Exam Details

  • Exam Code
    :CAS-005
  • Exam Name
    :CompTIA SecurityX
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :261 Q&As
  • Last Updated
    :Mar 31, 2025

CompTIA CompTIA Certifications CAS-005 Questions & Answers

  • Question 71:

    A security analyst Detected unusual network traffic related to program updating processes The analyst collected artifacts from compromised user workstations. The discovered artifacts were binary files with the same name as existing, valid binaries but. with different hashes which of the following solutions would most likely prevent this situation from reoccurring?

    A. Improving patching processes

    B. Implementing digital signature

    C. Performing manual updates via USB ports

    D. Allowing only dies from internal sources

  • Question 72:

    During a gap assessment, an organization notes that OYOD usage is a significant risk. The organization implemented administrative policies prohibiting BYOD usage However, the organization has not implemented technical controls to prevent the unauthorized use of BYOD assets when accessing the organization's resources.

    Which of the following solutions should the organization implement to best reduce the risk of OYOD devices? (Select two).

    A. Cloud 1AM to enforce the use of token based MFA

    B. Conditional access, to enforce user-to-device binding

    C. NAC, to enforce device configuration requirements

    D. PAM. to enforce local password policies

    E. SD-WAN. to enforce web content filtering through external proxies

    F. DLP, to enforce data protection capabilities

  • Question 73:

    A company lined an email service provider called my-email.com to deliver company emails. The company stalled having several issues during the migration. A security engineer is troubleshooting and observes the following configuration snippet:

    Which of the following should the security engineer modify to fix the issue? (Select two).

    A. The email CNAME record must be changed to a type A record pointing to 192.168.111

    B. The TXT record must be Changed to "v=dmarc ip4:192.168.1.10 include:my-email.com - all"

    C. The srvo1 A record must be changed to a type CNAME record pointing to the email server

    D. The email CNAME record must be changed to a type A record pointing to 192.168.1.10

    E. The TXT record must be changed to "v=dkim ip4:l92.168.1.11 include my-email.com - ell"

    F. The TXT record must be Changed to "v=dkim ip4:192.168.1.10 include:email-all"

    G. The srv01 A record must be changed to a type CNAME record pointing to the web01 server

  • Question 74:

    A cybersecurity architect is reviewing the detection and monitoring capabilities for a global company that recently made multiple acquisitions.

    The architect discovers that the acquired companies use different vendors for detection and monitoring

    The architect's goal is to:

    1.

    Create a collection of use cases to help detect known threats

    2.

    Include those use cases in a centralized library for use across all of the companies

    Which of the following is the best way to achieve this goal?

    A. Sigma rules

    B. Ariel Query Language

    C. UBA rules and use cases

    D. TAXII/STIX library

  • Question 75:

    A company wants to invest in research capabilities with the goal to operationalize the research output.

    Which of the following is the best option for a security architect to recommend?

    A. Dark web monitoring

    B. Threat intelligence platform

    C. Honeypots

    D. Continuous adversary emulation

  • Question 76:

    A company that uses containers to run its applications is required to identify vulnerabilities on every container image in a private repository The security team needs to be able to quickly evaluate whether to respond to a given vulnerability.

    Which of the following, will allow the security team to achieve the objective with the last effort?

    A. SAST scan reports

    B. Centralized SBoM

    C. CIS benchmark compliance reports

    D. Credentialed vulnerability scan

  • Question 77:

    An organization is looking for gaps in its detection capabilities based on the APTs that may target the industry

    Which of the following should the security analyst use to perform threat modeling?

    A. ATTandCK

    B. OWASP

    C. CAPEC

    D. STRIDE

  • Question 78:

    A security engineer is developing a solution to meet the following requirements?

    1.

    All endpoints should be able to establish telemetry with a SIEM.

    2.

    All endpoints should be able to be integrated into the XDR platform.

    3.

    SOC services should be able to monitor the XDR platform

    Which of the following should the security engineer implement to meet the requirements?

    A. CDR and central logging

    B. HIDS and vTPM

    C. WAF and syslog

    D. HIPS and host-based firewall

  • Question 79:

    A software development team requires valid data for internal tests. Company regulations, however do not allow the use of this data in cleartext.

    Which of the following solutions best meet these requirements?

    A. Configuring data hashing

    B. Deploying tokenization

    C. Replacing data with null record

    D. Implementing data obfuscation

  • Question 80:

    An organization is implementing Zero Trust architecture A systems administrator must increase the effectiveness of the organization's context-aware access system. Which of the following is the best way to improve the effectiveness of the system?

    A. Secure zone architecture

    B. Always-on VPN

    C. Accurate asset inventory

    D. Microsegmentation

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.