Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the CompTIA CASP CAS-005 Questions and answers with Dumpstech

Exam CAS-005 Premium Access

View all detail and faqs for the CAS-005 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions
Questions # 11:

A user reports application access issues to the help desk. The help desk reviews the logs for the user:

Question # 11

Which of the following is most likely the reason for the issue?

Options:

A.

The user inadvertently tripped the geoblock rule in NGFW.

B.

A threat actor has compromised the user's account and attempted to log in.

C.

The user is not allowed to access the human resources system outside of business hours.

D.

The user did not attempt to connect from an approved subnet.

Questions # 12:

After an organization met with its ISAC, the organization decided to test the resiliency of its security controls against a small number of advanced threat actors. Which of the following will enable the security administrator to accomplish this task?

Options:

A.

Adversary emulation

B.

Reliability factors

C.

Deployment of a honeypot

D.

Internal reconnaissance

Questions # 13:

An organization plans to deploy new software. The project manager compiles a list of roles that will be involved in different phases of the deployment life cycle. Which of the following should the project manager use to track these roles?

Options:

A.

CMDB

B.

Recall tree

C.

ITIL

D.

RACI matrix

Questions # 14:

Based on the results of a SAST report on a legacy application, a security engineer is reviewing the following snippet of code flagged as vulnerable:

Which of the following is the vulnerable line of code that must be changed?

Question # 14

Options:

A.

Line (02]

B.

Line [04]

C.

Line [07]

D.

Line 108]

E.

Line [10]

Questions # 15:

A security team determines that the most significant risks within the pipeline are:

• Unauthorized code changes

• The current inability to perform independent verification of software modules

Which of the following best addresses these concerns?

Options:

A.

Code signing

B.

Digital signatures

C.

Non-repudiation

D.

Lightweight cryptography

Questions # 16:

A security analyst is reviewing a SIEM and generates the following report:

Question # 16

Later, the incident response team notices an attack was executed on the VM001 host. Which of the following should the security analyst do to enhance the alerting process on the SIEM platform?

Options:

A.

Include the EDR solution on the SIEM as a new log source.

B.

Perform a log correlation on the SIEM solution.

C.

Improve parsing of data on the SIEM.

D.

Create a new rule set to detect malware.

Questions # 17:

An organization recently experienced a security incident due to an exterior door in a busy area getting stuck open. The organization launches a security campaign focused on the motto, "See Something, Say Something." Which of the following best describes what the organization wants to educate employees about?

Options:

A.

Situational awareness

B.

Phishing

C.

Social engineering

D.

Tailgating

Questions # 18:

Which of the following most likely explains the reason a security engineer replaced ECC with a lattice-based cryptographic technique?

Options:

A.

It is computationally efficient and provides perfect forward secrecy.

B.

It is more resilient to brute-force attacks than ECC.

C.

It supports ephemeral key exchange and digital signatures.

D.

It is currently considered a robust PQC technique.

E.

It enables processing on data while remaining in an encrypted state.

Questions # 19:

During a forensic review of a cybersecurity incident, a security engineer collected a portion of the payload used by an attacker on a comprised web server Given the following portion of the code:

Question # 19

Which of the following best describes this incident?

Options:

A.

XSRF attack

B.

Command injection

C.

Stored XSS

D.

SQL injection

Questions # 20:

A security analyst is performing threat modeling for a new AI chatbot. The AI chatbot will be rolled out to help customers develop configuration information within the company's SaaS offering. Which of the following issues would require involvement from the company's internal legal team?

Options:

A.

An internal user finds a way to use prompt injection to disregard guardrails.

B.

A DoS vulnerability exists that could impact all customers who use the chatbot.

C.

A bug bounty of an exploitable model inversion vulnerability is submitted.

D.

User consent is not being collected before training models on customer data.

E.

An access control issue is allowing the model to be poisoned with incorrect information.

Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions