Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CompTIA SecurityX Certification Exam

Last Update 16 hours ago Total Questions : 344

The CompTIA SecurityX Certification Exam content is now fully updated, with all current exam questions added 16 hours ago. Deciding to include CAS-005 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CAS-005 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CAS-005 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CompTIA SecurityX Certification Exam practice test comfortably within the allotted time.

Question # 91

During a periodic internal audit, a company identifies a few new, critical security controls that are missing. The company has a mature risk management program in place, and the following requirements must be met:

The stakeholders should be able to see all the risks.

The risks need to have someone accountable for them.

Which of the following actions should the GRC analyst take next?

A.

Add the risk to the risk register and assign the owner and severity.

B.

Change the risk appetite and assign an owner to it.

C.

Mitigate the risk and change the status to accepted.

D.

Review the risk to decide whether to accept or reject it.

Question # 92

During a security assessment using an EDR solution, a security engineer generates the following report about the assets in the system:

Initial report:

Device | Type | EDR status | Infection Status

LN002 | Linux SE | Enabled (unmanaged) | Unknown

OWIN23 | Windows 7 | Enabled | Clean

OWIN29 | Windows 10 | Enabled (bypass) | Clean

MAC005 | Mac OS | Enabled | Clean

After five days:

Device | Type | EDR status | Infection Status

LN002 | Linux SE | Enabled (unmanaged) | Unknown

OWIN23 | Windows 7 | Enabled | Clean

OWIN29 | Windows 10 | Enabled (bypass) | Infected

MAC005 | Mac OS | Disabled | Clean

Which of the following most likely enabled the infection?

A.

OWIN23 uses a legacy version of Windows that is not supported by the EDR.

B.

LN002 was not supported by the EDR solution and propagates the RAT.

C.

OWIN29 ' s EDR has an unknown vulnerability that was exploited by the attacker.

D.

MAC005 spreads the malware through other hosts in the network.

Question # 93

During a recent audit, a company ' s systems were assessed- Given the following information:

Which of the following is the best way to reduce the attack surface?

A.

Deploying an EDR solution to all impacted machines in manufacturing

B.

Segmenting the manufacturing network with a firewall and placing the rules in monitor mode

C.

Setting up an IDS inline to monitor and detect any threats to the software

D.

Implementing an application-aware firewall and writing strict rules for the application access

Question # 94

After remote desktop capabilities were deployed in the environment, various vulnerabilities were noticed.

• Exfiltration of intellectual property

• Unencrypted files

• Weak user passwords

Which of the following is the best way to mitigate these vulnerabilities? (Select two).

A.

Implementing data loss prevention

B.

Deploying file integrity monitoring

C.

Restricting access to critical file services only

D.

Deployingdirectory-based group policies

E.

Enabling modem authentication that supports MFA

F.

Implementing a version control system

G.

Implementing a CMDB platform

Question # 95

Which of the following best explains the importance of determining organization risk appetite when operating with a constrained budget?

A.

Risk appetite directly impacts acceptance of high-impact low-likelihood events.

B.

Organizational risk appetite varies from organization to organization

C.

Budgetary pressure drives risk mitigation planning in all companies

D.

Risk appetite directly influences which breaches are disclosed publicly

Question # 96

An organization is developing an in-house software platform to support capital planning and reporting functions. In addition to role-based access controls and auditing/logging capabilities, the product manager must include requirements associated with archiving data and immutable backups. Which of the following organizational considerations are most likely associated with this requirement? (Select two)

A.

Crypto-export management controls

B.

Supply chain weaknesses

C.

Device attestation

D.

Quality assurance

E.

Legal hold compliance

F.

Ransomware resilience

Question # 97

After a company discovered a zero-day vulnerability in its VPN solution, the company plans to deploy cloud-hosted resources to replace its current on-premises systems. An engineer must find an appropriate solution to facilitate trusted connectivity. Which of the following capabilities is the most relevant?

A.

Container orchestration

B.

Microsegmentation

C.

Conditional access

D.

Secure access service edge

Question # 98

A security analyst discovered requests associated with IP addresses known for born legitimate 3nd bot-related traffic. Which ofthe following should the analyst use to determine whether the requests are malicious?

A.

User-agent string

B.

Byte length of the request

C.

Web application headers

D.

HTML encoding field

Question # 99

Which of the following best describes a common use case for homomorphic encryption?

A.

Processing data on a server after decrypting in order to prevent unauthorized access in transit

B.

Maintaining the confidentiality of data both at rest and in transit to and from a CSP for processing

C.

Transmitting confidential data to a CSP for processing on a large number of resources without revealing information

D.

Storing proprietary data across multiple nodes in a private cloud to prevent access by unauthenticated users

Question # 100

The material finding from a recent compliance audit indicate a company has an issue with excessive permissions. The findings show that employees changing roles or departments results in privilege creep. Which of the following solutions are the best ways to mitigate this issue? (Select two).

Setting different access controls defined by business area

A.

Implementing a role-based access policy

B.

Designing a least-needed privilege policy

C.

Establishing a mandatory vacation policy

D.

Performing periodic access reviews

E.

Requiring periodic job rotation

Go to page: