CompTIA's CAS-005 A security analyst discovers a new device on the company's dedicated IoT subnet during the most recent vulnerability scan. The scan results show numerous open ports and insecure protocols in addition to default usernames and passwords. A camera needs to transmit video to the security server in the IoT subnet. Which of the following should the security analyst recommend to securely operate the camera?
#61
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 The Chief Information Security Officer of a large multinational organization has asked the security risk manager to use risk scenarios during a risk analysis. Which of the following is the most likely reason for this approach?
#62
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 A security engineer would like to control configurations on mobile devices while fulfilling the following requirements:Support and control Apple and Android devices.The device must be corporate-owned.Which of the following would enable the engineer to meet these requirements? (Choose two.) E. Update policy to prohibit the use of BYOD devices. F. Implement a RADIUS solution.
#63
Answer: C✅ Correct❌ Incorrect
CompTIA's CAS-005 A pharmaceutical company uses a cloud provider to host thousands of independent resources in object storage. The company needs a practical and effective means of discovering data, monitoring changes, and identifying suspicious activity. Which of the following would best meet these requirements?
#64
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 A security analyst is assessing a new application written in Java. The security analyst must determine which vulnerabilities exist during runtime. Which of the following would provide the most exhaustive list of vulnerabilities while meeting the objective? E. Static analysis
#65
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 Recently, two large engineering companies in the same line of business decided to approach cyberthreats in a united way. Which of the following best describes this unified approach?
#66
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 A regulated company is in the process of refreshing its entire infrastructure. The company has a business-critical process running on an old 2008 Windows server. If this server fails, the company would lose millions of dollars in revenue. Which of the following actions should the company should take?
#67
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 A security engineer needs to ensure production containers are automatically scanned for vulnerabilities before they are accepted into the production environment. Which of the following should the engineer use to automatically incorporate vulnerability scanning on every commit?
#68
Answer: C✅ Correct❌ Incorrect
CompTIA's CAS-005 A security architect recommends replacing the company's monolithic software application with a containerized solution. Historically, secrets have been stored in the application's configuration files. Which of the following changes should the security architect make in the new system?
#69
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 A security engineer is assessing a new tool to segment data and communications between domains. The assessment must determine how data transmission controls can be bypassed without detection. Which of the following techniques should the security engineer use?
#70
Answer: C✅ Correct❌ Incorrect
CompTIA's CAS-005 During an adversarial simulation exercise, an external team was able to gain access to sensitive information and systems without the organization detecting this activity. Which of the following mitigation strategies should the organization use to best resolve the findings?
#71
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 A help desk technician is troubleshooting an issue with an employee's laptop that will not boot into its operating system. The employee reported the laptop had been stolen but then found it one day later. The employee has asked the technician for help recovering important data. The technician has identified the following:The laptop operating system was not configured with BitLocker.The hard drive has no hardware failures.Data is present and readable on the hard drive, although it appears to be illegible.Which of the following is the most likely reason the technician is unable to retrieve legible data from the hard drive?
#72
Answer: C✅ Correct❌ Incorrect
CompTIA's CAS-005 A security administrator needs to automate alerting. The server generates structured log files that need to be parsed to determine whether an alarm has been triggered. Given the following code function:Which of the following is most likely the log input that the code will parse? A. C.
#73
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 A financial technology firm works collaboratively with business partners in the industry to share threat intelligence within a central platform. This collaboration gives partner organizations the ability to obtain and share data associated with emerging threats from a variety of adversaries. Which of the following should the organization most likely leverage to facilitate this activity?(Choose two.) E. TAXII F. JTAG
#74
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 A company wants to invest in research capabilities with the goal to operationalize the research output. Which of the following is the best option for a security architect to recommend?
#75
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 A company is concerned about the security of customer data. The IT department has configured all web applications with appropriate access controls to restrict to only authorized users. Which of the following solutions addresses this concern?
#76
Answer: C✅ Correct❌ Incorrect
CompTIA's CAS-005 A security analyst reviews the following report:Which of the following assessments is the analyst performing?
#77
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 A security researcher tells a company that one of its solutions is vulnerable to buffer overflow, leading to a malicious coding execution. Which of the following is the best way to avoid this vulnerability in future versions?
#78
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 Users are experiencing a variety of issues when trying to access corporate resources. Examples include:• Connectivity issues between local computers and file servers between branch offices• Inability to download corporate applications on mobile endpoints while working remotely• Certificate errors when accessing internal web applicationsWhich of the following actions are the most relevant when troubleshooting the reported issues? (Choose two.) E. Implement advanced WAF rules. F. Validate MDM asset compliance.
#79
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 A network engineer recorded the following test results:After a new network security appliance was deployed, the results of the network test are as follows:Which of the following network infrastructure components most likely produced these results?
#80
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 A company wants to implement hardware security key authentication for accessing sensitive information systems. The goal is to prevent unauthorized users from gaining access with a stolen password. Which of the following models should the company implement to best solve this issue?
#81
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 Which of the following is the main reason quantum computing advancements are leading companies and countries to deploy new encryption algorithms?
#82
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 A company is adopting microservice architecture in order to quickly remediate vulnerabilities and deploy to production. All of the microservices run on the same Linux platform. Significant time was spent updating the base OS before deploying code. Which of the following should the company do to make the process efficient?
#83
Answer: A✅ Correct❌ Incorrect
CompTIA's CAS-005 During a gap assessment, an organization notes that BYOD usage is a significant risk. The organization implemented administrative policies prohibiting BYOD usage. However, the organization has not implemented technical controls to prevent the unauthorized use of BYOD assets when accessing the organization's resources. Which of the following solutions should the organization implement to best reduce the risk of BYOD devices? (Choose two.) E. SD-WAN, to enforce web content filtering through external proxies F. DLP, to enforce data protection capabilities
#84
Answer: B✅ Correct❌ Incorrect
CompTIA's CAS-005 An organization has several systems deployed in a public cloud and wants to confirm that when data retention periods are reached, the data is properly disposed of. Which of the following best meets the organization's needs?
#85
Answer: C✅ Correct❌ Incorrect
CompTIA's CAS-005 A security engineer reviews an after-action report from a previous security breach and notes a long lag time between detection and containment of a compromised account. The engineer suggests using SOAR to address this concern. Which of the following best explains the engineer's goal?
#86
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 During an audit at an organization, auditors find that developers are able to promote code to production. The auditors request a full review of all production changes. Which of the following should the organization implement to prevent a full review in the future?
#87
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 A systems engineer is configuring SSO for a business that will be using SaaS applications for its remote-only workforce. Privileged actions in SaaS applications must be allowed only from corporate mobile devices that meet minimum security requirements, but BYOD must also be permitted for other activity. Which of the following would best meet this objective?
#88
Answer: D✅ Correct❌ Incorrect
CompTIA's CAS-005 A systems administrator wants to reduce the number of failed patch deployments in an organization. The administrator discovers that system owners modify systems or applications in an ad hoc manner. Which of the following is the best way to reduce the number of failed patch deployments?
#89
Answer: C✅ Correct❌ Incorrect
CompTIA's CAS-005 A security administrator is reviewing the following code snippet from a website component:A review of the inc.tmp file shows the following:214875925793253420385093450834534324525234352353455234532423534245234534523453896276563857932578395378543620382630532804508325Which of the following is most likely the reason for inaccuracies?