CompTIA SecurityX CAS-005 Exam Questions in PDF

Free CompTIA CAS-005 Dumps Questions (page: 8)

A company is decommissioning old servers and hard drives that contain sensitive data.
Which of the following best protects against data leakage?

  1. Purging
  2. Clearing
  3. Shredding
  4. Degaussing

Answer(s): A

Explanation:

Purging is the best option for protecting against data leakage when decommissioning old servers and hard drives that contain sensitive data. Purging involves the removal of data in such a way that it cannot be recovered by any known means, even by advanced forensic techniques. This typically involves overwriting the data multiple times or using specialized software to ensure it is completely erased.



An engineer has had scaling issues with a web application hosted on premises and would like to move to a serverless architecture.
Which of the following cloud benefits would be best to utilize for this project?

  1. Cost savings for hosting
  2. Automation of resource provisioning
  3. Providing geo-redundant hosting
  4. Eliminating need to patch

Answer(s): B

Explanation:

The best cloud benefit for moving to a serverless architecture in this case is Automation of resource provisioning. Serverless computing automatically scales resources based on demand without requiring manual intervention. This helps to address the scaling issues the engineer is facing by dynamically adjusting resource allocation as needed, improving performance and efficiency without manual effort.



An organization needs to classify its systems and data in accordance with external requirements.
Which of the following roles is best qualified to perform this task?

  1. Systems administrator
  2. Data owner
  3. Data processor
  4. Data custodian
  5. Data steward

Answer(s): B

Explanation:

The Data owner is the role best qualified to classify systems and data according to external requirements. The data owner is responsible for the oversight of data assets within the organization, including determining how data is classified and ensuring that it meets relevant regulatory or compliance standards. This role involves setting policies and guidelines for data usage, classification, and security.



A company is developing an application that will be used to perform e-commerce transactions for a subscription-based service. The application must be able to use previously saved payment methods to perform recurring transactions.
Which of the following is the most appropriate?

  1. Tokenization through an HSM
  2. Self-encrypting disks with field-level encryption
  3. NX/XN Implementation to minimize data retention
  4. Token-based access for application users
  5. Address space layout randomization

Answer(s): A

Explanation:

Tokenization through an HSM (Hardware Security Module) is the most appropriate solution for securely storing and using previously saved payment methods for recurring transactions. Tokenization replaces sensitive data (like credit card numbers) with a token, which is a non-sensitive equivalent that cannot be reversed without the corresponding HSM. This ensures that sensitive payment information is never stored in an accessible format and protects customer data from breaches while still enabling the application to perform transactions.



A security technician is trying to connect a remote site to the central office over a site-to-site VPN. The technician has verified the source and destination IP addresses are correct, but the technician is unable to get the remote site to connect. The following error message keeps repeating:

An error has occurred during Phase 1 handshake. Deleting keys and retrying...

Which of the following is most likely the reason the connection is failing?

  1. The IKE hashing algorithm uses different key lengths on each VPN device.
  2. The IPSec settings allow more than one cipher suite on both devices.
  3. The Diffie-Hellman group on both sides matches but is a legacy group.
  4. The remote VPN is attempting to connect with a protocol other than SSL/TLS.

Answer(s): A

Explanation:

The error message "An error has occurred during Phase 1 handshake. Deleting keys and retrying..." indicates an issue during the IKE (Internet Key Exchange) Phase 1 handshake. One common cause for failure at this stage is a mismatch in the hashing algorithm or key length used on both devices. If the IKE hashing algorithm or key lengths differ between the two devices, they will not be able to establish a secure connection.



A security analyst received the following finding from a cloud security assessment tool:

Virtual Machine Data Disk is encrypted with the default encryption key.

Because the organization hosts highly sensitive data files, regulations dictate it must be encrypted so It is unreadable to the CSP.
Which of the following should be implemented to remediate the finding and meet the regulatory requirement? (Choose two.)

  1. Disk encryption with customer-provided keys
  2. Disk encryption with keys from a third party
  3. Row-level encryption with a key escrow
  4. File-level encryption with cloud vendor-provided keys
  5. File-level encryption with customer-provided keys
  6. Disk-level encryption with a cross-signed certificate

Answer(s): A,E

Explanation:

To meet the regulatory requirement of ensuring that the data is unreadable to the cloud service provider (CSP), the best approach is to use customer-provided keys for encryption. This ensures that only the customer (organization) holds the keys to access the encrypted data, not the CSP.
Disk encryption with customer-provided keys: This ensures the encryption key for the virtual machine's data disk is managed by the customer, preventing the CSP from having access to the data.
File-level encryption with customer-provided keys: If data needs to be encrypted at the file level, customer- provided keys can be used to ensure that the organization retains control over the encryption and decryption process.



A security analyst discovers a new device on the company's dedicated IoT subnet during the most recent vulnerability scan. The scan results show numerous open ports and insecure protocols in addition to default usernames and passwords. A camera needs to transmit video to the security server in the IoT subnet.
Which of the following should the security analyst recommend to securely operate the camera?

  1. Harden the camera configuration.
  2. Send camera logs to the SIEM.
  3. Encrypt the camera's video stream.
  4. Place the camera on an isolated segment.

Answer(s): A

Explanation:

Harden the camera configuration by changing default usernames and passwords, disabling unnecessary open ports, and ensuring that secure protocols (such as HTTPS, SSH, or others) are used instead of insecure ones (like HTTP or Telnet). This is a critical step in securing IoT devices and protecting them from being exploited.
Since the camera is part of the IoT subnet and has been identified with vulnerabilities such as default credentials and open ports, hardening the configuration is the most direct and effective solution to secure its operation.



The Chief Information Security Officer of a large multinational organization has asked the security risk manager to use risk scenarios during a risk analysis.
Which of the following is the most likely reason for this approach?

  1. To connect risks to business objectives
  2. To ensure a consistent approach to risk
  3. To present a comprehensive view of risk
  4. To provide context to the relevancy of risk

Answer(s): D

Explanation:

Using risk scenarios helps to provide context to the relevancy of risk by illustrating how specific risks could affect the organization. This approach helps stakeholders understand the potential impact of risks in real-world terms, making it easier to prioritize actions based on the likelihood and consequences of each scenario. It also helps decision-makers better assess the practical implications of different risks on business operations.



Share your comments for CompTIA CAS-005 exam with other users:

M
Meghraj mali
10/7/2023 1:47:00 PM

very nice question

N
Noel
11/1/2022 9:14:00 PM

i have learning disability and this exam dumps allowed me to focus on the actual questions and not worry about notes and the those other study materials.

J
Jas
10/25/2023 6:01:00 PM

165 should be apt

N
Neetu
6/22/2023 8:41:00 AM

please upload the dumps, real need of them

M
Mark
10/24/2023 1:34:00 AM

any recent feeedback?

G
Gopinadh
8/9/2023 4:05:00 AM

question number 2 is indicating you are giving proper questions. observe and change properly.

S
Santhi
1/1/2024 8:23:00 AM

passed today.40% questions were new.litwere case study,lots of new questions on afd,ratelimit,tm,lb,app gatway.got 2 set series of questions which are not present here.questions on azure cyclecloud, no.of vnet/vms required for implimentation,blueprints assignment/management group etc

R
Raviraj Magadum
1/12/2024 11:39:00 AM

practice test

S
sivaramakrishnan
7/27/2023 8:12:00 AM

want the dumps for emc content management server programming(cmsp)

A
Aderonke
10/23/2023 1:52:00 PM

brilliant and helpful

A
Az
9/16/2023 2:43:00 PM

q75. azure files is pass

K
ketty
11/9/2023 8:10:00 AM

very helpful

S
Sonail
5/2/2022 1:36:00 PM

thank you for these questions. it helped a lot.

S
Shariq
7/28/2023 8:00:00 AM

how do i get the h12-724 dumps

A
adi
10/30/2023 11:51:00 PM

nice data dumps

E
EDITH NCUBE
7/25/2023 7:28:00 AM

answers are correct

R
Raja
6/20/2023 4:38:00 AM

good explanation

B
BigMouthDog
1/22/2022 8:17:00 PM

hi team just want to know if there is any update version of the exam 350-401

F
francesco
10/30/2023 11:08:00 AM

helpful on 2017 scrum guide

A
Amitabha Roy
10/5/2023 3:16:00 AM

planning to attempt for the exam.

P
Prem Yadav
7/29/2023 6:20:00 AM

pleaseee upload

A
Ahmed Hashi
7/6/2023 5:40:00 PM

thanks ly so i have information cia

M
mansi
5/31/2023 7:58:00 AM

hello team, i need sap qm dumps for practice

J
Jamil aljamil
12/4/2023 4:47:00 AM

it’s good but not senatios based

C
Cath
10/10/2023 10:19:00 AM

q.119 - the correct answer is b - they are not captured in an update set as theyre data.

P
P
1/6/2024 11:22:00 AM

good matter

S
surya
7/30/2023 2:02:00 PM

please upload c_sacp_2308

S
Sasuke
7/11/2023 10:30:00 PM

please upload the dump. thanks very much !!

V
V
7/4/2023 8:57:00 AM

good questions

T
TTB
8/22/2023 5:30:00 AM

hi, could you please update the latest dump version

T
T
7/28/2023 9:06:00 PM

this question is keep repeat : you are developing a sales application that will contain several azure cloud services and handle different components of a transaction. different cloud services will process customer orders, billing, payment, inventory, and shipping. you need to recommend a solution to enable the cloud services to asynchronously communicate transaction information by using xml messages. what should you include in the recommendation?

G
Gurgaon
9/28/2023 4:35:00 AM

great questions

W
wasif
10/11/2023 2:22:00 AM

its realy good

S
Shubhra Rathi
8/26/2023 1:12:00 PM

oracle 1z0-1059-22 dumps

AI Tutor 👋 I’m here to help!