Ready to Pass Your Certification Test

Ready to guarantee a pass on the certification that will elevate your career? Visit this page to explore our catalog and get the questions and answers you need to ace the test.

CompTIA CAS-005

Custom view settings

Exam contains 217 questions

Page 15 of 37
Question 85 🔥

[Security Operations] A user from the sales department opened a suspicious file attachment. The sales department then contacted the SOC to investigate a number of unresponsive systems, and the team successfully identified the file and the origin of the attack. Which of the following is the next step of the incident response plan?

Question 86 🔥

[Emerging Technologies and Threats] A security analyst is performing a review of a web application. During testing as a standard user, the following error log appears: Error Message in Database Connection Connection to host USA -WebApp -Database failed Database "Prod -DB01" not found Table "CustomerInfo" not found Please retry your request later Which of the following best describes the analyst’s findings and a potential mitigation technique?

Question 87 🔥

[Governance, Risk, and Compliance (GRC)] A company wants to improve and automate the compliance of its cloud environments to meet industry standards. Which of the following resources should the company use to best achieve this goal?

Question 88 🔥

[Governance, Risk, and Compliance (GRC)] A security architect is mitigating a vulnerability that previously led to a web application data breach. An analysis into the root cause of the issue finds the following: An administrator’s account was hijacked and used on several Autonomous System Numbers within 30 minutes. All administrators use named accounts that require multifactor authentication. Single sign -on is used for all company applications.Which of the following should the security architect do to mitigate the issue?

Question 89 🔥

[Security Architecture] A security architect is establishing requirements to design resilience in un enterprise system trial will be extended to other physical locations. The system must • Be survivable to one environmental catastrophe • Re recoverable within 24 hours of critical loss of availability • Be resilient to active exploitation of one site-to-site VPN solution

Question 90 🔥

[Identity and Access Management (IAM)] A security analyst is reviewing the following authentication logs: Which of thefollowing should the analyst do first?

Lorem ipsum dolor sit amet consectetur. Eget sed turpis aenean sit aenean. Integer at nam ullamcorper a.

© 2024 Exam Prepare, Inc. All Rights Reserved.
CAS-005 questions • Exam prepare