Exam Details

  • Exam Code
    :CAS-005
  • Exam Name
    :CompTIA SecurityX
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :261 Q&As
  • Last Updated
    :Mar 31, 2025

CompTIA CompTIA Certifications CAS-005 Questions & Answers

  • Question 91:

    A systems administrator wants to reduce the number of failed patch deployments in an organization. The administrator discovers that system owners modify systems or applications in an ad hoc manner.

    Which of the following is the best way to reduce the number of failed patch deployments?

    A. Compliance tracking

    B. Situational awareness

    C. Change management

    D. Quality assurance

  • Question 92:

    A central bank implements strict risk mitigations for the hardware supply chain, including an allow list for specific countries of origin. Which of the following best describes the cyberthreat to the bank?

    A. Ability to obtain components during wartime

    B. Fragility and other availability attacks

    C. Physical Implants and tampering

    D. Non-conformance to accepted manufacturing standards

  • Question 93:

    A company that relies on an COL system must keep it operating until a new solution is available

    Which of the following is the most secure way to meet this goal?

    A. Isolating the system and enforcing firewall rules to allow access to only required endpoints

    B. Enforcing strong credentials and improving monitoring capabilities

    C. Restricting system access to perform necessary maintenance by the IT team

    D. Placing the system in a screened subnet and blocking access from internal resources

  • Question 94:

    A security configure is building a solution to disable weak CBC configuration for remote access connections lo Linux systems.

    Which of the following should the security engineer modify?

    A. The /etc/openssl.conf file, updating the virtual site parameter

    B. The /etc/nsswith.conf file, updating the name server

    C. The /etc/hosts file, updating the IP parameter

    D. The /etc/etc/sshd, configure file updating the ciphers

  • Question 95:

    A vulnerability can on a web server identified the following:

    Which of the following actions would most likely eliminate on path decryption attacks? (Select two).

    A. Disallowing cipher suites that use ephemeral modes of operation for key agreement

    B. Removing support for CBC-based key exchange and signing algorithms

    C. Adding TLS_ECDHE_ECDSA_WITH_AE3_256_GCMS_HA256

    D. Implementing HIPS rules to identify and block BEAST attack attempts

    E. Restricting cipher suites to only allow TLS_RSA_WITH_AES_128_CBC_SHA

    F. Increasing the key length to 256 for TLS_RSA_WITH_AES_128_CBC_SHA

  • Question 96:

    A company is having issues with its vulnerability management program New devices/lPs are added and dropped regularly, making the vulnerability report inconsistent

    Which of the following actions should the company lake to most likely improve the vulnerability management process'

    A. Request a weekly report with all new assets deployed and decommissioned

    B. Extend the DHCP lease lime to allow the devices to remain with the same address for a longer period.

    C. Implement a shadow IT detection process to avoid rogue devices on the network

    D. Perform regular discovery scanning throughout the 11 landscape using the vulnerability management tool

  • Question 97:

    Within a SCADA a business needs access to the historian server in order together metric about the functionality of the environment.

    Which of the following actions should be taken to address this requirement?

    A. Isolating the historian server for connections only from The SCADA environment

    B. Publishing the C$ share from SCADA to the enterprise

    C. Deploying a screened subnet between 11 and SCADA

    D. Adding the business workstations to the SCADA domain

  • Question 98:

    While reviewing recent modem reports, a security officer discovers that several employees were contacted by the same individual who impersonated a recruiter.

    Which of the following best describes this type of correlation?

    A. Spear-phishing campaign

    B. Threat modeling

    C. Red team assessment

    D. Attack pattern analysis

  • Question 99:

    A security analyst reviews the following report:

    Which of the following assessments is the analyst performing?

    A. System

    B. Supply chain

    C. Quantitative

    D. Organizational

  • Question 100:

    A security officer received several complaints from users about excessive MPA push notifications at night The security team investigates and suspects malicious activities regarding user account authentication

    Which of the following is the best way for the security officer to restrict MI~A notifications''

    A. Provisioning FID02 devices

    B. Deploying a text message based on MFA

    C. Enabling OTP via email

    D. Configuring prompt-driven MFA

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.