CompTIA CAS-005 Exam (page: 1)
CompTIA SecurityX
Updated on: 31-Mar-2026

Viewing Page 1 of 45

A security engineer is reviewing event logs because an employee successfully connected a personal Windows laptop to the corporate network, which is against company policy. Company policy allows all Windows 10 and 11 laptops to connect to the system as long as the MDM agent installed by IT is running. Only compliant devices can connect, and the logic in the system to evaluate compliant laptops is as follows:



Which of the following most likely occurred when the employee connected a personally owned Windows laptop and was allowed on the network?

  1. The agent was not running on the laptop, which triggered a false positive.
  2. The OS was a valid version, but the MDM agent was not installed, triggering a true positive.
  3. The OS was running a Windows version below 10 and triggered a false negative.
  4. The OS version was higher than 11, and the MDM agent was running, triggering a true negative.

Answer(s): C

Explanation:

The provided logic checks for compliance based on the OsVersion and whether the agentRunning is true.
Here's how the logic works:
1. If OsVersion >= 10:
If agentRunning is true, the device is compliant.

If agentRunning is false, the device is non-compliant.

2. Else (if OsVersion < 10):
The device is marked as compliant.

This logic means that laptops with an OS version below 10 are mistakenly considered compliant, which is a false negative because they do not meet the policy requirement. This is likely how the employee's laptop, running a version of Windows below 10, was able to connect to the network against policy.



An organization is working to secure its development process to ensure developers cannot deploy artifacts directly into the production environment.
Which of the following security practice recommendations would be the best to accomplish this objective?

  1. Implement least privilege access to all systems.
  2. Roll out security awareness training for all users.
  3. Set up policies and systems with separation of duties.
  4. Enforce job rotations for all developers and administrators.
  5. Utilize mandatory vacations for all developers.
  6. Review all access to production systems on a quarterly basis.

Answer(s): C

Explanation:

Separation of duties is a key security practice that ensures no single individual has the capability to perform all tasks required to deploy artifacts into the production environment. By separating responsibilities, such as development and production deployment, the organization can prevent unauthorized or accidental changes in production systems. This directly addresses the requirement that developers should not deploy artifacts into production, enhancing the security and integrity of the deployment process.



A security architect discovers the following while reviewing code for a company's website:

selection = "SELECT Item FROM Catalog WHERE ItemID = " & Request("ItemID")

Which of the following should the security architect recommend?

  1. Client-side processing
  2. Query parameterization
  3. Data normalization
  4. Escape character blocking
  5. URL encoding

Answer(s): B

Explanation:

The code provided constructs an SQL query by directly concatenating user input (Request("ItemID")) with the query string. This approach is vulnerable to SQL injection attacks, where malicious input can be crafted to manipulate or compromise the database.
Query parameterization ensures that user input is treated as a parameter rather than executable code. By using parameterized queries, the database engine automatically escapes and safely handles input, eliminating the risk of SQL injection. This is the recommended best practice to secure database interactions against such vulnerabilities.



A security architect needs to enable a container orchestrator for DevSecOps and SOAR initiatives. The engineer has discovered that several Ansible YAML files used for the automation of configuration management have the following content:

Which of the following should the engineer do to correct the security issues presented within this content?

  1. Update the kubernetes.core.k8s module to kubernetes.core.k8s_service in the main.yml file.
  2. Update the COMPTIA001 hostname to localhost using the hostnamectl command.
  3. Update the state: present module to state: absent in the main.yml file.
  4. Update or remove the ansible.cfg file.
  5. Update the insecure-bind-address from localhost to the COMPTIA001 in the manifests file.

Answer(s): D

Explanation:

The Ansible configuration file (/etc/ansible/ansible.cfg) contains an enable_plugins directive that allows Kubernetes modules to interact with Kubernetes resources. However, it does not enforce secure practices for managing these interactions, which could potentially expose sensitive data or allow unauthorized changes if not correctly configured or overly permissive.
The insecure configuration in the Ansible YAML file or the ansible.cfg file should be reviewed or updated to enforce stricter security. Specifically, the configuration might inadvertently expose Kubernetes services to untrusted sources, and enabling plugins like kubernetes.core.k8s without sufficient control could lead to vulnerabilities.
Updating or removing the ansible.cfg file ensures that secure defaults are applied, or more secure plugin configurations can be explicitly added, addressing the underlying issue.



A CRM company leverages a CSP PaaS service to host and publish Its SaaS product. Recently, a large customer requested that all infrastructure components must meet strict regulatory requirements, including configuration management, patch management, and life-cycle management.
Which of the following organizations is responsible for ensuring those regulatory requirements are met?

  1. The CRM company
  2. The CRM company's customer
  3. The CSP
  4. The regulatory body

Answer(s): A

Explanation:

In a PaaS (Platform as a Service) model, the Cloud Service Provider (CSP) is responsible for managing the platform infrastructure, including servers, storage, and the platform software. However, the CRM company, as the customer of the PaaS provider, is responsible for managing and securing their own application, data, and any configurations or compliance requirements for their hosted SaaS product.
Since the CRM company provides the SaaS product to their customers and regulatory compliance is a business requirement for their service, they bear the responsibility to ensure that their application and infrastructure configurations meet regulatory requirements, even if hosted on the CSP's platform.



Company A is merging with Company B. Company A is a small, local company. Company B has a large, global presence. The two companies have a lot of duplication in their IT systems, processes, and procedures. On the new Chief Information Officer's (CIO's) first day, a fire breaks out at Company B's main data center.
Which of the following actions should the CIO take first?

  1. Determine whether the incident response plan has been tested at both companies, and use it to respond.
  2. Review the incident response plans, and engage the disaster recovery plan while relying on the IT leaders from both companies.
  3. Ensure hot, warm, and mobile disaster recovery sites are available, and give an update to the companies' leadership teams.
  4. Initiate Company A's IT systems processes and procedures, assess the damage, and perform a BIA.

Answer(s): B

Explanation:

When a disaster such as a fire occurs at a primary data center, the immediate priority is to review and implement the incident response plan (IRP) and the disaster recovery plan (DRP). These plans are designed to address and mitigate the impact of such incidents. Since the two companies have recently merged and may have differing systems and procedures, it is crucial to rely on the IT leaders from both companies who are familiar with their respective systems to ensure an effective response.
By reviewing and engaging the existing plans, the CIO can manage the situation efficiently and ensure minimal downtime and data loss while assessing how both companies' IT systems and processes will be integrated in the future.



The results of an internal audit indicate several employees reused passwords that were previously included in a published list of compromised passwords.

The company has the following employee password policy:

Which of the following should be implemented to best address the password reuse issue? (Choose two.)

  1. Increase the minimum age to two days.
  2. Increase the history to 20.
  3. Increase the character length to 12.
  4. Add case-sensitive requirements to character class.
  5. Decrease the maximum age to 30 days.
  6. Remove the complexity requirements.
  7. Increase the maximum age to 120 days.

Answer(s): A,B

Explanation:

Increase the minimum age to two days: Setting a minimum age for passwords ensures that users cannot immediately change their password multiple times in succession to cycle through the password history and reuse a previous password. By increasing the minimum age to two days, it prevents this kind of behavior and enforces better password reuse discipline.
Increase the history to 20: The password history determines how many previous passwords are remembered by the system to prevent reuse. By increasing the history to 20, users are forced to create a significantly different password for a longer period, reducing the likelihood of reusing compromised passwords.



A mobile administrator is reviewing the following mobile device DHCP logs to ensure the proper mobile settings are applied to managed devices:



Which of the following mobile configuration settings is the mobile administrator verifying?

  1. Service set identifier authentication
  2. Wireless network auto joining
  3. 802.1X with mutual authentication
  4. Association MAC address randomization

Answer(s): D

Explanation:

The DHCP logs show multiple distinct MAC addresses associated with the same user and device (UserA- MobileDevice). This behavior suggests that the device is using MAC address randomization, a feature designed to enhance privacy by generating a unique, temporary MAC address when connecting to wireless networks. The mobile administrator is verifying this setting to ensure that the mobile devices are properly randomizing their MAC addresses for added security.



Viewing Page 1 of 45



Share your comments for CompTIA CAS-005 exam with other users:

Ted 6/21/2023 11:11:00 PM

just paid and downlaod the 2 exams using the 50% sale discount. so far i was able to download the pdf and the test engine. all looks good.
GERMANY


Paul K 11/27/2023 2:28:00 AM

i think it should be a,c. option d goes against the principle of building anything custom unless there are no work arounds available
INDIA


ph 6/16/2023 12:41:00 AM

very legible
Anonymous


sephs2001 7/31/2023 10:42:00 PM

is this exam accurate or helpful?
Anonymous


ash 7/11/2023 3:00:00 AM

please upload dump, i have exam in 2 days
INDIA


Sneha 8/17/2023 6:29:00 PM

this is useful
CANADA


sachin 12/27/2023 2:45:00 PM

question 232 answer should be perimeter not netowrk layer. wrong answer selected
Anonymous


tomAws 7/18/2023 5:05:00 AM

nice questions
BRAZIL


Rahul 6/11/2023 2:07:00 AM

hi team, could you please provide this dump ?
INDIA


TeamOraTech 12/5/2023 9:49:00 AM

very helpful to clear the exam and understand the concept.
Anonymous


Curtis 7/12/2023 8:20:00 PM

i think it is great that you are helping people when they need it. thanks.
UNITED STATES


sam 7/17/2023 6:22:00 PM

cannot evaluate yet
Anonymous


nutz 7/20/2023 1:54:00 AM

a laptops wireless antenna is most likely located in the bezel of the lid
UNITED STATES


rajesh soni 1/17/2024 6:53:00 AM

good examplae to learn basic
INDIA


Tanya 10/25/2023 7:07:00 AM

this is useful information
Anonymous


Nasir Mahmood 12/11/2023 7:32:00 AM

looks usefull
Anonymous


Jason 9/30/2023 1:07:00 PM

question 81 should be c.
CANADA


TestPD1 8/10/2023 12:22:00 PM

question 18 : response isnt a ?
EUROPEAN UNION


ally 8/19/2023 5:31:00 PM

plaese add questions
TURKEY


DIA 10/7/2023 5:59:00 AM

is dumps still valid ?
FRANCE


Annie 7/7/2023 8:33:00 AM

thanks for this
EUROPEAN UNION


arnie 9/17/2023 6:38:00 AM

please upload questions
Anonymous


Tanuj Rana 7/22/2023 2:33:00 AM

please upload the question dump for professional machinelearning
Anonymous


Future practitioner 8/10/2023 1:26:00 PM

question 4 answer is c. this site shows the correct answer as b. "adopt a consumption model" is clearly a cost optimization design principle. looks like im done using this site to study!!!
Anonymous


Ace 8/3/2023 10:37:00 AM

number 52 answer is d
UNITED STATES


Nathan 12/17/2023 12:04:00 PM

just started preparing for my exam , and this site is so much help
Anonymous


Corey 12/29/2023 5:06:00 PM

question 35 is incorrect, the correct answer is c, it even states so: explanation: when a vm is infected with ransomware, you should not restore the vm to the infected vm. this is because the ransomware will still be present on the vm, and it will encrypt the files again. you should also not restore the vm to any vm within the companys subscription. this is because the ransomware could spread to other vms in the subscription. the best way to restore a vm that is infected with ransomware is to restore it to a new azure vm. this will ensure that the ransomware is not present on the new vm.
Anonymous


Rajender 10/18/2023 3:54:00 AM

i would like to take psm1 exam.
Anonymous


Blessious Phiri 8/14/2023 9:53:00 AM

cbd and pdb are key to the database
SOUTH AFRICA


Alkaed 10/19/2022 10:41:00 AM

the purchase and download process is very much streamlined. the xengine application is very nice and user-friendly but there is always room for improvement.
NETHERLANDS


Dave Gregen 9/4/2023 3:17:00 PM

please upload p_sapea_2023
SWEDEN


Sarah 6/13/2023 1:42:00 PM

anyone use this? the question dont seem to follow other formats and terminology i have been studying im getting worried
CANADA


Shuv 10/3/2023 8:19:00 AM

good questions
UNITED STATES


Reb974 8/5/2023 1:44:00 AM

hello are these questions valid for ms-102
CANADA