Exam Details

  • Exam Code
    :CAS-005
  • Exam Name
    :CompTIA SecurityX
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :261 Q&As
  • Last Updated
    :Mar 31, 2025

CompTIA CompTIA Certifications CAS-005 Questions & Answers

  • Question 121:

    An engineering team determines the cost to mitigate certain risks is higher than the asset values The team must ensure the risks are prioritized appropriately.

    Which of the following is the best way to address the issue?

    A. Data labeling

    B. Branch protection

    C. Vulnerability assessments

    D. Purchasing insurance

  • Question 122:

    A software engineer is creating a CI/CD pipeline to support the development of a web application The DevSecOps team is required to identify syntax errors

    Which of the following is the most relevant to the DevSecOps team's task'

    A. Static application security testing

    B. Software composition analysis

    C. Runtime application self-protection

    D. Web application vulnerability scanning

  • Question 123:

    An incident response team is analyzing malware and observes the following:

    1.

    Does not execute in a sandbox

    2.

    No network loCs

    3.

    No publicly known hash match

    4.

    No process injection method detected

    Which of the following should the team do next to proceed with further analysis?

    A. Use an online vims analysis tool to analyze the sample

    B. Check for an anti-virtualization code in the sample

    C. Utilize a new deployed machine to run the sample.

    D. Search oilier internal sources for a new sample.

  • Question 124:

    A security engineer wants to reduce the attack surface of a public-facing containerized application

    Which of the following will best reduce the application's privilege escalation attack surface?

    A. Implementing the following commands in the Dockerfile: RUN echo user:x:1000:1000iuser:/home/user:/dew/null > /ete/passwd

    B. Installing an EDR on the container's host with reporting configured to log to a centralized SIFM and Implementing the following alerting rules TF PBOCESS_USEB=rooC ALERT_TYPE=critical

    C. Designing a muiticontainer solution, with one set of containers that runs the mam application, and another set oi containers that perform automatic remediation by replacing compromised containers or disabling compromised accounts

    D. Running the container in an isolated network and placing a load balancer in a public- facing network. Adding the following ACL to the load balancer: PZRKZI HTTES from 0-0.0.0.0/0 pert 443

  • Question 125:

    A security engineer needs 10 secure the OT environment based on me following requirements

    1.

    Isolate the OT network segment

    2.

    Restrict Internet access.

    3.

    Apply security updates two workstations

    4.

    Provide remote access to third-party vendors

    Which of the following design strategies should the engineer implement to best meet these requirements?

    A. Deploy a jump box on the third party network to access the OT environment and provide updates using a physical delivery method on the workstations

    B. Implement a bastion host in the OT network with security tools in place to monitor access and use a dedicated update server for the workstations.

    C. Enable outbound internet access on the OT firewall to any destination IP address and use the centralized update server for the workstations

    D. Create a staging environment on the OT network for the third-party vendor to access and enable automatic updates on the workstations.

  • Question 126:

    The material finding from a recent compliance audit indicate a company has an issue with excessive permissions. The findings show that employees changing roles or departments results in privilege creep.

    Which of the following solutions are the best ways to mitigate this issue? (Select two).

    A. Setting different access controls defined by business area

    B. Implementing a role-based access policy

    C. Designing a least-needed privilege policy

    D. Establishing a mandatory vacation policy

    E. Performing periodic access reviews

    F. Requiring periodic job rotation

  • Question 127:

    A security team is responding to malicious activity and needs to determine the scope of impact the malicious activity appears to affect certain version of an application used by the organization

    Which of the following actions best enables the team to determine the scope of Impact?

    A. Performing a port scan

    B. Inspecting egress network traffic

    C. Reviewing the asset inventory

    D. Analyzing user behavior

  • Question 128:

    A company receives reports about misconfigurations and vulnerabilities in a third-party hardware device that is part of its released products.

    Which of the following solutions is the best way for the company to identify possible issues at an earlier stage?

    A. Performing vulnerability tests on each device delivered by the providers

    B. Performing regular red-team exercises on the vendor production line

    C. Implementing a monitoring process for the integration between the application and the vendor appliance

    D. Implementing a proper supply chain risk management program

  • Question 129:

    A security engineer is given the following requirements:

    1.

    An endpoint must only execute Internally signed applications

    2.

    Administrator accounts cannot install unauthorized software.

    3.

    Attempts to run unauthorized software must be logged

    Which of the following best meets these requirements?

    A. Maintaining appropriate account access through directory management and controls

    B. Implementing a CSPM platform to monitor updates being pushed to applications

    C. Deploying an EDR solution to monitor and respond to software installation attempts

    D. Configuring application control with blocked hashes and enterprise-trusted root certificates

  • Question 130:

    A security analyst discovered requests associated with IP addresses known for born legitimate 3nd bot-related traffic.

    Which of the following should the analyst use to determine whether the requests are malicious?

    A. User-agent string

    B. Byte length of the request

    C. Web application headers

    D. HTML encoding field

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.