Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CAS-005 Exam Dumps - CompTIA CASP Questions and Answers

Question # 84

While reviewing recent modem reports, a security officer discovers that several employees were contacted by the same individual who impersonated a recruiter. Which of the following best describes this type of correlation?

Options:

A.

Spear-phishing campaign

B.

Threat modeling

C.

Red team assessment

D.

Attack pattern analysis

Buy Now
Question # 85

A security analyst isreviewing the following event timeline from an COR solution:

Which of the following most likely has occurred and needs to be fixed?

Options:

A.

The Dl P has failed to block malicious exfiltration and data tagging is not being utilized property

B.

An EDRbypass was utilized by a threat actor and updates must be installed by the administrator.

C.

A logic law has introduced a TOCTOU vulnerability and must be addressed by the COR vendor

D.

A potential insider threat is being investigated and will be addressed by the senior management team.

Buy Now
Question # 86

A security analyst is developing a threat model that focuses on attacks associated with the organization ' s storage products. The products:

• Are used in commercial and government user environments

• Are required to comply with crypto-export requirements

• Include both hardware and software components that are developed by external vendors in Europe and Asia

Which of the following are the most important for the analyst to consider when developing the model? (Select two).

Options:

A.

Contractual obligations

B.

Legal hold obligations

C.

Trust boundaries

D.

Cloud services enumeration

E.

Supply chain access

F.

Homomorphic encryption usage

Buy Now
Question # 87

An organization recently experienced a security incident due to an exterior door in a busy area getting stuck open. The organization launches a security campaign focused on the motto, " See Something, Say Something. " Which of the following best describes what the organization wants to educate employees about?

Options:

A.

Situational awareness

B.

Phishing

C.

Social engineering

D.

Tailgating

Buy Now
Question # 88

After a vendor identified a recent vulnerability, a severity score was assigned to the vulnerability. A notification was also publicly distributed. Which of the following would most likely include information regarding the vulnerability and the recommended remediation steps?

Options:

A.

CVE

B.

CVSS

C.

CCE

D.

CPE

Buy Now
Question # 89

An organization wants to implement a secure cloud architecture across all instances. Given the following requirements:

· Establish a standard network template.

· Deployments must be consistent.

· Security policies must be able to be changed at scale.

Which of the following technologies meets these requirements?

Options:

A.

Serverless deployment model

B.

Container orchestration

C.

Infrastructure as code

D.

CLI cloud administration

E.

API gateway

Buy Now
Question # 90

A cloud engineer needs to identify appropriate solutions to:

• Provide secure access to internal and external cloud resources.

• Eliminate split-tunnel traffic flows.

•Enable identity and access management capabilities.

Which of the following solutions arc the most appropriate? (Select two).

Options:

A.

Federation

B.

Microsegmentation

C.

CASB

D.

PAM

E.

SD-WAN

F.

SASE

Buy Now
Question # 91

A company wants to improve and automate the compliance of its cloud environments to meet industry standards. Which of the following resources should the company use to best achieve this goal?

Options:

A.

Jenkins

B.

Python

C.

Ansible

D.

PowerShell

Buy Now
Question # 92

Which of the following tests explains why AI output could be inaccurate?

Options:

A.

Model poisoning

B.

Social engineering

C.

Output handling

D.

Prompt injections

Buy Now
Question # 93

A company wants to install a three-tier approach to separate the web. database, and application servers A security administrator must harden the environment which of the following is the best solution?

Options:

A.

Deploying a VPN to prevent remote locations from accessing server VLANs

B.

Configuring a SASb solution to restrict users to server communication

C.

Implementing microsegmentation on the server VLANs

D.

installing a firewall and making it the network core

Buy Now
Exam Code: CAS-005
Exam Name: CompTIA SecurityX Certification Exam
Last Update: Apr 6, 2026
Questions: 344
CAS-005 pdf

CAS-005 PDF

$25.5  $84.99
CAS-005 Engine

CAS-005 Testing Engine

$28.5  $94.99
CAS-005 PDF + Engine

CAS-005 PDF + Testing Engine

$40.5  $134.99