been updated. Which of the following should the security team update in order to fix this issue? (Select three).

Options:

A.  

DMARC

B.  

SPF

C.  

DKIM

D.  

DNSSEC

E.  

SASE

F.  

SAN

G.  

SOA

Discussion 0
Question # 48

Users are willing passwords on paper because of the number of passwords needed in an environment. Which of the following solutions is the best way to manage this situation and decrease risks?

Options:

A.  

Increasing password complexity to require 31 least 16 characters

B.  

implementing an SSO solution and integrating with applications

C.  

Requiring users to use an open-source password manager

D.  

Implementing an MFA solution to avoid reliance only on passwords

Discussion 0
Question # 49

A security manager at a local hospital wants to secure patient medical records. The manager needs to:

• Choose an access control model that clearly defines who has access to sensitive information.

• Prevent those who enter new patient information from specifying who has access to this data.

Which of the following access control models is the best way to ensure the lowest risk of granting unintentional access?

Options:

A.  

Rule-based

B.  

Attribute-based

C.  

Mandatory

D.  

Discretionary

Discussion 0
Question # 50

An organization must provide access to its internal system data. The organization requires that this access complies with the following:

    Access must be automated.

    Data confidentiality must be preserved.

    Access must be authenticated.

    Data must be preprocessed before it is retrieved.

Which of the following actions should the organization take to meet these requirements?

Options:

A.  

Configure a reverse proxy to protect the data.

B.  

Implement an on-demand VPN connection.

C.  

Deploy an API gateway protected with access tokens.

D.  

Continually publish all relevant data to a CDN.

Discussion 0
Get CAS-005 dumps and pass your exam in 24 hours!

Free Exams Sample Questions