A risk assessment determined that company data was leaked to the general public during a migration. Which of the following best explains the root cause of this issue?
A. Incomplete firewall rules between the CSP and on-premises infrastructure
B. Insufficient logging of cloud activities to company SIEM
C. Failure to implement full disk encryption to on-premises data storage
D. Misconfiguration of access controls on cloud storage containers
Recently, two large engineering companies in the same line of business decided to approach cyberthreats in a united way. Which of the following best describes this unified approach?
A. NDA
B. ISA
C. SLA
D. MOU
A security analyst is reviewing suspicious emails that were forwarded by users. Which of the following is the best method for the analyst to use when reviewing attachments that came with these emails?
A. Reverse engineering
B. Protocol analysis
C. Sandboxing
D. Fuzz testing
E. Steganography
The Chief Information Security Officer (CISO) is working with a new company and needs a legal document to ensure all parties understand their roles during an assessment. Which of the following should the CISO have each party sign?
A. SLA
B. ISA
C. Permissions and access
D. Rules of engagement
A security officer at an organization that makes and sells digital artwork must ensure the integrity of the artwork can be maintained. Which of the following are the best ways for the security officer to accomplish this task? (Choose two.)
A. Hashing
B. ECC
C. IPSec
D. Tokenization
E. Watermarking
F. Print blocking
Which of the following industrial protocols is most likely to be found in public utility applications, such as water or electric?
A. CIP
B. Zigbee
C. Modbus
D. DNP3
A security engineer evaluates the overall security of a custom mobile gaming application and notices that developers are bringing in a large number of open-source packages without appropriate patch management. Which of the following would the engineer most likely recommend for uncovering known vulnerabilities in the packages?
A. Leverage an exploitation framework to uncover vulnerabilities.
B. Use fuzz testing to uncover potential vulnerabilities in the application.
C. Utilize a software composition analysis tool to report known vulnerabilities.
D. Reverse engineer the application to look for vulnerable code paths.
E. Analyze the use of an HTTP intercepting proxy to dynamically uncover issues.
A commercial OSINT provider utilizes and reviews data from various sources of publicly available information. The provider is transitioning the subscription service to a model that limit's the scope of available data based on subscription tier. Which of the following approaches would best ensure subscribers are only granted access to data associated with their tier? (Choose two.)
A. Storing collected data on separate physical media per tier
B. Controlling access to data based on the role of users
C. Employing attribute-based access control
D. Implementing a behavior-based IDS positioned at the storage network gateway
E. Establishing a classification and labeling scheme
F. Implementing a mandatory access control scheme
Following a Log4j outbreak, several network appliances were not managed and remained undetected despite an application inventory system being in place. Which of the following solutions should the security director recommend to best understand the composition of applications on unmanaged devices?
A. Protocol analyzer
B. Package monitoring
C. Software bill of materials
D. Fuzz testing
A company is rewriting a vulnerable application and adding the mprotect() system call in multiple parts of the application's code that was being leveraged by a recent exploitation tool. Which of the following should be enabled to ensure the application can leverage the new system call against similar attacks in the future?
A. TPM
B. Secure boot
C. NX bit
D. HSM
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.