Exam Details

  • Exam Code
    :CAS-005
  • Exam Name
    :CompTIA SecurityX
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :261 Q&As
  • Last Updated
    :Mar 31, 2025

CompTIA CompTIA Certifications CAS-005 Questions & Answers

  • Question 141:

    Emails that the marketing department is sending to customers are pomp to the customers' spam folders. The security team is investigating the issue and discovers that the certificates used by the email server were reissued, but DNS records had not been updated.

    Which of the following should the security team update in order to fix this issue? (Select three.)

    A. DMARC

    B. SPF

    C. DKIM

    D. DNSSEC

    E. SASC

    F. SAN

    G. SOA

    H. MX

  • Question 142:

    A systems engineer is configuring a system baseline for servers that will provide email services. As part of the architecture design, the engineer needs to improve performance of the systems by using an access vector cache, facilitating mandatory access control and protecting against:

    1.

    Unauthorized reading and modification of data and programs

    2.

    Bypassing application security mechanisms

    3.

    Privilege escalation

    4.

    interference with other processes

    Which of the following is the most appropriate for the engineer to deploy?

    A. SELinux

    B. Privileged access management

    C. Self-encrypting disks

    D. NIPS

  • Question 143:

    A hospital provides tablets to its medical staff to enable them to more quickly access and edit patients' charts. The hospital wants to ensure that if a tablet is Identified as lost or stolen and a remote command is issued, the risk of data loss can be mitigated within seconds. The tablets are configured as follows to meet hospital policy

    1.

    Full disk encryption is enabled

    2.

    Always O"; corporate VPN is enabled

    3.

    ef-use-backed keystore is enabled'ready.

    4.

    Wi-Fi 6 is configured with SAE.

    5.

    Location services is disabled.

    6.

    Application allow list is configured

    A. Revoking the user certificates used for VPN and Wi-Fi access

    B. Performing cryptographic obfuscation

    C. Using geolocation to find the device

    D. Configuring the application allow list to only per mil emergency calls

    E. Returning on the device's solid-state media to zero

  • Question 144:

    Company A and Company D ate merging Company A's compliance reports indicate branch protections are not in place A security analyst needs to ensure that potential threats to the software development life cycle are addressed.

    Which of the following should me analyst cons

    A. If developers are unable to promote to production

    B. If DAST code is being stored to a single code repository

    C. If DAST scans are routinely scheduled D. If role-based training is deployed

  • Question 145:

    A security analyst is reviewing the following log:

    Which of the following possible events should the security analyst investigate further?

    A. A macro that was prevented from running

    B. A text file containing passwords that were leaked

    C. A malicious file that was run in this environment

    D. A PDF that exposed sensitive information improperly

  • Question 146:

    A company wants to use loT devices to manage and monitor thermostats at all facilities The thermostats must receive vendor security updates and limit access to other devices within the organization

    Which of the following best addresses the company's requirements''

    A. Only allowing Internet access to a set of specific domains

    B. Operating lot devices on a separate network with no access to other devices internally

    C. Only allowing operation for loT devices during a specified time window

    D. Configuring IoT devices to always allow automatic updates

  • Question 147:

    A company's SICM Is continuously reporting false positives and false negatives The security operations team has Implemented configuration changes to troubleshoot possible reporting errors

    Which of the following sources of information best supports the required analysts process? (Select two).

    A. Third-party reports and logs

    B. Trends

    C. Dashboards

    D. Alert failures

    E. Network traffic summaries

    F. Manual review processes

  • Question 148:

    An organization mat performs real-time financial processing is implementing a new backup solution Given the following business requirements?

    1.

    The backup solution must reduce the risk for potential backup compromise

    2.

    The backup solution must be resilient to a ransomware attack.

    3.

    The time to restore from backups is less important than the backup data integrity

    4.

    Multiple copies of production data must be maintained

    Which of the following backup strategies best meets these requirement?

    A. Creating a secondary, immutable storage array and updating it with live data on a continuous basis

    B. Utilizing two connected storage arrays and ensuring the arrays constantly sync

    C. Enabling remote journaling on the databases to ensure real-time transactions are mirrored

    D. Setting up antitempering on the databases to ensure data cannot be changed unintentionally

  • Question 149:

    Which of the following is the security engineer most likely doing?

    A. Assessing log in activities using geolocation to tune impossible Travel rate alerts

    B. Reporting on remote log-in activities to track team metrics

    C. Threat hunting for suspicious activity from an insider threat

    D. Baselining user behavior to support advanced analytics

  • Question 150:

    An organization is required to

    1.

    Respond to internal and external inquiries in a timely manner

    2.

    Provide transparency.

    3.

    Comply with regulatory requirements

    The organization has not experienced any reportable breaches but wants to be prepared if a breach occurs in the future.

    Which of the following is the best way for the organization to prepare?

    A. Outsourcing the handling of necessary regulatory filing to an external consultant

    B. Integrating automated response mechanisms into the data subject access request process

    C. Developing communication templates that have been vetted by internal and external counsel

    D. Conducting lessons-learned activities and integrating observations into the crisis management plan

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.