Exam Dumps CAS-005 Practice Free Latest CompTIA Practice Tests [Q65-Q86]

Exam Dumps CAS-005 Practice Free Latest CompTIA Practice Tests

CAS-005 Exam Questions | Real CAS-005 Practice Dumps

NO.65 A company lined an email service provider called my-email.com to deliver company emails. The company stalled having several issues during the migration. A security engineer is troubleshooting and observes the following configuration snippet:

Which of the following should the security engineer modify to fix the issue? (Select two).

 
 
 
 
 
 
 

NO.66 Which of the following is the main reason quantum computing advancements are leading companies and countries to deploy new encryption algorithms?

 
 
 
 

NO.67 A company wants to implement hardware security key authentication for accessing sensitive information systems The goal is to prevent unauthorized users from gaining access with a stolen password Which of the following models should the company implement to best solve this issue?

 
 
 
 

NO.68 A product development team has submitted code snippets for review prior to release.
INSTRUCTIONS
Analyze the code snippets, and then select one vulnerability, and one fix for each code snippet.
Code Snippet 1

Code Snippet 2

Vulnerability 1:
* SQL injection
* Cross-site request forgery
* Server-side request forgery
* Indirect object reference
* Cross-site scripting
Fix 1:
* Perform input sanitization of the userid field.
* Perform output encoding of queryResponse,
* Ensure usex:ia belongs to logged-in user.
* Inspect URLS and disallow arbitrary requests.
* Implement anti-forgery tokens.
Vulnerability 2
1) Denial of service
2) Command injection
3) SQL injection
4) Authorization bypass
5) Credentials passed via GET
Fix 2
A) Implement prepared statements and bind
variables.
B) Remove the serve_forever instruction.
C) Prevent the “authenticated” value from being overridden by a GET parameter.
D) HTTP POST should be used for sensitive parameters.
E) Perform input sanitization of the userid field.

NO.69 A security analyst is troubleshooting the reason a specific user is having difficulty accessing company resources The analyst reviews the following information:

Which of the following is most likely the cause of the issue?

 
 
 
 

NO.70 A security engineer is developing a solution to meet the following requirements?
* All endpoints should be able to establish telemetry with a SIEM.
* All endpoints should be able to be integrated into the XDR platform.
* SOC services should be able to monitor the XDR platform
Which of the following should the security engineer implement to meet the requirements?

 
 
 
 

NO.71 A hospital provides tablets to its medical staff to enable them to more quickly access and edit patients’ charts.
The hospital wants to ensure that if a tablet is Identified as lost or stolen and a remote command is issued, the risk of data loss can be mitigated within seconds. The tablets are configured as follows to meet hospital policy
* Full disk encryption is enabled
* “Always On” corporate VPN is enabled
* ef-use-backed keystore is enabled’ready.
* Wi-Fi 6 is configured with SAE.
* Location services is disabled.
*Application allow list is configured

 
 
 
 
 

NO.72 A network engineer must ensure that always-on VPN access is enabled Curt restricted to company assets Which of the following best describes what the engineer needs to do”

 
 
 
 

NO.73 During a gap assessment, an organization notes that OYOD usage is a significant risk. The organization implemented administrative policies prohibiting BYOD usage However, the organization has not implemented technical controls to prevent the unauthorized use of BYOD assets when accessing the organization’s resources. Which of the following solutions should the organization implement to best reduce the risk of OYOD devices? (Select two).

 
 
 
 
 
 

NO.74 A security analyst received a report that an internal web page is down after a company-wide update to the web browser Given the following error message:

Which of the following is the best way to fix this issue?

 
 
 
 

NO.75 An organization is required to
* Respond to internal and external inquiries in a timely manner
* Provide transparency.
* Comply with regulatory requirements
The organization has not experienced any reportable breaches but wants to be prepared if a breach occurs in the future. Which of the following is the best way for the organization to prepare?

 
 
 
 

NO.76 After an incident occurred, a team reported during the lessons-learned review that the team.
* Lost important Information for further analysis.
* Did not utilize the chain of communication
* Did not follow the right steps for a proper response
Which of the following solutions is the best way to address these findinds?

 
 
 
 

NO.77 A security analyst is reviewing the following log:

Which of the following possible events should the security analyst investigate further?

 
 
 
 

NO.78 A software company deployed a new application based on its internal code repository Several customers are reporting anti-malware alerts on workstations used to test the application Which of the following is the most likely cause of the alerts?

 
 
 
 

NO.79 A security team is responding to malicious activity and needs to determine the scope of impact the malicious activity appears to affect certain version of an application used by the organization Which of the following actions best enables the team to determine the scope of Impact?

 
 
 
 

NO.80 A developer needs to improve the cryptographic strength of a password-storage component in a web application without completely replacing the crypto-module. Which of the following is the most appropriate technique?

 
 
 
 
 

NO.81 A security analyst Detected unusual network traffic related to program updating processes The analyst collected artifacts from compromised user workstations. The discovered artifacts were binary files with the same name as existing, valid binaries but. with different hashes which of the following solutions would most likely prevent this situation from reoccurring?

 
 
 
 

NO.82 Users are willing passwords on paper because of the number of passwords needed in an environment. Which of the following solutions is the best way to manage this situation and decrease risks?

 
 
 
 

NO.83 An organization is implementing Zero Trust architecture A systems administrator must increase the effectiveness of the organization’s context-aware access system. Which of the following is the best way to improve the effectiveness of the system?

 
 
 
 

NO.84 Which of the following best describes the challenges associated with widespread adoption of homomorphic encryption techniques?

 
 
 
 

NO.85 A security engineer needs 10 secure the OT environment based on me following requirements
* Isolate the OT network segment
* Restrict Internet access.
* Apply security updates two workstations
* Provide remote access to third-party vendors
Which of the following design strategies should the engineer implement to best meet these requirements?

 
 
 
 

NO.86 A company updates its cloud-based services by saving infrastructure code in a remote repository. The code is automatically deployed into the development environment every time the code is saved lo the repository The developers express concern that the deployment often fails, citing minor code issues and occasional security control check failures in the development environment Which of the following should a security engineer recommend to reduce the deployment failures? (Select two).

 
 
 
 
 
 

Verified CAS-005 Exam Dumps Q&As – Provide CAS-005 with Correct Answers: https://www.trainingdump.com/CompTIA/CAS-005-practice-exam-dumps.html