Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CAS-005 Exam Dumps - CompTIA CASP Questions and Answers

Question # 54

A security administrator needs to automate alerting. The server generates structured log files that need to be parsed to determine whether an alarm has been triggered Given the following code function:

Which of the following is most likely the log input that the code will parse?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Question # 55

A security analyst received a report that an internal web page is down after a company-wide update to the web browser Given the following error message:

Which of the following is the b«« way to fix this issue?

Options:

A.

Rewriting any legacy web functions

B.

Disabling all deprecated ciphers

C.

Blocking all non-essential pons

D.

Discontinuing the use of self-signed certificates

Buy Now
Question # 56

A company is adopting microservice architecture in order to quickly remediate vulnerabilities and deploy to production. All of the microservices run on the same Linux platform. Significant time was spent updating the base OS before deploying code. Which of the following should the company do to make the process efficient?

Options:

A.

Use Terraform scripts while creating golden images

B.

Create a cron job to run apt-update every 30 days.

C.

Use snapshots to deploy code to existing compute instances.

D.

Deploy a centralized update server.

Buy Now
Question # 57

Which of the following tests explains why AI output could be inaccurate?

Options:

A.

Model poisoning

B.

Social engineering

C.

Output handling

D.

Prompt injections

Buy Now
Question # 58

A company that uses containers to run its applications is required to identify vulnerabilities on every container image in a private repository The security team needs to be able to quickly evaluate whether to respond to a given vulnerability Which of the following, will allow the security team to achieve the objective with the last effort?

Options:

A.

SAST scan reports

B.

Centralized SBoM

C.

CIS benchmark compliance reports

D.

Credentialed vulnerability scan

Buy Now
Question # 59

An organization would like to increase the effectiveness of its incident response process across its multiplatform environment. A security engineer needs to implement the improvements using the organization's existing incident response tools. Which of the following should the security engineer use?

Options:

A.

Playbooks

B.

Event collectors

C.

Centralized logging

D.

Endpoint detection

Buy Now
Question # 60

A recent security audit identified multiple endpoints have the following vulnerabilities:

• Various unsecured open ports

• Active accounts for terminated personnel

• Endpoint protection software with legacy versions

• Overly permissive access rules

Which of the following would best mitigate these risks? (Select three).

Options:

A.

Local drive encryption

B.

Secure boot

C.

Address space layout randomization

D.

Unneeded services disabled

E.

Patching

F.

Logging

G.

Removal of unused accounts

Buy Now
Question # 61

A security operations engineer needs to prevent inadvertent data disclosure when encrypted SSDs are reused within an enterprise. Which of the following is the most secure way to achieve this goal?

Options:

A.

Executing a script that deletes and overwrites all data on the SSD three times

B.

Wiping the SSD through degaussing

C.

Securely deleting the encryption keys used by the SSD

D.

Writing non-zero, random data to all cells of the SSD

Buy Now
Question # 62

A security engineer is developing a solution to meet the following requirements:

• All endpoints should be able to establish telemetry with a SIEM.

• All endpoints should be able to be integrated into the XDR platform.

• SOC services should be able to monitor the XDR platform.

Which of the following should the security engineer implement to meet the requirements? (Select Two.)

Options:

A.

EDR

B.

HIDS

C.

Web application firewall

D.

Central logging

E.

Host-based firewall

F.

TPM

Buy Now
Question # 63

An ISAC supplied recent threat intelligence information about pictures used on social media that provide reconnaissance of systems in use in secure facilities. In response, the Chief Information Security Officer (CISO) wants several configuration changes implemented via the MDM to ensure the following:

• Camera functions and location services are blocked for corporate mobile devices.

• All social media is blocked on the corporate and guest wireless networks.

Which of the following is the CISO practicing to safeguard against the threat?

Options:

A.

Adversary emulation

B.

Operational security

C.

Open-source intelligence

D.

Social engineering

Buy Now
Exam Code: CAS-005
Exam Name: CompTIA SecurityX Certification Exam
Last Update: Nov 17, 2025
Questions: 326
CAS-005 pdf

CAS-005 PDF

$29.75  $84.99
CAS-005 Engine

CAS-005 Testing Engine

$33.25  $94.99
CAS-005 PDF + Engine

CAS-005 PDF + Testing Engine

$47.25  $134.99