CompTIA CAS-005 Exam (page: 3)
CompTIA SecurityX
Updated on: 31-Mar-2026

Viewing Page 3 of 45

A security engineer receives reports through the organization's bug bounty program about remote code execution in a specific component in a custom application. Management wants to properly secure the component and proactively avoid similar issues.
Which of the following is the best approach to uncover additional vulnerable paths in the application?

  1. Leverage an exploitation framework to uncover vulnerabilities.
  2. Use fuzz testing to uncover potential vulnerabilities in the application.
  3. Utilize a software composition analysis tool to report known vulnerabilities.
  4. Reverse engineer the application to look for vulnerable code paths.
  5. Analyze the use of an HTTP intercepting proxy to dynamically uncover issues.

Answer(s): B

Explanation:

Fuzz testing is a technique used to identify vulnerabilities by inputting a large volume of random, unexpected, or malformed data into the application. It helps uncover vulnerabilities like buffer overflows, input validation issues, and other security flaws that may not be immediately apparent. By systematically testing different inputs and paths in the application, fuzz testing can identify previously undiscovered vulnerabilities and help secure the component against potential exploits.



A security technician is investigating a system that tracks inventory via a batch update each night. The technician is concerned that the system poses a risk to the business, as errors are occasionally generated and reported inventory appears incorrect. The following output log is provided:

The technician reviews the output of the batch job and discovers that the inventory was never less than zero, and the final inventory was 100 rather than 60.
Which of the following should the technician do to resolve this issue?

  1. Ensure that the application is using memory-safe functions to prevent integer overflows.
  2. Recommend thread-safe processes in the code to eliminate race conditions.
  3. Require the developers to include exception handlers to accommodate out-of-bounds results.
  4. Move the batch processing from client side to server side to remove client processing inconsistencies.

Answer(s): C

Explanation:

The issue described in the log shows that, at one point, the inventory goes below zero (transaction 5 where the operation is -40, resulting in a negative balance of -10). However, despite this, the final inventory is reported as 100 rather than 60, suggesting that the system is not correctly handling situations where the inventory goes below zero, or there is an error in reporting or updating the total.
By including exception handlers in the code to manage out-of-bounds results, the developers can ensure that the system correctly handles situations where negative inventory would otherwise occur or other logical errors take place. Exception handling can ensure that invalid operations are either prevented or properly logged and managed, which resolves the problem of inconsistent inventory reporting.



A programmer is reviewing the following proprietary piece of code that was identified as a vulnerability due to users being authenticated when they provide incorrect credentials:

Which of the following should the programmer implement to remediate the code vulnerability?

  1. Salted hashing via the proprietary SHASH function
  2. Input validation in the first two lines of code
  3. Atomic execution of subroutines
  4. TOCTOU remediation in SET USERACL
  5. Database connection over encrypted channels

Answer(s): B

Explanation:

The code vulnerability stems from improper handling of user input in the authentication process. In the first two lines, the code retrieves the USERID and PASS inputs, but there is no validation or sanitation of these inputs before they are processed.
By implementing input validation in these initial lines of code, the programmer can ensure that only properly formatted and expected data is passed into the authentication logic. This prevents malicious input, such as SQL injection or other forms of manipulation, which could allow incorrect credentials to be accepted and cause authentication issues. Input validation ensures that the inputs meet specific criteria (e.g., expected length, character set), which mitigates the risk of such vulnerabilities.



A senior cybersecurity engineer is solving a digital certificate issue in which the CA denied certificate issuance due to failed subject identity validation. At which of the following steps within the PKI enrollment process would the denial have occurred?

  1. RA
  2. OCSP
  3. CA
  4. IdP

Answer(s): A

Explanation:

The Registration Authority (RA) is responsible for validating the identity of the certificate requestor before the Certificate Authority (CA) issues the certificate. If the identity validation fails during this step, the RA will deny the request, leading to a failure in certificate issuance. The CA will only issue the certificate after the RA has successfully validated the requestor's identity. Therefore, the denial of certificate issuance due to failed subject identity validation would have occurred at the RA stage.



An internal user can send encrypted emails successfully to all recipients, except one. at an external organization.
When the internal user attempts to send encrypted emails to this external recipient, a security error message appears. The issue does not affect unencrypted emails. The external recipient can send encrypted emails to internal users.
Which of the following is the most likely cause of the issue?

  1. The validity dates of the external recipient's private key do not match the SSH keys with which the internal user is accessing the system.
  2. The external recipient has an expired public/private key pair that has not been revoked by the CA.
  3. The internal user's company email servers have an incorrect implementation of OCSP and CRL settings.
  4. The external recipient's email address and the email address associated with the external recipient's public key are mismatched.

Answer(s): D

Explanation:

In a Public Key Infrastructure (PKI) system, when sending encrypted emails, the recipient's public key is used for encryption. If the public key is associated with a different email address than the one being used by the recipient, the email encryption will fail, causing a security error. This is because the system is trying to encrypt the message using a public key that doesn't match the recipient's actual email address.
Since the issue only occurs with one external recipient, and the internal user can send encrypted emails to all others, this suggests the problem is likely due to a mismatch between the email address and the public key used for encryption, rather than other potential issues like expired keys or incorrect settings.



A security administrator is setting up a virtualization solution that needs to run services from a single host. Each service should be the only one running in its environment. Each environment needs to have its own operating system as a base but share the kernel version and properties of the running host.
Which of the following technologies would best meet these requirements?

  1. Containers
  2. Type 1 hypervisor
  3. Type 2 hypervisor
  4. Virtual desktop infrastructure
  5. Emulation

Answer(s): A

Explanation:

Containers are lightweight, virtualized environments that allow multiple services to run on the same host while sharing the kernel of the host operating system. Each container runs its own application and libraries, and it behaves as if it's running in its own isolated environment. However, containers share the kernel of the host operating system, making them resource-efficient and faster to deploy compared to full virtual machines. This matches the requirement of running services from a single host, each in its own environment with its own operating system base, while sharing the kernel version and properties of the host.
Unlike full hypervisors or emulation, containers do not require separate full operating systems per service, making them more efficient and suitable for this use case.



A company has data it would like to aggregate from its PLCs for data visualization and predictive maintenance purposes.
Which of the following is the most likely destination for the tag data from the PLCs?

  1. External drive
  2. Cloud storage
  3. System aggregator
  4. Local historian

Answer(s): D

Explanation:

A local historian is a system specifically designed to store and manage large volumes of time-series data, such as the tag data generated by programmable logic controllers (PLCs) in industrial environments. This data typically includes sensor readings, system states, and other operational data. A historian collects, stores, and organizes this data locally, making it available for data analysis, visualization, and predictive maintenance.



Which of the following is the best way to protect the website browsing history for an executive who travels to foreign countries where internet usage is closely monitored?

  1. DOH
  2. EAP-TLS
  3. Geofencing
  4. Private browsing mode

Answer(s): A

Explanation:

DNS over HTTPS (DOH) encrypts DNS queries, which protects the browsing history from being monitored or intercepted by third parties, such as internet service providers or government authorities. This is especially important in countries where internet usage is closely monitored. DOH ensures that DNS requests (which resolve domain names into IP addresses) are encrypted and sent over HTTPS, preventing external parties from seeing which websites the executive is visiting.



Viewing Page 3 of 45



Share your comments for CompTIA CAS-005 exam with other users:

Asad Khan 11/1/2023 2:44:00 AM

answer 10 should be a because only a new project will be created & the organization is the same.
Anonymous


Raj 9/12/2023 3:49:00 PM

can you please upload the dump again
UNITED STATES


Christian Klein 6/23/2023 1:32:00 PM

is it legit questions from sap certifications ?
UNITED STATES


anonymous 1/12/2024 3:34:00 PM

question 16 should be b (changing the connector settings on the monitor) pc and monitor were powered on. the lights on the pc are on indicating power. the monitor is showing an error text indicating that it is receiving power too. this is a clear sign of having the wrong input selected on the monitor. thus, the "connector setting" needs to be switched from hdmi to display port on the monitor so it receives the signal from the pc, or the other way around (display port to hdmi).
UNITED STATES


NSPK 1/18/2024 10:26:00 AM

q 10. ans is d (in the target org: open deployment settings, click edit next to the source org. select allow inbound changes and save
Anonymous


mohamed abdo 9/1/2023 4:59:00 AM

very useful
Anonymous


Tom 3/18/2022 8:00:00 PM

i purchased this exam dumps from another website with way more questions but they were all invalid and outdate. this exam dumps was right to the point and all from recent exam. it was a hard pass.
UNITED KINGDOM


Edrick GOP 10/24/2023 6:00:00 AM

it was a good experience and i got 90% in the 200-901 exam.
Anonymous


anonymous 8/10/2023 2:28:00 AM

hi please upload this
Anonymous


Bakir 7/6/2023 7:24:00 AM

please upload it
UNITED KINGDOM


Aman 6/18/2023 1:27:00 PM

really need this dump. can you please help.
UNITED KINGDOM


Neela Para 1/8/2024 6:39:00 PM

really good and covers many areas explaining the answer.
NEW ZEALAND


Karan Patel 8/15/2023 12:51:00 AM

yes, can you please upload the exam?
UNITED STATES


NISHAD 11/7/2023 11:28:00 AM

how many questions are there in these dumps?
UNITED STATES


Pankaj 7/3/2023 3:57:00 AM

hi team, please upload this , i need it.
UNITED STATES


DN 9/4/2023 11:19:00 PM

question 14 - run terraform import: this is the recommended best practice for bringing manually created or destroyed resources under terraform management. you use terraform import to associate an existing resource with a terraform resource configuration. this ensures that terraform is aware of the resource, and you can subsequently manage it with terraform.
Anonymous


Zhiguang 8/19/2023 11:37:00 PM

please upload dump. thanks in advance.
Anonymous


deedee 12/23/2023 5:51:00 PM

great great
UNITED STATES


Asad Khan 11/1/2023 3:10:00 AM

answer 16 should be b your organizational policies require you to use virtual machines directly
Anonymous


Sale Danasabe 10/24/2023 5:21:00 PM

the question are kind of tricky of you didnt get the hnag on it.
Anonymous


Luis 11/16/2023 1:39:00 PM

can anyone tell me if this is for rhel8 or rhel9?
UNITED STATES


hik 1/19/2024 1:47:00 PM

good content
UNITED STATES


Blessious Phiri 8/15/2023 2:18:00 PM

pdb and cdb are critical to the database
Anonymous


Zuned 10/22/2023 4:39:00 AM

till 104 questions are free, lets see how it helps me in my exam today.
UNITED STATES


Muhammad Rawish Siddiqui 12/3/2023 12:11:00 PM

question # 56, answer is true not false.
SAUDI ARABIA


Amaresh Vashishtha 8/27/2023 1:33:00 AM

i would be requiring dumps to prepare for certification exam
Anonymous


Asad 9/8/2023 1:01:00 AM

very helpful
PAKISTAN


Blessious Phiri 8/13/2023 3:10:00 PM

control file is the heart of rman backup
Anonymous


Senthil 9/19/2023 5:47:00 AM

hi could you please upload the ibm c2090-543 dumps
Anonymous


Harry 6/27/2023 7:20:00 AM

appriciate if you could upload this again
AUSTRALIA


Anonymous 7/10/2023 4:10:00 AM

please upload the dump
SWEDEN


Raja 6/20/2023 5:30:00 AM

i found some questions answers mismatch with explanation answers. please properly update
UNITED STATES


Doora 11/30/2023 4:20:00 AM

nothing to mention
Anonymous


deally 1/19/2024 3:41:00 PM

knowable questions
UNITED STATES