Ready to Pass Your Certification Test

Ready to guarantee a pass on the certification that will elevate your career? Visit this page to explore our catalog and get the questions and answers you need to ace the test.

CompTIA CAS-005

Custom view settings

Exam contains 217 questions

Page 21 of 37
Question 121 🔥

[Emerging Technologies and Threats] A security engineer wants to propose an MDM solution to mitigate certain risks. The MDM solution should meet the following requirements: • Mobile devices should be disabled if they leave the trusted zone. • If the mobile device is lost, data is not accessible. Which of the following options should the security engineer enable on the MDM solution? (Select two).

Question 122 🔥

[Security Architecture] Which of the following security risks should be considered as an organization reduces cost and increases availability of services by adopting serverless computing?

Question 123 🔥

[Security Architecture] An attacker infiltrated the code base of a hardware manufacturer and inserted malware before the code was compiled. The malicious code is now running at the hardware level across a number of industries and sectors. Which of the following categories best describes this type of vendor risk?

Question 124 🔥

[Emerging Technologies and Threats] A security team is responding to malicious activity and needs to determine the scope of impact the malicious activity appears to affect certain version of an application used by the organization Which of the following actions best enables the team to determine the scope of Impact?

Question 125 🔥

[Security Architecture] An enterprise is deploying APIs that utilize a private key and a public key to ensure the connection string is protected. To connect to the API, customers must use the private key. Which of the following would best secure the REST API connection to the database while preventing the use of a hard -coded string in the request string?

Question 126 🔥

[Governance, Risk, and Compliance (GRC)] A recent security audit identified multiple endpoints have the following vulnerabilities: • Various unsecured open ports • Active accounts for terminated personnel • Endpoint protection software with legacy versions • Overly permissive access rules Which of the following would best mitigate these risks? (Select three).

Lorem ipsum dolor sit amet consectetur. Eget sed turpis aenean sit aenean. Integer at nam ullamcorper a.

© 2024 Exam Prepare, Inc. All Rights Reserved.
CAS-005 questions • Exam prepare