CompTIA CAS-005 CompTIA SecurityX Certification Exam Online Training
CompTIA CAS-005 Online Training
The questions for CAS-005 were last updated at Feb 20,2025.
- Exam Code: CAS-005
- Exam Name: CompTIA SecurityX Certification Exam
- Certification Provider: CompTIA
- Latest update: Feb 20,2025
A company is having issues with its vulnerability management program New devices/lPs are added and dropped regularly, making the vulnerability report inconsistent.
Which of the following actions should the company lake to most likely improve the vulnerability management process?
- A . Request a weekly report with all new assets deployed and decommissioned
- B . Extend the DHCP lease lime to allow the devices to remain with the same address for a longer period.
- C . Implement a shadow IT detection process to avoid rogue devices on the network
- D . Perform regular discovery scanning throughout the 11 landscape using the vulnerability management tool
After remote desktop capabilities were deployed in the environment, various vulnerabilities were noticed.
• Exfiltration of intellectual property
• Unencrypted files
• Weak user passwords
Which of the following is the best way to mitigate these vulnerabilities? (Select two).
- A . Implementing data loss prevention
- B . Deploying file integrity monitoring
- C . Restricting access to critical file services only
- D . Deploying directory-based group policies
- E . Enabling modem authentication that supports MFA
- F . Implementing a version control system
- G . Implementing a CMDB platform
An organization is planning for disaster recovery and continuity of operations.
INSTRUCTIONS
Review the following scenarios and instructions. Match each relevant finding to the affected host.
After associating scenario 3 with the appropriate host(s), click the host to select the appropriate corrective action for that finding.
Each finding may be used more than once.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A financial services organization is using Al lo fully automate the process of deciding client loan rates.
Which of the following should the organization be most concerned about from a privacy perspective?
- A . Model explainability
- B . Credential Theft
- C . Possible prompt Injections
- D . Exposure to social engineering
A security analyst received a report that an internal web page is down after a company-wide update to the web browser Given the following error message:
Which of the following is the b«« way to fix this issue?
- A . Rewriting any legacy web functions
- B . Disabling all deprecated ciphers
- C . Blocking all non-essential pons
- D . Discontinuing the use of self-signed certificates
An organization is implementing Zero Trust architecture A systems administrator must increase the effectiveness of the organization’s context-aware access system .
Which of the following is the best way to improve the effectiveness of the system?
- A . Secure zone architecture
- B . Always-on VPN
- C . Accurate asset inventory
- D . Microsegmentation
A central bank implements strict risk mitigations for the hardware supply chain, including an allow list for specific countries of origin .
Which of the following best describes the cyberthreat to the bank?
- A . Ability to obtain components during wartime
- B . Fragility and other availability attacks
- C . Physical Implants and tampering
- D . Non-conformance to accepted manufacturing standards
A central bank implements strict risk mitigations for the hardware supply chain, including an allow list for specific countries of origin .
Which of the following best describes the cyberthreat to the bank?
- A . Ability to obtain components during wartime
- B . Fragility and other availability attacks
- C . Physical Implants and tampering
- D . Non-conformance to accepted manufacturing standards
A central bank implements strict risk mitigations for the hardware supply chain, including an allow list for specific countries of origin .
Which of the following best describes the cyberthreat to the bank?
- A . Ability to obtain components during wartime
- B . Fragility and other availability attacks
- C . Physical Implants and tampering
- D . Non-conformance to accepted manufacturing standards
A central bank implements strict risk mitigations for the hardware supply chain, including an allow list for specific countries of origin .
Which of the following best describes the cyberthreat to the bank?
- A . Ability to obtain components during wartime
- B . Fragility and other availability attacks
- C . Physical Implants and tampering
- D . Non-conformance to accepted manufacturing standards