Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CAS-005 Exam Dumps - CompTIA CASP Questions and Answers

Question # 64

An analyst needs to identify security event trends. The following is an excerpt from the SIEM:

Time

Alert

Source

Destination

20250407-UTC

Successful login from uncommon auth method in 24 hours

user1

AD-DC-01.corp

20250407-UTC

User accessed sensitive resources

user1

NFS-01/financial/share

20250407-UTC

Potential password spraying from host

10.10.15.100

iga-server.corp

20250407-UTC

Threshold exceeded user visiting high risk websites

user2

freehacks.com

20250407-UTC

Risk score exceeded for user

user1

bar.ru

20250407-UTC

NULL

NULL

NULL

Which of the following is the most practical way to identify trends?

Options:

A.

Decreasing the timing window for detections related to user1

B.

Incorporating audit log reduction

C.

Correlating based on source field in batches of time

D.

Disabling the noisy rules based on total alerts fired per day

Buy Now
Question # 65

A building camera is remotely accessed and disabled from the remote console application during off-hours. A security analyst reviews the following logs:

A security architect is onboarding a new EDR agent on servers that traditionally do not have internet access. In order for the agent to receive updates and report back to the management console, some changes must be made. Which of the following should the architect do to best accomplish this requirement? (Select two).

Options:

A.

Create a firewall rule to only allow traffic from the subnet to the internet via a proxy.

B.

Configure a proxy policy that blocks all traffic on port 443.

C.

Configure a proxy policy that allows only fully qualified domain names needed to communicate to a portal.

D.

Create a firewall rule to only allow traffic from the subnet to the internet via port 443.

E.

Create a firewall rule to only allow traffic from the subnet to the internet to fully qualified names that are not identified as malicious by the firewall vendor.

F.

Configure a proxy policy that blocks only lists of known-bad, fully qualified domain names.

Buy Now
Question # 66

An organization recently migrated data to a new file management system. The architect decides to use a discretionary authorization model on the new system. Which of the following best explains the architect ' s choice?

Options:

A.

The responsibility of migrating data to the new file management system was outsourced to the vendor providing the platform.

B.

The permissions were not able to be migrated to the new system, and several stakeholders were made responsible for granting appropriate access.

C.

The legacy file management system did not support modern authentication techniques despite the business requirements.

D.

The data custodians were selected by business stakeholders to ensure backups of the file management system are maintained off site.

Buy Now
Question # 67

An organization has been using self-managed encryption keys rather than the free keys managed by the cloud provider. The Chief Information Security Officer (CISO) reviews the monthly bill and realizes the self-managed keys are more costly than anticipated. Which of the following should the CISO recommend to reduce costs while maintaining a strong security posture?

Options:

A.

Utilize an on-premises HSM to locally manage keys.

B.

Adjust the configuration for cloud provider keys on data that is classified as public.

C.

Begin using cloud-managed keys on all new resources deployed in the cloud.

D.

Extend the key rotation period to one year so that the cloud provider can use cached keys.

Buy Now
Question # 68

A company’sSIEMis designed to associate the company’sasset inventorywith user events. Given the following report:

Which of thefollowing should asecurity engineer investigate firstas part of alog audit?

Options:

A.

Anendpointthat is not submitting any logs

B.

Potential activity indicating an attackermoving laterally in the network

C.

Amisconfigured syslog servercreating false negatives

D.

Unauthorized usage attempts of the administrator account

Buy Now
Question # 69

The material finding from a recent compliance audit indicate a company has an issue with excessive permissions. The findings show that employees changing roles or departments results in privilege creep. Which of the following solutions are the best ways to mitigate this issue? (Select two).

Setting different access controls defined by business area

Options:

A.

Implementing a role-based access policy

B.

Designing a least-needed privilege policy

C.

Establishing a mandatory vacation policy

D.

Performing periodic access reviews

E.

Requiring periodic job rotation

Buy Now
Question # 70

Which of the following are the best ways to mitigate the threats that are the highest priority? (Select two).

Options:

A.

Isolate network systems using Zero Trust architecture with microsegmentation and SD-WAN

B.

Scan all systems and source code with access to sensitive data for vulnerabilities.

C.

Implement a cloud access security broker and place it in blocking mode to prevent information exfiltration.

D.

Apply data labeling to all sensitive information within the environment with special attention to payroll information.

E.

Institute a technical approval process that requires multiple parties to sign off on mass payroll changes.

Buy Now
Question # 71

Anorganization has noticed an increase in phishing campaigns utilizingtyposquatting. A security analyst needs to enrich the data for commonly used domains against the domains used in phishing campaigns. The analyst uses a log forwarder to forward network logs to the SIEM. Which of the following would allow the security analyst to perform this analysis?

Options:

A.

Use acron jobto regularly update and compare domains.

B.

Create aparserthat matches domains.

C.

Develop aquerythat filters out all matching domain names.

D.

Implement adashboardon the SIEM that shows the percentage of traffic by domain.

Buy Now
Question # 72

A security architect is establishing requirements to design resilience in un enterprise system trial will be extended to other physical locations. The system must

• Be survivable to one environmental catastrophe

• Re recoverable within 24 hours of critical loss of availability

• Be resilient to active exploitation of one site-to-site VPN solution

Options:

A.

Load-balance connection attempts and data Ingress at internet gateways

B.

Allocate fully redundant and geographically distributed standby sites.

C.

Employ layering of routers from diverse vendors

D.

Lease space to establish cold sites throughout other countries

E.

Use orchestration to procure, provision, and transfer application workloads lo cloud services

F.

Implement full weekly backups to be stored off-site for each of the company ' s sites

Buy Now
Question # 73

A penetration tester reviews the following router configuration:

set-system services ssh root login-allow

set-system services web-management https allow

set-system services syslog file interactive

set-system services log mode stream

set-interfaces 0 family inet address 10.12.14.1/8

Which of the following changes is the best way to enhance security?

Options:

A.

Setting specific ciphers for user-interactive sessions

B.

Disabling access to unencrypted terminal connections

C.

Enabling network segmentation controls

D.

Configuring automatic patching and rebooting of the device

Buy Now
Exam Code: CAS-005
Exam Name: CompTIA SecurityX Certification Exam
Last Update: Apr 6, 2026
Questions: 344
CAS-005 pdf

CAS-005 PDF

$25.5  $84.99
CAS-005 Engine

CAS-005 Testing Engine

$28.5  $94.99
CAS-005 PDF + Engine

CAS-005 PDF + Testing Engine

$40.5  $134.99