Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CAS-005 Exam Dumps - CompTIA CASP Questions and Answers

Question # 14

An administrator reviews the following log and determines the root cause of a site-to-site tunnel failure:

Which of the following actions should the administrator take to most effectively correct the failure?

Options:

A.

Enable perfect forward secrecy on the remote peer.

B.

Update the cipher suites configured for use on the server side.

C.

Add a new subnet as a permitted initiator.

D.

Disable IKE version 1 and run IKE version 2.

Buy Now
Question # 15

A security engineer wants to propose an MDM solution to mitigate certain risks. The MDM solution should meet the following requirements:

• Mobile devices should be disabled if they leave the trusted zone.

• If the mobile device is lost, data is not accessible.

Which of the following options should the security engineer enable on the MDM solution? (Select two).

Options:

A.

Geofencing

B.

Patch management

C.

Containerization

D.

Full disk encryption

E.

Allow/blocklist

F.

Geotagging

Buy Now
Question # 16

An organization recently implemented a policy that requires all passwords to be rotated every 90 days. An administrator observes a large volume of failed sign-on logs from multiple servers that are often accessed by users. The administrator determines users are disconnecting from the RDP session but not logging off. Which of the following should the administrator do to prevent account lockouts?

Options:

A.

Increase the account lockout threshold.

B.

Enforce password complexity.

C.

Automate logout of inactive sessions.

D.

Extend the allowed session length.

Buy Now
Question # 17

A development team must create a website to share indicators of compromise. The team wants to use APIs between industry peers to aid in configuring SIEM and SOAR. The team needs to create a free tier of service, and the senior developer insists on configuring rate limiting. Which of the following best describes the senior developer's reasoning?

Options:

A.

To prevent password-spraying attacks on the services hosting the API

B.

To limit the likelihood of resource exhaustion occurring on the API server

C.

To address concerns the team has about API bandwidth utilization

D.

To reduce attack surface exposure of the API endpoints connecting peers

Buy Now
Question # 18

During a periodic internal audit, a company identifies a few new, critical security controls that are missing. The company has a mature risk management program in place, and the following requirements must be met:

The stakeholders should be able to see all the risks.

The risks need to have someone accountable for them.

Which of the following actions should the GRC analyst take next?

Options:

A.

Add the risk to the risk register and assign the owner and severity.

B.

Change the risk appetite and assign an owner to it.

C.

Mitigate the risk and change the status to accepted.

D.

Review the risk to decide whether to accept or reject it.

Buy Now
Question # 19

An organization is implementing Zero Trust architecture A systems administrator must increase the effectiveness of the organization's context-aware access system. Which of the following is the best way to improve the effectiveness of the system?

Options:

A.

Secure zone architecture

B.

Always-on VPN

C.

Accurate asset inventory

D.

Microsegmentation

Buy Now
Question # 20

A company notices that cloud environment costs increased after using a new serverless solution based on API requests. Many invalid requests from unknown IPs were found, often within a short time. Which of the following solutions would most likely solve this issue, reduce cost, and improve security?

Options:

A.

Using digital certificates for known customers and performing API authorization through those certificates

B.

Defining request rate limits and comparing new requests from unknown IPs with a list of known-malicious IPs

C.

Setting authentication processes for the API requests as well as proper rate limits according to regular usage

D.

Only allowing API requests coming from regions with known customers

Buy Now
Question # 21

A security analyst is reviewing the following code in the public repository for potential risk concerns:

typescript

CopyEdit

include bouncycastle-1.4.jar;

include jquery-2.0.2.jar;

public static void main() {...}

public static void territory() { ... }

public static void state() { ... }

public static String code = "init";

public static String access_token = "spat-hfeiw-sogur-werdb-werib";

Which of the following should the security analyst recommend first to remediate the vulnerability?

Options:

A.

Developing role-based security awareness training

B.

Revoking the secret used in the solution

C.

Purging code from public view

D.

Scanning the application with SAST

Buy Now
Question # 22

An engineer wants to automate several tasks by running commands daily on a UNIX server. The engineer has only built-in, default tools available. Which of the following should the engineer use to best assist with this effort? (Select Two).

Options:

A.

Python

B.

Cron

C.

Ansible

D.

PowerShell

E.

Bash

F.

Task Scheduler

Buy Now
Question # 23

A company developed a new solution that needs to track any changes to the data, and the changes need to be quickly identified. If any changes are attempted without prior approval, multiple events must be triggered, such as:

    Raising alerts

    Blocking the unapproved changes

    Quickly removing access to the data

Which of the following solutions best meets these requirements?

Options:

A.

Tracking all application logs, integrating them to the existing SIEM, flagging any changes, and making them visible on security dashboards

B.

Implementing a file integrity monitoring tool and integrating it via orchestration and automation with other security tools

C.

Introducing more granular access controls and allowing read-only access for non-privileged users

D.

Configuring CASB rules, making access to the data available only to authorized personnel

Buy Now
Exam Code: CAS-005
Exam Name: CompTIA SecurityX Certification Exam
Last Update: Nov 17, 2025
Questions: 326
CAS-005 pdf

CAS-005 PDF

$29.75  $84.99
CAS-005 Engine

CAS-005 Testing Engine

$33.25  $94.99
CAS-005 PDF + Engine

CAS-005 PDF + Testing Engine

$47.25  $134.99