CompTIA's CAS-005 A security engineer is reviewing event logs because an employee successfully connected a personal Windows laptop to the corporate network, which is against company policy. Company policy allows all Windows 10 and 11 laptops to connect to the system as long as the MDM agent installed by IT is running. Only compliant devices can connect, and the logic in the system to evaluate compliant laptops is as follows:Which of the following most likely occurred when the employee connected a personally owned Windows laptop and was allowed on the network? [View](https://www.examtopics.com/discussions/comptia/view/169854-exam-cas-005-topic-1-question-1-discussion/)
#1
Answer: C✅ Correct❌ Incorrect
CompTIA's CAS-005 An organization is working to secure its development process to ensure developers cannot deploy artifacts directly into the production environment. Which of the following security practice recommendations would be the best to accomplish this objective? E. Utilize mandatory vacations for all developers. F. Review all access to production systems on a quarterly basis. [View](https://www.examtopics.com/discussions/comptia/view/303464-exam-cas-005-topic-1-question-2-discussion/)
#2
Answer: C✅ Correct❌ Incorrect
CompTIA's CAS-005 A security architect discovers the following while reviewing code for a company's website: selection = "SELECT Item FROM Catalog WHERE ItemID = " & Request("ItemID")Which of the following should the security architect recommend? E. URL encoding [View on](https://www.examtopics.com/discussions/comptia/view/302884-exam-cas-005-topic-1-question-3-discussion/)
#3
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 A CRM company leverages a CSP PaaS service to host and publish Its SaaS product. Recently, a large customer requested that all infrastructure components must meet strict regulatory requirements, including configuration management, patch management, and life-cycle management. Which of the following organizations is responsible for ensuring those regulatory requirements are met?
#4
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 Company A is merging with Company B. Company A is a small, local company. Company B has a large, global presence. The two companies have a lot of duplication in their IT systems, processes, and procedures. On the new Chief Information Officer's (CIO's) first day, a fire breaks out at Company B's main data center. Which of the following actions should the CIO take first?
#5
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 The results of an internal audit indicate several employees reused passwords that were previously included in a published list of compromised passwords.The company has the following employee password policy:Which of the following should be implemented to best address the password reuse issue? (Choose two.) E. Decrease the maximum age to 30 days. F. Remove the complexity requirements. G. Increase the maximum age to 120 days.
#6
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 A mobile administrator is reviewing the following mobile device DHCP logs to ensure the proper mobile settings are applied to managed devices:Which of the following mobile configuration settings is the mobile administrator verifying?
#7
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 A security analyst is investigating a possible insider threat incident that involves the use of an unauthorized USB from a shared account to exfiltrate data. The event did not create an alert. The analyst has confirmed the USB hardware ID is not on the device allow list, but has not yet confirmed the owner of the USB device. Which of the following actions should the analyst take next?
#8
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 Which of the following security features do email signatures provide? E. Chain of custody
#9
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 A software development company wants to ensure that users can confirm the software is legitimate when installing it. Which of the following is the best way for the company to achieve this security objective?
#10
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 While performing mandatory monthly patch updates on a production application server, the security analyst reports an instance of buffer overflow for a new application that was migrated to the cloud and is also publicly exposed. Security policy requires that only internal users have access to the application. Which of the following should the analyst implement to mitigate the issues reported? (Choose two.) E. Set up a DLP policy to alert for exfiltration on all application servers. F. Enable nightly vulnerability scans.
#11
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 PKI can be used to support security requirements in the change management process. Which of the following capabilities does PKI provide for messages?
#12
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 Several unlabeled documents in a cloud document repository contain cardholder information. Which of the following configuration changes should be made to the DLP system to correctly label these documents in the future?
#13
Answer: C✅ Correct❌ Incorrect
CompTIA's CAS-005 A systems administrator at a web-hosting provider has been tasked with renewing the public certificates of all customer sites. Which of the following would best support multiple domain names while minimizing the amount of certificates needed?
#14
Answer: C✅ Correct❌ Incorrect
CompTIA's CAS-005 Which of the following best explain why organizations prefer to utilize code that is digitally signed? (Choose two.) E. It verifies the recipient's identity. F. It ensures the code is free of malware.
#15
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 A security engineer receives reports through the organization's bug bounty program about remote code execution in a specific component in a custom application. Management wants to properly secure the component and proactively avoid similar issues. Which of the following is the best approach to uncover additional vulnerable paths in the application? E. Analyze the use of an HTTP intercepting proxy to dynamically uncover issues.
#16
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 A security technician is investigating a system that tracks inventory via a batch update each night. The technician is concerned that the system poses a risk to the business, as errors are occasionally generated and reported inventory appears incorrect. The following output log is provided:The technician reviews the output of the batch job and discovers that the inventory was never less than zero, and the final inventory was 100 rather than 60. Which of the following should the technician do to resolve this issue?
#17
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 A programmer is reviewing the following proprietary piece of code that was identified as a vulnerability due to users being authenticated when they provide incorrect credentials:Which of the following should the programmer implement to remediate the code vulnerability? E. Database connection over encrypted channels
#18
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 A senior cybersecurity engineer is solving a digital certificate issue in which the CA denied certificate issuance due to failed subject identity validation. At which of the following steps within the PKI enrollment process would the denial have occurred?
#19
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 An internal user can send encrypted emails successfully to all recipients, except one. at an external organization. When the internal user attempts to send encrypted emails to this external recipient, a security error message appears. The issue does not affect unencrypted emails. The external recipient can send encrypted emails to internal users. Which of the following is the most likely cause of the issue?
#20
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 A security administrator is setting up a virtualization solution that needs to run services from a single host. Each service should be the only one running in its environment. Each environment needs to have its own operating system as a base but share the kernel version and properties of the running host. Which of the following technologies would best meet these requirements? E. Emulation
#21
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 A company has data it would like to aggregate from its PLCs for data visualization and predictive maintenance purposes. Which of the following is the most likely destination for the tag data from the PLCs?
#22
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 Which of the following is the best way to protect the website browsing history for an executive who travels to foreign countries where internet usage is closely monitored?
#23
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 A systems administrator is working with the SOC to identify potential intrusions associated with ransomware. The SOC wants the systems administrator to perform network-level analysis to identify outbound traffic from any infected machines. Which of the following is the most appropriate action for the systems administrator to take?
#24
Answer: C✅ Correct❌ Incorrect
CompTIA's CAS-005 A retail organization wants to properly test and verify its capabilities to detect and/or prevent specific TTPs as mapped to the MITRE ATTACK framework specific to APTs. Which of the following should be used by the organization to accomplish this goal?
#25
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 IoCs were missed during a recent security incident due to the reliance on a signature-based detection platform. A security engineer must recommend a solution that can be implemented to address this shortcoming. Which of the following would be the most appropriate recommendation? E. EAP
#26
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 A company that provides services to clients who work with highly sensitive data would like to provide assurance that the data's confidentiality is maintained in a dynamic, low-risk environment. Which of the following would best achieve this goal? (Choose two.) E. Configure SOAR to monitor and intercept files and data leaving the network. F. Implement file integrity monitoring.
#27
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 An organization wants to implement an access control system based on its data classification policy that includes the following data types:Confidential -Restricted -Internal -Public Flag for Review -The access control system should support SSO federation to map users into groups. Each group should only access systems that process and store data at the classification assigned to the group. Which of the following should the organization implement to enforce its requirements with a minimal impact to systems and resources?
#28
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 A security analyst was monitoring the networks of a group of companies. The analyst identified several periods of concentrated, coordinated activity by unknown actors. The activity repeated at regular intervals and affected all the companies. Minor hardware outages that correlated with the same times as the discovered activity escalated in severity. Which of the following threat actors was most likely involved?
#29
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 The company's client service team is receiving a large number of inquiries from clients regarding a new vulnerability. Which of the following would provide the customer service team with a consistent message to deliver directly to clients?