ExamGecko
Home / CompTIA / CAS-005 / List of questions
Ask Question

CompTIA CAS-005 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

Users are experiencing a variety of issues when trying to access corporate resources examples include

* Connectivity issues between local computers and file servers within branch offices

* Inability to download corporate applications on mobile endpoints wtiilc working remotely

* Certificate errors when accessing internal web applications

Which of the following actions are the most relevant when troubleshooting the reported issues? (Select two).

Review VPN throughput

Review VPN throughput

Check IPS rules

Check IPS rules

Restore static content on lite CDN.

Restore static content on lite CDN.

Enable secure authentication using NAC

Enable secure authentication using NAC

Implement advanced WAF rules.

Implement advanced WAF rules.

Validate MDM asset compliance

Validate MDM asset compliance

Suggested answer: A, F
Explanation:

The reported issues suggest problems related to network connectivity, remote access, and certificate management:

A . Review VPN throughput: Connectivity issues and the inability to download applications while working remotely may be due to VPN bandwidth or performance issues. Reviewing and optimizing VPN throughput can help resolve these problems by ensuring that remote users have adequate bandwidth for accessing corporate resources.

F . Validate MDM asset compliance: Mobile Device Management (MDM) systems ensure that mobile endpoints comply with corporate security policies. Validating MDM compliance can help address issues related to the inability to download applications and certificate errors, as non-compliant devices might be blocked from accessing certain resources.

B . Check IPS rules: While important for security, IPS rules are less likely to directly address the connectivity and certificate issues described.

C . Restore static content on the CDN: This action is related to content delivery but does not address VPN or certificate-related issues.

D . Enable secure authentication using NAC: Network Access Control (NAC) enhances security but does not directly address the specific issues described.

E . Implement advanced WAF rules: Web Application Firewalls protect web applications but do not address VPN throughput or mobile device compliance.

CompTIA Security+ Study Guide

NIST SP 800-77, 'Guide to IPsec VPNs'

CIS Controls, 'Control 11: Secure Configuration for Network Devices'

asked 13/02/2025
Prakhar Sengar
35 questions

Question 42

Report Export Collapse

A software engineer is creating a CI/CD pipeline to support the development of a web application The DevSecOps team is required to identify syntax errors Which of the following is the most relevant to the DevSecOps team's task'

Static application security testing

Static application security testing

Software composition analysis

Software composition analysis

Runtime application self-protection

Runtime application self-protection

Web application vulnerability scanning

Web application vulnerability scanning

Suggested answer: A
Explanation:

Static Application Security Testing (SAST) involves analyzing source code or compiled code for security vulnerabilities without executing the program. This method is well-suited for identifying syntax errors, coding standards violations, and potential security issues early in the development lifecycle.

A . Static application security testing (SAST): SAST tools analyze the source code to detect syntax errors, vulnerabilities, and other issues before the code is run. This is the most relevant task for the DevSecOps team to identify syntax errors and improve code quality.

B . Software composition analysis: This focuses on identifying vulnerabilities in open-source components and libraries used in the application but does not address syntax errors directly.

C . Runtime application self-protection (RASP): RASP involves monitoring and protecting applications during runtime, which does not help in identifying syntax errors during the development phase.

D . Web application vulnerability scanning: This involves scanning the running application for vulnerabilities but does not address syntax errors in the code.

CompTIA Security+ Study Guide

OWASP (Open Web Application Security Project) guidelines on SAST

NIST SP 800-95, 'Guide to Secure Web Services'

Top of Form

Bottom of Form

asked 13/02/2025
John Doe
43 questions

Question 43

Report Export Collapse

An organization is looking for gaps in its detection capabilities based on the APTs that may target the industry Which of the following should the security analyst use to perform threat modeling?

ATT&CK

ATT&CK

OWASP

OWASP

CAPEC

CAPEC

STRIDE

STRIDE

Suggested answer: A
Explanation:

The ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework is the best tool for a security analyst to use for threat modeling when looking for gaps in detection capabilities based on Advanced Persistent Threats (APTs) that may target the industry. Here's why:

Comprehensive Framework: ATT&CK provides a detailed and structured repository of known adversary tactics and techniques based on real-world observations. It helps organizations understand how attackers operate and what techniques they might use.

Gap Analysis: By mapping existing security controls against the ATT&CK matrix, analysts can identify which tactics and techniques are not adequately covered by current detection and mitigation measures.

Industry Relevance: The ATT&CK framework is continuously updated with the latest threat intelligence, making it highly relevant for industries facing APT threats. It provides insights into specific APT groups and their preferred methods of attack.

CompTIA Security+ SY0-601 Study Guide by Mike Chapple and David Seidl

MITRE ATT&CK Framework Official Documentation

NIST Special Publication 800-150: Guide to Cyber Threat Information Sharing

asked 13/02/2025
Donnie Roach
32 questions

Question 44

Report Export Collapse

Recent repents indicate that a software tool is being exploited Attackers were able to bypass user access controls and load a database. A security analyst needs to find the vulnerability and recommend a mitigation. The analyst generates the following output:

CompTIA CAS-005 image Question 44 63875074218397843953856

Which of the following would the analyst most likely recommend?

Become a Premium Member for full access
  Unlock Premium Member

Question 45

Report Export Collapse

A company wants to install a three-tier approach to separate the web. database, and application servers A security administrator must harden the environment which of the following is the best solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 46

Report Export Collapse

A financial technology firm works collaboratively with business partners in the industry to share threat intelligence within a central platform This collaboration gives partner organizations the ability to obtain and share data associated with emerging threats from a variety of adversaries Which of the following should the organization most likely leverage to facilitate this activity? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 47

Report Export Collapse

An organization mat performs real-time financial processing is implementing a new backup solution Given the following business requirements?

* The backup solution must reduce the risk for potential backup compromise

* The backup solution must be resilient to a ransomware attack.

* The time to restore from backups is less important than the backup data integrity

* Multiple copies of production data must be maintained

Which of the following backup strategies best meets these requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 48

Report Export Collapse

During a forensic review of a cybersecurity incident, a security engineer collected a portion of the payload used by an attacker on a comprised web server Given the following portion of the code:

CompTIA CAS-005 image Question 48 63875074218397843953856

Which of the following best describes this incident?

Become a Premium Member for full access
  Unlock Premium Member

Question 49

Report Export Collapse

A security architect for a global organization with a distributed workforce recently received funding lo deploy a CASB solution Which of the following most likely explains the choice to use a proxy-based CASB?

Become a Premium Member for full access
  Unlock Premium Member

Question 50

Report Export Collapse

A company's security policy states that any publicly available server must be patched within 12 hours after a patch is released A recent llS zero-day vulnerability was discovered that affects all versions of the Windows Server OS:

CompTIA CAS-005 image Question 50 63875074218413467389736

Which of the following hosts should a security analyst patch first once a patch is available?

Become a Premium Member for full access
  Unlock Premium Member
Total 222 questions
Go to page: of 23
Search

Related questions