Exam Details

  • Exam Code
    :CAS-005
  • Exam Name
    :CompTIA SecurityX
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :261 Q&As
  • Last Updated
    :Mar 31, 2025

CompTIA CompTIA Certifications CAS-005 Questions & Answers

  • Question 51:

    A software development company needs to mitigate third-party risks to its software supply chain. Which of the following techniques should the company use in the development environment to best meet this objective?

    A. Performing software composition analysis

    B. Requiring multifactor authentication

    C. Establishing coding standards and monitoring for compliance

    D. Implementing a robust unit and regression-testing scheme

  • Question 52:

    A company recently migrated its critical web application to a cloud provider's environment. As part of the company's risk management program, the company intends to conduct an external penetration test. According to the scope of work and the rules of engagement, the penetration tester will validate the web application's security and check for opportunities to expose sensitive company information in the newly migrated cloud environment. Which of the following should be the first consideration prior to engaging in the test?

    A. Prepare a redundant server to ensure the critical web application's availability during the test.

    B. Obtain agreement between the company and the cloud provider to conduct penetration testing.

    C. Ensure the latest patches and signatures are deployed on the web server.

    D. Create an NDA between the external penetration tester and the company.

  • Question 53:

    A recent batch of bug bounty findings indicates a systematic issue related to directory traversal. A security engineer needs to prevent flawed code from being deployed into production. Which of the following is the best mitigation strategy for the engineer?

    A. Setting up secure development training with a focus on filesystem access issues

    B. Implementing static code analysis testing into the CI/CD pipeline and blocking based on findings

    C. Using a software composition analysis tool to look for directory traversal issues in the application

    D. Developing a secure library for filesystem access and blocking builds that do not use the library

    E. Leveraging a dynamic application security testing tool to uncover issues related to directory traversal

  • Question 54:

    An organization developed a containerized application. The organization wants to run the application in the cloud and automatically scale it based on demand. The security operations team would like to use container orchestration but does not want to assume patching responsibilities. Which of the following service models best meets these requirements?

    A. PaaS

    B. SaaS

    C. IaaS

    D. MaaS

  • Question 55:

    A control systems analyst is reviewing the defensive posture of engineering workstations on the shop floor. Upon evaluation, the analyst makes the following observations:

    1.

    Unsupported, end-of-life operating systems were still prevalent on the shop floor.

    2.

    There are no security controls for systems with supported operating systems.

    3.

    There is little uniformity of installed software among the workstations.

    Which of the following would have the greatest impact on the attack surface?

    A. Deploy antivirus software to all of the workstations.

    B. Increase the level of monitoring on the workstations.

    C. Utilize network-based allow and block lists.

    D. Harden all of the engineering workstations using a common strategy.

  • Question 56:

    After investigating a recent security incident, a SOC analyst is charged with creating a reference guide for the entire team to use. Which of the following should the analyst create to address future incidents?

    A. Root cause analysis

    B. Communication plan

    C. Runbook

    D. Lessons learned

  • Question 57:

    A common industrial protocol has the following characteristics:

    1.

    Provides for no authentication/security

    2.

    Is often implemented in a client/server relationship

    3.

    Is implemented as either RTU or TCP/IP

    Which of the following is being described?

    A. Profinet

    B. Modbus

    C. Zigbee

    D. Z-Wave

  • Question 58:

    IoCs were missed during a recent security incident due to the reliance on a signature-based detection platform. A security engineer must recommend a solution that can be implemented to address this shortcoming. Which of the following would be the most appropriate recommendation?

    A. FIM

    B. SASE

    C. UEBA

    D. CSPM

    E. EAP

  • Question 59:

    An application engineer is using the Swagger framework to leverage REST APIs to authenticate endpoints. The engineer is receiving HTTP 403 responses. Which of the following should the engineer do to correct this issue? (Choose two.)

    A. Obtain a security token.

    B. Obtain a public key.

    C. Leverage Kerberos for authentication

    D. Leverage OAuth for authentication.

    E. Leverage LDAP for authentication.

    F. Obtain a hash value.

  • Question 60:

    A company's software developers have indicated that the security team takes too long to perform application security tasks. A security analyst plans to improve the situation by implementing security into the SDLC. The developers have the following requirements:

    1.

    The solution must be able to initiate SQL injection and reflected XSS attacks.

    2.

    The solution must ensure the application is not susceptible to memory leaks.

    Which of the following should be implemented to meet these requirements? (Choose two.)

    A. Side-channel analysis

    B. Protocol scanner

    C. HTTP interceptor

    D. DAST

    E. Fuzz testing

    F. SAST

    G. SCAP

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.