Ready to Pass Your Certification Test

Ready to guarantee a pass on the certification that will elevate your career? Visit this page to explore our catalog and get the questions and answers you need to ace the test.

CompTIA CAS-005

Custom view settings

Exam contains 217 questions

Page 23 of 37
Question 133 🔥

[Emerging Technologies and Threats] A Chief Information Security Officer is concerned about the operational impact of ransomware. In the event of a ransomware attack, the business requires the integrity of the data to remain intact and an RPO of less than one hour. Which of the following storage strategies best satisfies the business requirements?

Question 134 🔥

[Security Engineering and Cryptography] Previously intercepted communications must remain secure even if a current encryption key is compromised in the future. Which of the following best supports this requirement?

Question 135 🔥

[Governance, Risk, and Compliance (GRC)] A security engineer is assisting a DevOps team that has the following requirements for container images: Ensure container images are hashed and use version controls. Ensure container images are up to date and scanned for vulnerabilities. Which of the following should the security engineer do to meet these requirements?

Question 136 🔥

[Security Assessments and Testing] During a vulnerability assessment, a scan reveals the following finding: Windows Server 2016 Missing hotfix KB87728 - CVSS 3.1 Score: 8.1 [High] - Affected host 172.16.15.2 Later in the review process, the remediation team marks the finding as a false positive. Which of the following is the best way toavoid this issue on future scans?

Question 137 🔥

[Emerging Technologies and Threats] After a company discovered a zero -day vulnerability in its VPN solution, the company plans to deploy cloud -hosted resources to replace its current on -premises systems. An engineer must find an appropriate solution to facilitate trusted connectivity. Which of the following capabilities is the most relevant?

Question 138 🔥

[Emerging Technologies and Threats] Employees use their badges to track the number of hours they work. The badge readers cannot be upgraded due to facility constraints. The software for the badge readers uses a legacy platform and requires connectivity to the enterprise resource planning solution. Which of the following is the best to ensure the security of the badge readers?

Lorem ipsum dolor sit amet consectetur. Eget sed turpis aenean sit aenean. Integer at nam ullamcorper a.

© 2024 Exam Prepare, Inc. All Rights Reserved.
CAS-005 questions • Exam prepare