Exam Details

  • Exam Code
    :CAS-005
  • Exam Name
    :CompTIA SecurityX
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :261 Q&As
  • Last Updated
    :Mar 31, 2025

CompTIA CompTIA Certifications CAS-005 Questions & Answers

  • Question 171:

    A company wants to install a three-tier approach to separate the web. database, and application servers A security administrator must harden the environment which of the following is the best solution?

    A. Deploying a VPN to prevent remote locations from accessing server VLANs

    B. Configuring a SASb solution to restrict users to server communication

    C. Implementing microsegmentation on the server VLANs

    D. installing a firewall and making it the network core

  • Question 172:

    Asecuntv administrator is performing a gap assessment against a specific OS benchmark The benchmark requires the following configurations be applied to endpomts:

    1.

    Full disk encryption

    2.

    Host-based firewall

    3.

    Time synchronization

    4.

    Password policies

    5.

    Application allow listing

    6.

    Zero Trust application access

    Which of the following solutions best addresses the requirements? (Select two).

    A. CASB

    B. SBoM

    C. SCAP

    D. SASE

    E. HIDS

  • Question 173:

    SIMULATION A product development team has submitted code snippets for review prior to release. INSTRUCTIONS Analyze the code snippets, and then select one vulnerability, and one fix for each code snippet. Code Snippet 1

    Code Snippet 2

    Vulnerability 1:

    1.

    SQL injection

    2.

    Cross-site request forgery

    3.

    Server-side request forgery

    4.

    Indirect object reference

    5.

    Cross-site scripting

    Fix 1:

    1.

    Perform input sanitization of the userid field.

    2.

    Perform output encoding of queryResponse,

    3.

    Ensure usex:ia belongs to logged-in user.

    4.

    Inspect URLS and disallow arbitrary requests.

    5.

    Implement anti-forgery tokens.

    Vulnerability 2 1) Denial of service 2) Command injection 3) SQL injection 4) Authorization bypass 5) Credentials passed via GET

    Fix 2

    1.

    Implement prepared statements and bind variables.

    2.

    Remove the serve_forever instruction.

    3.

    Prevent the "authenticated" value from being overridden by a GET parameter.

    4.

    HTTP POST should be used for sensitive parameters.

    5.

    Perform input sanitization of the userid field.

    A. See the complete solution below in Explanation.

    B. PlaceHolder

    C. PlaceHolder

    D. PlaceHolder

  • Question 174:

    SIMULATION

    You are tasked with integrating a new B2B client application with an existing OAuth workflow that must meet the following requirements:

    1.

    The application does not need to know the users' credentials.

    2.

    An approval interaction between the users and the HTTP service must be orchestrated.

    3.

    The application must have limited access to users' data.

    INSTRUCTIONS

    Use the drop-down menus to select the action items for the appropriate locations. All placeholders must be filled.

    A. See the complete solution below in Explanation.

    B. PlaceHolder

    C. PlaceHolder

    D. PlaceHolder

  • Question 175:

    SIMULATION

    A security engineer needs to review the configurations of several devices on the network to meet the following requirements:

    1.

    The PostgreSQL server must only allow connectivity in the 10.1.2.0/24 subnet.

    2.

    The SSH daemon on the database server must be configured to listen to port 4022.

    3.

    The SSH daemon must only accept connections from a Single workstation.

    4.

    All host-based firewalls must be disabled on all workstations.

    5.

    All devices must have the latest updates from within the past eight days.

    6.

    All HDDs must be configured to secure data at rest.

    7.

    Cleartext services are not allowed.

    8.

    All devices must be hardened when possible.

    Instructions:

    Click on the various workstations and network devices to review the posture assessment results. Remediate any possible issues or indicate that no issue is found.

    Click on Server A to review output data. Select commands in the appropriate tab to remediate connectivity problems to the pOSTGREsql DATABASE VIA ssh

    WAP A

    PC A

    Laptop A

    Switch A

    Switch B:

    Laptop B

    PC B

    PC C

    Server A

    A. See the complete solution below in Explanation.

    B. PlaceHolder

    C. PlaceHolder

    D. PlaceHolder

  • Question 176:

    SIMULATION

    You are a security analyst tasked with interpreting an Nmap scan output from company's privileged network.

    The company's hardening guidelines indicate the following:

    There should be one primary server or service per device.

    Only default ports should be used.

    Non-secure protocols should be disabled.

    INSTRUCTIONS

    Using the Nmap output, identify the devices on the network and their roles, and any open ports that should be closed.

    For each device found by Nmap, add a device entry to the Devices Discovered list, with the following information:

    The IP address of the device

    The primary server or service of the device (Note that each IP should by associated with one service/port only)

    The protocol(s) that should be disabled based on the hardening guidelines (Note that multiple ports may need to be closed to comply with the hardening guidelines)

    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

    A. See the complete solution below in Explanation.

    B. PlaceHolder

    C. PlaceHolder

    D. PlaceHolder

  • Question 177:

    SIMULATION

    An organization is planning for disaster recovery and continuity of operations, and has noted the following relevant findings:

    1.

    A natural disaster may disrupt operations at Site A, which would then cause an evacuation. Users are unable to log into the domain from-their workstations after relocating to Site B.

    2.

    A natural disaster may disrupt operations at Site A, which would then cause the pump room at Site B to become inoperable.

    3.

    A natural disaster may disrupt operations at Site A, which would then cause unreliable internet connectivity at Site B due to route flapping.

    INSTRUCTIONS

    Match each relevant finding to the affected host by clicking on the host name and selecting the appropriate number.

    For findings 1 and 2, select the items that should be replicated to Site B. For finding 3, select the item requiring configuration changes, then select the appropriate corrective action from the drop-down menu.

    A. See the complete solution below in Explanation.

    B. PlaceHolder

    C. PlaceHolder

    D. PlaceHolder

  • Question 178:

    SIMULATION

    During the course of normal SOC operations, three anomalous events occurred and were flagged as potential IoCs. Evidence for each of these potential IoCs is provided.

    INSTRUCTIONS

    Review each of the events and select the appropriate analysis and remediation options for each IoC.

    A. See the complete solution below in Explanation.

    B. PlaceHolder

    C. PlaceHolder

    D. PlaceHolder

  • Question 179:

    SIMULATION

    An IPSec solution is being deployed. The configuration files for both the VPN concentrator and the AAA server are shown in the diagram.

    Complete the configuration files to meet the following requirements:

    1.

    The EAP method must use mutual certificate-based authentication (With issued client certificates).

    2.

    The IKEv2 Cipher suite must be configured to the MOST secure authenticated mode of operation,

    3.

    The secret must contain at least one uppercase character, one lowercase character, one numeric character, and one special character, and it must meet a minimum length requirement of eight characters,

    INSTRUCTIONS

    Click on the AAA server and VPN concentrator to complete the configuration.

    Fill in the appropriate fields and make selections from the drop-down menus.

    VPN Concentrator:

    AAA Server:

    A. See the complete solution below in Explanation.

    B. PlaceHolder

    C. PlaceHolder

    D. PlaceHolder

  • Question 180:

    SIMULATION

    As a security administrator, you are asked to harden a server running Red Hat Enterprise Server 5.5 64-bit.

    This server is being used as a DNS and time server. It is not used as a database, web server, or print server. There are no wireless connections to the server, and it does not need to print.

    The command window will be provided along with root access. You are connected via a secure shell with root access.

    You may query help for a list of commands.

    Instructions:

    You need to disable and turn off unrelated services and processes.

    It is possible to simulate a crash of your server session. The simulation can be reset, but the server cannot be rebooted. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

    A. See the complete solution below in Explanation.

    B. PlaceHoder

    C. PlaceHoder

    D. PlaceHoder

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.