Free Practice Test

Free CAS-005 Practice Questions – 2026 Updated

Security X CASP+ CAS-005.pdf

View Mode
Q: 1
[Governance, Risk, and Compliance (GRC)] A security engineer is assisting a DevOps team that has the following requirements for container images: Ensure container images are hashed and use version controls. Ensure container images are up to date and scanned for vulnerabilities. Which of the following should the security engineer do to meet these requirements?
Options
Q: 2
[Governance, Risk, and Compliance (GRC)] An audit finding reveals that a legacy platform has not retained loos for more than 30 days The platform has been segmented due to its interoperability with newer technology. As a temporarysolution, the IT department changed the log retention to 120 days. Which of the following should the security engineer do to ensure the logs are being properly retained?
Options
Q: 3
[Security Architecture] A developer makes a small change to a resource allocation module on a popular social media website and causes a memory leak. During a peak utilization period, several web servers crash, causing the website to go offline. Which of the following testing techniques is the most efficient way to prevent this from reoccurring?
Options
Q: 4
[Emerging Technologies and Threats] Which of the following best explains the business requirement a healthcare provider fulfills by encrypting patient data at rest?
Options
Q: 5
[Emerging Technologies and Threats] A security engineer wants to reduce the attack surface of a public-facing containerized application Which of the following will best reduce the application's privilege escalation attack surface?
Options
Q: 6
[Governance, Risk, and Compliance (GRC)] A compliance officer isfacilitating abusiness impact analysis (BIA)and wantsbusiness unit leadersto collect meaningful dat a. Several business unit leaders want more information about the types of data the officer needs. Which of the following data types would be the most beneficial for the compliance officer?(Select two)
Options
Q: 7
[Security Architecture] A senior security engineer flags the following log file snippet as having likely facilitated an attacker’s lateral movement in a recent breach: qry_source: 19.27.214.22 TCP/53 qry_dest: 199.105.22.13 TCP/53 qry_type: AXFR | in comptia.org ------------ directoryserver1 A 10.80.8.10 ------------directoryserver2 A 10.80.8.11 ------------ directoryserver3 A 10.80.8.12 ------------ internal-dns A 10.80.9.1 ----------- www-int A 10.80.9.3 ------------ fshare A 10.80.9.4 ------------ sip A 10.80.9.5 ------------ msn-crit-apcs A 10.81.22.33 Which of the following solutions, if implemented, would mitigate the risk of this issue reoccurring?
Options
Q: 8
[Security Assessments and Testing] During a vulnerability assessment, a scan reveals the following finding: Windows Server 2016 Missing hotfix KB87728 - CVSS 3.1 Score: 8.1 [High] - Affected host 172.16.15.2 Later in the review process, the remediation team marks the finding as a false positive. Which of the following is the best way toavoid this issue on future scans?
Options
Q: 9
[Security Architecture] Which of the following supports the process of collecting a large pool of behavioral observations to inform decision-making?
Options
Q: 10
[Security Operations] An organization found a significant vulnerability associated with a commonly used package in a variety of operating systems. The organization develops a registry of software dependencies to facilitate incident response activities. As part of the registry, the organization creates hashes of packages that have been formally vetted. Which of the following attack vectors does this registry address?
Options
Q: 11
[Governance, Risk, and Compliance (GRC)] A systems administrator wants to introduce a newly released feature for an internal application. The administrate docs not want to test the feature in the production environment. Which of the following locations is the best place to test the new feature?
Options
Q: 12
[Security Architecture] Asecuntv administrator is performing a gap assessment against a specific OS benchmark The benchmark requires the following configurations be applied to endpomts: • Full disk encryption * Host-based firewall • Time synchronization * Password policies • Application allow listing * Zero Trust application access Which of the following solutions best addresses the requirements? (Select two).
Options
Q: 13
[Security Architecture] A company wants to invest in research capabilities with the goal to operationalize the research output. Which of the following is the best option for a security architect to recommend?
Options
Q: 14
[Identity and Access Management (IAM)] An external SaaS solution user reports a bug associated with the role-based access control module. This bug allows users to bypass system logic associated with client segmentation in the multitenant deployment model. When assessing the bug report, the developer finds that the same bug was previously identified and addressed in an earlier release. The developer then determines the bug was reintroduced when an existing software component was integrated from a prior version of the platform. Which of the following is the best way to prevent this scenario?
Options
Q: 15
[Security Architecture] A security architect must make sure that the least number of services as possible is exposed in order to limit an adversary's ability to access the systems. Which of the following should the architect do first?
Options
Q: 16
SIMULATION [Identity and Access Management (IAM)] A product development team has submitted code snippets for review prior to release. INSTRUCTIONS Analyze the code snippets, and then select one vulnerability, and one fix for each code snippet. Code Snippet 1 Security X CASP+ CAS-005 question Code Snippet 2 Security X CASP+ CAS-005 question Vulnerability 1: SQL injection Cross-site request forgery Server-side request forgery Indirect object reference Cross-site scripting Fix 1: Perform input sanitization of the userid field. Perform output encoding of queryResponse, Ensure usex:ia belongs to logged-in user. Inspect URLS and disallow arbitrary requests. Implementanti-forgery tokens. Vulnerability 2 1) Denial of service 2) Command injection 3) SQL injection 4) Authorization bypass 5) Credentials passed via GET Fix 2 A) Implement prepared statements and bind variables. B) Remove the serve_forever instruction. C) Prevent the "authenticated" value from being overridden by a GET parameter. D) HTTP POST should be used for sensitive parameters. E) Perform input sanitization of the userid field.
Your Answer
Q: 17
SIMULATION [Security Architecture] During the course of normal SOC operations, three anomalous events occurred and were flagged as potential IoCs. Evidence for each of these potential IoCs is provided. INSTRUCTIONS Review each of the events and select the appropriate analysis and remediation options for each IoC. Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question
Your Answer
Q: 18
SIMULATION [Security Architecture] You are a security analyst tasked with interpreting an Nmap scan output from company’s privileged network. The company’s hardening guidelines indicate the following: There should be one primary server or service per device. Only default ports should be used. Non-secure protocols should be disabled. INSTRUCTIONS Using the Nmap output, identify the devices on the network and their roles, and any open ports that should be closed. For each device found by Nmap, add a device entry to the Devices Discovered list, with the following information: The IP address of the device The primary server or service of the device (Note that each IP should by associated with one service/port only) The protocol(s) that should be disabled based on the hardening guidelines (Note that multiple ports may need to be closed to comply with the hardening guidelines) If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question
Your Answer
Q: 19
SIMULATION [Security Architecture] A security engineer needs to review the configurations of several devices on the network to meet the following requirements: • The PostgreSQL server must only allow connectivity in the 10.1.2.0/24 subnet. • The SSH daemon on the database server must be configured to listen to port 4022. • The SSH daemon must only accept connections from a Single workstation. • All host-based firewalls must be disabled on all workstations. • All devices must have the latest updates from within the past eight days. •All HDDs must be configured to secure data at rest. • Cleartext services are not allowed. • All devices must be hardened when possible. Instructions: Click on the various workstations and network devices to review the posture assessment results. Remediate any possible issues or indicate that no issue is found. Click on Server A to review output data. Select commands in the appropriate tab to remediate connectivity problems to the pOSTGREsql DATABASE VIA ssh Security X CASP+ CAS-005 question WAP A Security X CASP+ CAS-005 question PC A Security X CASP+ CAS-005 question Laptop A Security X CASP+ CAS-005 question Switch A Security X CASP+ CAS-005 question Switch B: Security X CASP+ CAS-005 question Laptop B Security X CASP+ CAS-005 question PC B Security X CASP+ CAS-005 question PC C Security X CASP+ CAS-005 question Server A Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question
Your Answer
Q: 20

SIMULATION [Security Architecture] An organization is planning for disaster recovery and continuity ofoperations, and has noted the following relevant findings: 1. A natural disaster may disrupt operations at Site A, which would then cause an evacuation. Users are unable to log into the domain from-their workstations after relocating to Site B. 2. A natural disaster may disrupt operations at Site A, which would then cause the pump room at Site B to become inoperable. 3. A natural disaster may disrupt operations at Site A, which would then cause unreliable internet connectivity at Site B due to route flapping. INSTRUCTIONS Match each relevant finding to the affected host by clicking on the host name and selecting the appropriate number. For findings 1 and 2, select the items that should be replicated to Site B. For finding 3, select the item requiring configuration changes, then select the appropriate corrective action from the drop-down menu. Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question

Your Answer
Q: 21
SIMULATION [Security Engineering and Cryptography] An IPSec solution is being deployed. The configuration files for both the VPN concentrator and the AAA server are shown in the diagram. Complete the configuration files to meet the following requirements: • The EAP method must use mutual certificate-based authentication (With issued client certificates). • The IKEv2 Cipher suite must be configured to the MOST secure authenticated mode of operation, • The secret must contain at least one uppercase character, one lowercase character, one numeric character, and one special character, and it must meet a minimumlength requirement of eight characters, INSTRUCTIONS Click on the AAA server and VPN concentrator to complete the configuration. Fill in the appropriate fields and make selections from the drop-down menus. Security X CASP+ CAS-005 question VPN Concentrator: Security X CASP+ CAS-005 question AAA Server: Security X CASP+ CAS-005 question
Your Answer
Q: 22
SIMULATION [Security Architecture] You are tasked with integrating a new B2B client application with an existing OAuth workflow that must meet the following requirements: . The application does not need to know the users' credentials. . An approval interaction between the users and theHTTP service must be orchestrated. . The application must have limited access to users' data. INSTRUCTIONS Use the drop-down menus to select the action items for the appropriate locations. All placeholders must be filled. Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question
Your Answer
Q: 23
[Governance, Risk, and Compliance (GRC)] A company wants to install a three-tier approach to separate the web. database, and application servers A security administrator must harden the environment which of the following is the best solution?
Options
Q: 24
[Security Architecture] A company detects suspicious activity associated with external connections Security detection tools are unable tocategorize this activity. Which of the following is the best solution to help the company overcome this challenge?
Options
Q: 25
[Security Architecture] A company wants to use loT devices to manage and monitor thermostats at all facilities The thermostats must receive vendor security updates and limit access to other devices within the organization Which of the following best addresses the company's requirements''
Options
Q: 26
[Governance, Risk, and Compliance (GRC)] Company A acquired Company B and needs to determine how the acquisition will impact the attack surface of the organization as a whole. Which of the following is the best way to achieve this goal? (Select two). Implementing DLP controls preventing sensitive data from leaving Company B's network
Options
Q: 27
[Governance, Risk, and Compliance (GRC)] The material finding from a recent compliance audit indicate a company has an issue with excessive permissions. The findings show that employees changing roles or departments results in privilege creep. Which of the following solutions are the best ways to mitigate this issue? (Select two). Setting different access controls defined by business area
Options
Q: 28
[Security Architecture] A company plans to implement a research facility with Intellectual property data that should be protected The following is the security diagram proposed by the security architect Security X CASP+ CAS-005 question Which of the following security architect models is illustrated by the diagram?
Options
Q: 29
[Governance, Risk, and Compliance (GRC)] A company's security policy states that any publicly available server must be patched within 12 hours after a patch is released A recent llS zero-day vulnerability was discovered that affects all versions of the Windows Server OS: Security X CASP+ CAS-005 question Which of the following hosts should a security analyst patch first once a patch is available?
Options
Q: 30
[Identity and Access Management (IAM)] A security officer received several complaints from usersabout excessive MPA push notifications at night The security team investigates and suspects malicious activities regarding user account authentication Which of the following is the best way for the security officer to restrict MI~A notifications''
Options
Question 1 of 30
Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE