Exam Details

  • Exam Code
    :CAS-005
  • Exam Name
    :CompTIA SecurityX
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :261 Q&As
  • Last Updated
    :Mar 31, 2025

CompTIA CompTIA Certifications CAS-005 Questions & Answers

  • Question 131:

    A security architect for a global organization with a distributed workforce recently received funding lo deploy a CASB solution

    Which of the following most likely explains the choice to use a proxy-based CASB?

    A. The capability to block unapproved applications and services is possible

    B. Privacy compliance obligations are bypassed when using a user-based deployment.

    C. Protecting and regularly rotating API secret keys requires a significant time commitment

    D. Corporate devices cannot receive certificates when not connected to on-premises devices

  • Question 132:

    Which of the following AI concerns is most adequately addressed by input sanitation?

    A. Model inversion

    B. Prompt Injection

    C. Data poisoning

    D. Non-explainable model

  • Question 133:

    Recent repents indicate that a software tool is being exploited Attackers were able to bypass user access controls and load a database. A security analyst needs to find the vulnerability and recommend a mitigation. The analyst generates the following output: Which of the following would the analyst most likely recommend?

    A. Installing appropriate EDR tools to block pass-the-hash attempts

    B. Adding additional time to software development to perform fuzz testing

    C. Removing hard coded credentials from the source code

    D. Not allowing users to change their local passwords

  • Question 134:

    After an incident response exercise, a security administrator reviews the following table:

    Which of the following should the administrator do to beat support rapid incident response in the future?

    A. Automate alerting to IT support for phone system outages.

    B. Enable dashboards for service status monitoring

    C. Send emails for failed log-In attempts on the public website

    D. Configure automated Isolation of human resources systems

  • Question 135:

    Audit findings indicate several user endpoints are not utilizing full disk encryption During me remediation process, a compliance analyst reviews the testing details for the endpoints and notes the endpoint device configuration does not support full disk encryption

    Which of the following is the most likely reason me device must be replaced'

    A. The HSM is outdated and no longer supported by the manufacturer

    B. The vTPM was not properly initialized and is corrupt.

    C. The HSM is vulnerable to common exploits and a firmware upgrade is needed

    D. The motherboard was not configured with a TPM from the OEM supplier.

    E. The HSM does not support sealing storage

  • Question 136:

    A security analyst is reviewing the following authentication logs: Which of the following should the analyst do first?

    A. Disable User2's account

    B. Disable User12's account

    C. Disable User8's account

    D. Disable User1's account

  • Question 137:

    A security engineer performed a code scan that resulted in many false positives. The security engineer must find a solution that improves the quality of scanning results before application deployment.

    Which of the following is the best solution?

    A. Limiting the tool to a specific coding language and tuning the rule set

    B. Configuring branch protection rules and dependency checks

    C. Using an application vulnerability scanner to identify coding flaws in production

    D. Performing updates on code libraries before code development

  • Question 138:

    A security analyst wants to use lessons learned from a poor incident response to reduce dwell lime in the future The analyst is using the following data points

    Which of the following would the analyst most likely recommend?

    A. Adjusting the SIEM to alert on attempts to visit phishing sites

    B. Allowing TRACE method traffic to enable better log correlation

    C. Enabling alerting on all suspicious administrator behavior

    D. utilizing allow lists on the WAF for all users using GFT methods

  • Question 139:

    During a security assessment using an CDR solution, a security engineer generates the following report about the assets in me system: After five days, the EDR console reports an infection on the host 0WIN23 by a remote access Trojan Which of the following is the most probable cause of the infection?

    A. OW1N23 uses a legacy version of Windows that is not supported by the EDR

    B. LN002 was not supported by the EDR solution and propagates the RAT

    C. The EDR has an unknown vulnerability that was exploited by the attacker.

    D. 0W1N29 spreads the malware through other hosts in the network

  • Question 140:

    A developer needs to improve the cryptographic strength of a password-storage component in a web application without completely replacing the crypto-module. Which of the following is the most appropriate technique?

    A. Key splitting

    B. Key escrow

    C. Key rotation

    D. Key encryption

    E. Key stretching

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.