Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CAS-005 CompTIA SecurityX Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CAS-005 Practice Questions

CompTIA SecurityX Certification Exam

Last Update 4 days ago
Total Questions : 344

Dive into our fully updated and stable CAS-005 practice test platform, featuring all the latest CompTIA CASP exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free CompTIA CASP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CAS-005. Use this test to pinpoint which areas you need to focus your study on.

CAS-005 PDF

CAS-005 PDF (Printable)
$43.75
$124.99

CAS-005 Testing Engine

CAS-005 PDF (Printable)
$50.75
$144.99

CAS-005 PDF + Testing Engine

CAS-005 PDF (Printable)
$63.7
$181.99
Question # 61

All organization is concerned about insider threats from employees who have individual access to encrypted material. Which of the following techniques best addresses this issue?

Options:

A.  

SSO with MFA

B.  

Sating and hashing

C.  

Account federation with hardware tokens

D.  

SAE

E.  

Key splitting

Discussion 0
Question # 62

You are a security analyst tasked with interpreting an Nmap scan output from company’s privileged network.

The company’s hardening guidelines indicate the following:

There should be one primary server or service per device.

Only default ports should be used.

Non-secure protocols should be disabled.

INSTRUCTIONS

Using the Nmap output, identify the devices on the network and their roles, and any open ports that should be closed.

For each device found by Nmap, add a device entry to the Devices Discovered list, with the following information:

The IP address of the device

The primary server or service of the device (Note that each IP should by associated with one service/port only)

The protocol(s) that should be disabled based on the hardening guidelines (Note that multiple ports may need to be closed to comply with the hardening guidelines)

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 62

Question # 62

Options:

Discussion 0
Question # 63

An application requires the storage of PII. A systems engineer needs to implement a solution that uses an external device for key management. Which of the following is the best solution?

Options:

A.  

TPM

B.  

SBoM

C.  

vTPM

D.  

HSM

Discussion 0
Question # 64

An organization is planning for disaster recovery and continuity ofoperations, and has noted the following relevant findings:

1. A natural disaster may disrupt operations at Site A, which would then cause an evacuation. Users are

unable to log into the domain from-their workstations after relocating to Site

B.  

2. A natural disaster may disrupt operations at Site A, which would then cause the pump room at Site B

to become inoperable.

3. A natural disaster may disrupt operations at Site A, which would then cause unreliable internet

connectivity at Site B due to route flapping.

INSTRUCTIONS

Match each relevant finding to the affected host by clicking on the host name and selecting the appropriate number.

For findings 1 and 2, select the items that should be replicated to Site

B.  

For finding 3, select the item requiring configuration changes, then select the appropriate corrective action from the drop-down menu.

Question # 64

Question # 64

Options:

Discussion 0
Question # 65

A security operations engineer needs to prevent inadvertent data disclosure when encrypted SSDs are reused within an enterprise. Which of the following is the most secure way to achieve this goal?

Options:

A.  

Executing a script that deletes and overwrites all data on the SSD three times

B.  

Wiping the SSD through degaussing

C.  

Securely deleting the encryption keys used by the SSD

D.  

Writing non-zero, random data to all cells of the SSD

Discussion 0
Question # 66

Embedded malware has been discovered in a popular PDF reader application and is currently being exploited in the wild. Because the supply chain was compromised, this malware is present in versions 10.0 through 10.3 of the software's official versions. The malware is not present in version 10.4.

Since the details around this malware are still emerging, the Chief Information Security Officer has asked the senior security analyst to collaborate with the IT asset inventory manager to find instances of the installed software in order to begin response activities. The asset inventory manager has asked an analyst to provide a regular expression that will identify the affected versions. The software installation entries are formatted as follows:

Reader 10.0

Reader 10.1

Reader 10.2

Reader 10.3

Reader 10.4

Which of the following regular expression entries will accuratelyidentify all the affected versions?

Options:

A.  

Reader(*)[1][0].[0-4:

B.  

Reader[11[01X.f0-3'

C.  

Reader( )[1][0].[0-3:

D.  

Reader( )[1][0] X.[1-3:

Discussion 0
Question # 67

A security engineer must resolve a vulnerability in a deprecated version of Python for a custom-developed flight simul-ation application that is monitored and controlled remotely. The source code is proprietary and built with Python functions running on the Ubuntu operating system. Version control is not enabled for the application in development or production. However, the application must remain online in the production environment using built-in features. Which of the following solutions best reduces theattack surface of these issues and meets the outlined requirements?

Options:

A.  

Configure code-signing within the CI/CD pipeline, update Python with aptitude, and update modules with pip in a test environment. Deploy the solution to production.

B.  

Enable branch protection in the GitHub repository. Update Python with aptitude, and update modules with pip in a test environment. Deploy the solution to production.

C.  

Use an NFS network share. Update Python with aptitude, and update modules with pip in a test environment. Deploy the solution to production.

D.  

Configure version designation within the Python interpreter. Update Python with aptitude, and update modules with pip in a test environment. Deploy the solution to production.

Discussion 0
Question # 68

A large organization deployed a generative AI platform for its global user population to use. Based on feedback received during beta testing, engineers have identified issues with user interface latency and page-loading performance for international users. The infrastructure is currently maintained within two separate data centers, which are connected using high-availability networking and load balancers. Which of the following is the best way to address the performance issues?

Options:

A.  

Configuring the application to use a CDN

B.  

Implementing RASP to enable large language models queuing

C.  

Remote journaling within a third data center

D.  

Traffic shaping through the use of a SASE

Discussion 0
Question # 69

Which of the following best describes the challenges associated with widespread adoption of homomorphic encryption techniques?

Options:

A.  

Incomplete mathematical primitives

B.  

No use cases to drive adoption

C.  

Quantum computers not yetcapable

D.  

insufficient coprocessor support

Discussion 0
Question # 70

A security engineer needs to remediate a SWEET32 vulnerability in an OpenSSH-based application and review existing configurations. Which of the following should the security engineer do? (Select two.)

Options:

A.  

Disable Twofish algorithms

B.  

cat /etc/ashd/ash_config | grep "HMAC"

C.  

Disable RSA algorithms

D.  

cat /etc/sshd/ssh_config | grep "PermitRootLogin"

E.  

Disable 3DES algorithms

F.  

cat /etc/sshd/ssh_config | grep "Ciphers"

Discussion 0
Get CAS-005 dumps and pass your exam in 24 hours!

Free Exams Sample Questions