Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CAS-005 Exam Dumps - CompTIA SecurityX Certification Exam

Searching for workable clues to ace the CompTIA CAS-005 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CAS-005 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 41

An organization ' s vulnerability management team is reviewing the following output from a scan of a production server:

Finding ID | Summary

Weak cryptographic library | The device allows the use of weak cryptographic libraries.

End-of-life, third-party library | The running service includes an end-of-life, third-party library.

Remote service detected | The device is running FTP on TCP port 21.

End-of-life operating system | The operating system has reached end-of-life status.

Database detected | This device includes an installed database.

Which of the following should the team do first?

A.

Deploy a bastion host in front of the devices.

B.

Close the ports to the database service.

C.

Upgrade to a manufacturer-supported operating system.

D.

Disable the running FTP service.

Full Access
Question # 42

An organization wants to manage specialized endpoints and needs a solution that provides the ability to

* Centrally manage configurations

* Push policies.

• Remotely wipe devices

• Maintain asset inventory

Which of the following should the organization do to best meet these requirements?

A.

Use a configuration management database

B.

Implement a mobile device management solution.

C.

Configure contextual policy management

D.

Deploy a software asset manager

Full Access
Question # 43

A pharmaceutical lab hired a consultant to identify potential risks associated with Building 2, a new facility that is under construction. The consultant received the IT project plan, which includes the following VLAN design:

Which of the following TTPs should the consultant recommend be addressed first?

A.

Zone traversal

B.

Unauthorized execution

C.

Privilege escalation

D.

Lateral movement

Full Access
Question # 44

A company migrated a critical workload from its data center to the cloud. The workload uses a very large data set that requires computational-intensive data processing. The business unit that uses the workload is projecting the following growth pattern:

• Storage requirements will double every six months.

• Computational requirements will fluctuate throughout the year.

• Average computational requirements will double every year.

Which of the following should the company do to address the business unit ' s requirements?

A.

Deploy a cloud-based CDN for storage and a load balancer for compute.

B.

Combine compute and storage in vertically autoscaling mode.

C.

Implement a load balancer for computing and storage resources.

D.

Plan for a horizontally scaling computing and storage infrastructure.

Full Access
Question # 45

A security engineer is reviewing the following vulnerability scan report:

Which of the following should the engineer prioritize for remediation?

A.

Apache HTTP Server

B.

OpenSSH

C.

Google Chrome

D.

Migration to TLS 1.3

Full Access
Question # 46

An organization is required to

* Respond to internal andexternal inquiries in a timely manner

* Provide transparency.

* Comply with regulatory requirements

The organization has not experienced any reportable breaches but wants to be prepared if a breach occurs in the future. Which of the following is the best way for the organization to prepare?

A.

Outsourcing the handling of necessary regulatory filing to an external consultant

B.

Integrating automated response mechanisms into the data subject access request process

C.

Developing communication templates that have been vetted by internal and external counsel

D.

Conducting lessons-learned activities and integrating observations into the crisis management plan

Full Access
Question # 47

A systems administrator is working with clients to verify email-based services are performing properly. The administrator wants to have the email server digitally sign outbound emails using the organization ' s private key. Which of the following should the systems administrator configure?

A.

SPF

B.

DKIM

C.

DMARC

D.

TLS

Full Access
Question # 48

An organization with a remote workforce has a new client with the following requirements:

    Consultants need to travel to the client site.

    The company has proprietary information on its hard drives.

    The company prohibits BYOD.

Which of the following would be the most beneficial for the organization to implement?

A.

Virtual hardware

B.

Measured boot

C.

Secure enclave

D.

Host-based encryption

Full Access
Go to page: