CompTIA SecurityX CAS-005 Exam Questions in PDF

Free CompTIA CAS-005 Dumps Questions (page: 2)

A security analyst is investigating a possible insider threat incident that involves the use of an unauthorized USB from a shared account to exfiltrate data. The event did not create an alert. The analyst has confirmed the USB hardware ID is not on the device allow list, but has not yet confirmed the owner of the USB device.
Which of the following actions should the analyst take next?

  1. Classify the incident as a false positive.
  2. Classify the incident as a false negative.
  3. Classify the incident as a true positive.
  4. Classify the incident as a true negative.

Answer(s): B

Explanation:

A false negative occurs when a threat or security event happens but fails to trigger an alert, leading to undetected malicious activity. In this case, the security analyst has confirmed that an unauthorized USB device was used, which violates policy. However, since the event did not generate an alert despite being an unauthorized action, it indicates a failure in the detection system to identify the threat.



Which of the following security features do email signatures provide?

  1. Non-repudiation
  2. Body encryption
  3. Code signing
  4. Sender authentication
  5. Chain of custody

Answer(s): A

Explanation:

Email signatures, often implemented using digital signatures, provide non-repudiation by verifying the identity of the sender and ensuring that the email has not been tampered with during transit. Non-repudiation means the sender cannot deny having sent the email because the digital signature is uniquely tied to the sender's private key.



A software development company wants to ensure that users can confirm the software is legitimate when installing it.
Which of the following is the best way for the company to achieve this security objective?

  1. Code signing
  2. Non-repudiation
  3. Key escrow
  4. Private keys

Answer(s): A

Explanation:

Code signing is the process of digitally signing software or executables using a cryptographic certificate. This ensures that users can verify the authenticity of the software and confirm it has not been altered or tampered with since it was signed. It provides assurance that the software is legitimate and originates from the claimed source, addressing the company's security objective.



While performing mandatory monthly patch updates on a production application server, the security analyst reports an instance of buffer overflow for a new application that was migrated to the cloud and is also publicly exposed. Security policy requires that only internal users have access to the application.
Which of the following should the analyst implement to mitigate the issues reported? (Choose two.)

  1. Configure firewall rules to block all external traffic.
  2. Enable input validation for all fields.
  3. Enable automatic updates to be installed on all servers.
  4. Configure the security group to enable external traffic.
  5. Set up a DLP policy to alert for exfiltration on all application servers.
  6. Enable nightly vulnerability scans.

Answer(s): A,B

Explanation:

Configure firewall rules to block all external traffic: Since the security policy requires that only internal users have access to the application, configuring firewall rules to block all external traffic ensures that the application is not exposed to unauthorized users on the internet. This mitigates unauthorized access risks.
Enable input validation for all fields: Buffer overflows often exploit improper or lack of input validation.
Enabling strict input validation ensures that only properly formatted data is accepted, preventing malicious input designed to exploit vulnerabilities in the application.



PKI can be used to support security requirements in the change management process.
Which of the following capabilities does PKI provide for messages?

  1. Non-repudiation
  2. Confidentiality
  3. Delivery receipts
  4. Attestation

Answer(s): A

Explanation:

PKI (Public Key Infrastructure) uses digital signatures to provide non-repudiation, which ensures that the sender of a message cannot deny having sent it. In the context of the change management process, PKI ensures that actions or approvals are traceable to the responsible individual, which is critical for maintaining accountability and the integrity of the process.



Several unlabeled documents in a cloud document repository contain cardholder information.
Which of the following configuration changes should be made to the DLP system to correctly label these documents in the future?

  1. Digital rights management
  2. Network traffic decryption
  3. Regular expressions
  4. Watermarking

Answer(s): C

Explanation:

Data Loss Prevention (DLP) systems can use regular expressions to identify and classify sensitive information, such as cardholder data, based on patterns (e.g., patterns for credit card numbers). By configuring the DLP system with appropriate regular expressions, the system can correctly identify and label documents containing such information in the future, ensuring compliance and enhancing security.



A systems administrator at a web-hosting provider has been tasked with renewing the public certificates of all customer sites.
Which of the following would best support multiple domain names while minimizing the amount of certificates needed?

  1. OCSP
  2. CRL
  3. SAN
  4. CA

Answer(s): C

Explanation:

SAN (Subject Alternative Name) is an extension to SSL/TLS certificates that allows a single certificate to secure multiple domain names. This method is ideal for situations where you want to secure several domains or subdomains with one certificate, reducing the complexity and number of certificates needed. SAN certificates are commonly used to support multiple domain names under a single SSL certificate, making them the best choice for the given scenario.



Which of the following best explain why organizations prefer to utilize code that is digitally signed? (Choose two.)

  1. It provides origin assurance.
  2. It verifies integrity.
  3. It provides increased confidentiality.
  4. It integrates with DRMs.
  5. It verifies the recipient's identity.
  6. It ensures the code is free of malware.

Answer(s): A,B

Explanation:

It provides origin assurance: Digital signatures ensure that the code comes from a verified and trusted source. By signing the code, the organization guarantees the origin of the software, assuring the recipient that it has been delivered by a legitimate party.
It verifies integrity: A digital signature also ensures that the code has not been altered or tampered with since it was signed. Any changes to the code after it has been signed would invalidate the signature, confirming that the integrity of the code has been preserved.



Share your comments for CompTIA CAS-005 exam with other users:

C
CW
7/11/2023 2:51:00 PM

a good source for exam preparation

A
Anchal
10/23/2023 4:01:00 PM

nice questions

J
J Nunes
9/29/2023 8:19:00 AM

i need ielts general training audio guide questions

A
Ananya
9/14/2023 5:16:00 AM

please make this content available

S
Swathi
6/4/2023 2:18:00 PM

content is good

L
Leo
7/29/2023 8:45:00 AM

latest dumps please

L
Laolu
2/15/2023 11:04:00 PM

aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.

Z
Zaynik
9/17/2023 5:36:00 AM

questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer

M
Massam
6/11/2022 5:55:00 PM

90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump

A
Anonymous
12/27/2023 12:47:00 AM

answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.

J
Japles
5/23/2023 9:46:00 PM

password lockout being the correct answer for question 37 does not make sense. it should be geofencing.

F
Faritha
8/10/2023 6:00:00 PM

for question 4, the righr answer is :recover automatically from failures

A
Anonymous
9/14/2023 4:27:00 AM

question number 4s answer is 3, option c. i

P
p das
12/7/2023 11:41:00 PM

very good questions

A
Anna
1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?

B
Bhavya
9/13/2023 10:15:00 AM

very usefull

R
Rahul Kumar
8/31/2023 12:30:00 PM

need certification.

D
Diran Ole
9/17/2023 5:15:00 PM

great exam prep

V
Venkata Subbarao Bandaru
6/24/2023 8:45:00 AM

i require dump

D
D
7/15/2023 1:38:00 AM

good morning, could you please upload this exam again,

A
Ann
9/15/2023 5:39:00 PM

hi can you please upload the dumps for sap contingent module. thanks

S
Sridhar
1/16/2024 9:19:00 PM

good questions

S
Summer
10/4/2023 9:57:00 PM

looking forward to the real exam

V
vv
12/2/2023 2:45:00 PM

good ones for exam preparation

D
Danny Zas
9/15/2023 4:45:00 AM

this is a good experience

S
SM 1211
10/12/2023 10:06:00 PM

hi everyone

A
A
10/2/2023 6:08:00 PM

waiting for the dump. please upload.

A
Anonymous
7/16/2023 11:05:00 AM

upload cks exam questions

J
Johan
12/13/2023 8:16:00 AM

awesome training material

P
PC
7/28/2023 3:49:00 PM

where is dump

Y
YoloStar Yoloing
10/22/2023 9:58:00 PM

q. 289 - the correct answer should be b not d, since the question asks for the most secure way to provide access to a s3 bucket (a single one), and by principle of the least privilege you should not be giving access to all buckets.

Z
Zelalem Nega
5/14/2023 12:45:00 PM

please i need if possible h12-831,

U
unknown-R
11/23/2023 7:36:00 AM

good collection of questions and solution for pl500 certification

S
Swaminathan
5/11/2023 9:59:00 AM

i would like to appear the exam.

AI Tutor 👋 I’m here to help!