Exam Details

  • Exam Code
    :CAS-005
  • Exam Name
    :CompTIA SecurityX
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :261 Q&As
  • Last Updated
    :Mar 31, 2025

CompTIA CompTIA Certifications CAS-005 Questions & Answers

  • Question 61:

    A security analyst discovers a new device on the company's dedicated IoT subnet during the most recent vulnerability scan. The scan results show numerous open ports and insecure protocols in addition to default usernames and passwords. A camera needs to transmit video to the security server in the IoT subnet. Which of the following should the security analyst recommend to securely operate the camera?

    A. Harden the camera configuration.

    B. Send camera logs to the SIEM.

    C. Encrypt the camera's video stream.

    D. Place the camera on an isolated segment.

  • Question 62:

    Which of the following is the main reason quantum computing advancements are leading companies and countries to deploy new encryption algorithms?

    A. Encryption systems based on large prime numbers will be vulnerable to exploitation

    B. Zero Trust security architectures will require homomorphic encryption.

    C. Perfect forward secrecy will prevent deployment of advanced firewall monitoring techniques

    D. Quantum computers will enable malicious actors to capture IP traffic in real time

  • Question 63:

    A compliance officer is responsible for selecting the right governance framework to protect individuals' data. Which of the following is the appropriate framework for the company to consult when collecting international user data for the

    purpose of processing credit cards?

    A. ISO 27001

    B. COPPA

    C. NIST 800-53

    D. PCI DSS

  • Question 64:

    To bring digital evidence in a court of law, the evidence must be:

    A. material.

    B. tangible.

    C. consistent.

    D. conserved.

  • Question 65:

    A company plans to implement a research facility with Intellectual property data that should be protected The following is the security diagram proposed by the security architect

    Which of the following security architect models is illustrated by the diagram?

    A. Identity and access management model

    B. Agent based security model

    C. Perimeter protection security model

    D. Zero Trust security model

  • Question 66:

    After some employees were caught uploading data to online personal storage accounts, a company becomes concerned about data leaks related to sensitive, internal documentation.

    Which of the following would the company most likely do to decrease this type of risk?

    A. Improve firewall rules to avoid access to those platforms.

    B. Implement a cloud-access security broker

    C. Create SIEM rules to raise alerts for access to those platforms

    D. Deploy an internet proxy that filters certain domains

  • Question 67:

    All organization is concerned about insider threats from employees who have individual access to encrypted material.

    Which of the following techniques best addresses this issue?

    A. SSO with MFA

    B. Sating and hashing

    C. Account federation with hardware tokens

    D. SAE

    E. Key splitting

  • Question 68:

    An organization is developing on Al-enabled digital worker to help employees complete common tasks such as template development, editing, research, and scheduling. As part of the Al workload the organization wants to Implement guardrails within the platform.

    Which of the following should the company do to secure the Al environment?

    A. Limn the platform's abilities to only non-sensitive functions

    B. Enhance the training model's effectiveness.

    C. Grant the system the ability to self-govern

    D. Require end-user acknowledgement of organizational policies.

  • Question 69:

    A user reports application access issues to the help desk. The help desk reviews the logs for the user

    Which of the following is most likely The reason for the issue?

    A. The user inadvertently tripped the impossible travel security rule in the SSO system.

    B. A threat actor has compromised the user's account and attempted to lop, m

    C. The user is not allowed to access the human resources system outside of business hours

    D. The user did not attempt to connect from an approved subnet

  • Question 70:

    An organization wants to manage specialized endpoints and needs a solution that provides the ability to:

    1.

    Centrally manage configurations

    2.

    Push policies.

    3.

    Remotely wipe devices

    4.

    Maintain asset inventory

    Which of the following should the organization do to best meet these requirements?

    A. Use a configuration management database

    B. Implement a mobile device management solution.

    C. Configure contextual policy management

    D. Deploy a software asset manager

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.