Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CompTIA SecurityX Certification Exam

Last Update 16 hours ago Total Questions : 344

The CompTIA SecurityX Certification Exam content is now fully updated, with all current exam questions added 16 hours ago. Deciding to include CAS-005 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CAS-005 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CAS-005 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CompTIA SecurityX Certification Exam practice test comfortably within the allotted time.

Question # 31

A security analyst is using data provided from a recent penetration test to calculate CVSS scores to prioritize remediation. Which of the following metric groups would the analyst need to determine to get the overall scores? (Select three).

A.

Temporal

B.

Availability

C.

Integrity

D.

Confidentiality

E.

Base

F.

Environmental

G.

Impact

Question # 32

A company receives reports about misconfigurations and vulnerabilities in a third-party hardware device that is part of its released products. Which of the following solutions is the best way for the company to identify possible issues at an earlier stage?

A.

Performing vulnerability tests on each device delivered by the providers

B.

Performing regular red-team exercises on the vendor production line

C.

Implementing a monitoring process for the integration between the application and the vendor appliance

D.

Implementing a proper supply chain risk management program

Question # 33

A company reduced its staff 60 days ago, and applications are now starting to fail. The security analyst is investigating to determine if there is malicious intent for the application failures. The security analyst reviews the following logs:

22:03:50 sshd[21502]: Success login for user01 from 192.168.2.5

22:10:00 sshd[21502]: Failed login for user10 from 192.168.2.5

22:11:40 sshd[21502]: Success login for user07 from 192.168.2.58

22:12:00 sshd[21502]: Failed login for user10 from 192.168.2.5

22:13:00 sshd[21502]: Failed login for user10 from 192.168.2.5

22:13:00 sshd[21502]: Success login for user03 from 192.168.2.27

22:13:00 sshd[21502]: Failed login for user10 from 192.168.2.5

Which of the following is the most likely reason for the application failures?

A.

The user’s account was set as a service account.

B.

The user ' s home directory was deleted.

C.

The user does not have sudo access.

D.

The root password has been changed.

Question # 34

Which of the following best describes the reason PQC preparation is important?

A.

To protect data against decryption due to increases in computational resource availability

B.

To have larger key lengths available through key stretching

C.

To improve encryption performance and speed using lightweight cryptography

D.

To leverage asymmetric encryption for large amounts of data

Question # 35

An organization must provide access to its internal system data. The organization requires that this access complies with the following:

    Access must be automated.

    Data confidentiality must be preserved.

    Access must be authenticated.

    Data must be preprocessed before it is retrieved.

Which of the following actions should the organization take to meet these requirements?

A.

Configure a reverse proxy to protect the data.

B.

Implement an on-demand VPN connection.

C.

Deploy an API gateway protected with access tokens.

D.

Continually publish all relevant data to a CDN.

Question # 36

Company A and Company D ate merging Company A ' s compliance reports indicate branchprotections are not in place A security analyst needs to ensure that potential threats to the software development life cycle are addressed. Which of the following should me analyst cons < der when completing this basic?

A.

If developers are unable to promote to production

B.

If DAST code is being stored to a single code repository

C.

If DAST scans are routinely scheduled

D.

If role-based training is deployed

Question # 37

Which of the following AI concerns is most adequately addressed by input sanitation?

A.

Model inversion

B.

Prompt Injection

C.

Data poisoning

D.

Non-explainable model

Question # 38

A company’s internal network is experiencing a security breach, and the threat actor is still active. Due to business requirements, users in this environment are allowed to utilize multiple machines at the same time. Given the following log snippet:

Which of the following accounts should a security analyst disable to best contain the incident without impacting valid users?

A.

user-a

B.

user-b

C.

user-c

D.

user-d

Question # 39

A developer receives feedback about code quality and efficiency. The developer needs to identify and resolve the following coding issues before submitting the code changes for peer review:

    Indexing beyond arrays

    Dereferencing null pointers

    Potentially dangerous data type combinations

    Unreachable code

    Non-portable constructs

Which of the following would be most appropriate for the developer to use in this situation?

A.

Linting

B.

SBoM

C.

DAST

D.

Branch protection

E.

Software composition analysis

Question # 40

A security engineer receives the following findings from a recent security audit:

• Data should be protected based on user permissions and roles.

• User action tracking should be implemented across the network.

• Digital identities should be validated across the data access workflow.

Which of the following is the first action the engineer should take to address the findings?

A.

Implement continuous and context-based authentication and authorization

B.

Use an enhanced user credential provisioning workflow and data monitoring tools

C.

Improve federation services for digital identities and data access

D.

Deploy OpenID Connect for API authentication

Go to page: