Free CompTIA CAS-005 Exam Actual Questions

The questions for CAS-005 were last updated On Apr 16, 2025

At ValidExamDumps, we consistently monitor updates to the CompTIA CAS-005 exam questions by CompTIA. Whenever our team identifies changes in the exam questions,exam objectives, exam focus areas or in exam requirements, We immediately update our exam questions for both PDF and online practice exams. This commitment ensures our customers always have access to the most current and accurate questions. By preparing with these actual questions, our customers can successfully pass the CompTIA SecurityX Certification Exam exam on their first attempt without needing additional materials or study guides.

Other certification materials providers often include outdated or removed questions by CompTIA in their CompTIA CAS-005 exam. These outdated questions lead to customers failing their CompTIA SecurityX Certification Exam exam. In contrast, we ensure our questions bank includes only precise and up-to-date questions, guaranteeing their presence in your actual exam. Our main priority is your success in the CompTIA CAS-005 exam, not profiting from selling obsolete exam questions in PDF or Online Practice Test.

 

Question No. 1

A network engineer must ensure that always-on VPN access is enabled Curt restricted to company assets Which of the following best describes what the engineer needs to do''

Show Answer Hide Answer
Correct Answer: A

To ensure always-on VPN access is enabled and restricted to company assets, the network engineer needs to generate device certificates using the specific template settings required for the company's VPN solution. These certificates ensure that only authorized devices can establish a VPN connection.

Why Device Certificates are Necessary:

Authentication: Device certificates authenticate company assets, ensuring that only authorized devices can access the VPN.

Security: Certificates provide a higher level of security compared to username and password combinations, reducing the risk of unauthorized access.

Compliance: Certificates help in meeting security policies and compliance requirements by ensuring that only managed devices can connect to the corporate network.

Other options do not provide the same level of control and security for always-on VPN access:

B . Modify signing certificates for IKE version 2: While important for VPN protocols, it does not address device-specific authentication.

C . Create a wildcard certificate: This is not suitable for device-specific authentication and could introduce security risks.

D . Add the VPN hostname as a SAN entry: This is more related to certificate management and does not ensure device-specific authentication.


CompTIA SecurityX Study Guide

'Device Certificates for VPN Access,' Cisco Documentation

NIST Special Publication 800-77, 'Guide to IPsec VPNs'

Question No. 2

After several companies in the financial industry were affected by a similar incident, they shared information about threat intelligence and the malware used for exploitation. Which of the following should the companies do to best indicate whether the attacks are being conducted by the same actor?

Show Answer Hide Answer
Correct Answer: A

Comprehensive and Detailed

Determining if attacks are from the same actor requires unique attribution. Let's analyze:

A . Code stylometry: Analyzes coding style to identify authorship, the best method for linking malware to a specific actor per CAS-005's threat intelligence focus.

B . Common IOCs: Indicates similar attacks but not necessarily the same actor.

C . IOC extractions: Similar to B, lacks specificity for attribution.

D . Malware detonation: Tests behavior, not authorship.


Question No. 3

A company lined an email service provider called my-email.com to deliver company emails. The company stalled having several issues during the migration. A security engineer is troubleshooting and observes the following configuration snippet:

Which of the following should the security engineer modify to fix the issue? (Select two).

Show Answer Hide Answer
Correct Answer: B, D

The security engineer should modify the following to fix the email migration issues:

Email CNAME Record: The email CNAME record must be changed to a type A record pointing to 192.168.1.10. This is because CNAME records should not be used where an IP address (A record) is required. Changing it to an A record ensures direct pointing to the correct IP.

TXT Record for DMARC: The TXT record must be changed to 'v=dmarc ip4:192.168.1.10 include

.com -all'. This ensures proper configuration of DMARC (Domain-based Message Authentication, Reporting & Conformance) to include the correct IP address and the email service provider domain.

DMARC: Ensuring the DMARC record is correctly set up helps in preventing email spoofing and phishing, aligning with email security best practices.


CompTIA Security+ SY0-601 Study Guide by Mike Chapple and David Seidl

RFC 7489: Domain-based Message Authentication, Reporting & Conformance (DMARC)

NIST Special Publication 800-45: Guidelines on Electronic Mail Security

Question No. 4

PKI can be used to support security requirements in the change management process. Which of the following capabilities does PKI provide for messages?

Show Answer Hide Answer
Correct Answer: A

Public Key Infrastructure (PKI) supports change management by securing messages (e.g., approvals, updates). Non-repudiation, provided via digital signatures, ensures a sender cannot deny sending a message, critical for auditability in change processes.

Option A: Correct---PKI's digital signatures ensure non-repudiation.

Option B: Confidentiality (via encryption) is a PKI feature but less tied to change management's focus on accountability.

Option C: Delivery receipts are not a PKI function; they're protocol-specific (e.g., SMTP).

Option D: Attestation relates to verifying attributes, not a direct PKI message capability.


Question No. 5

A news organization wants to implement workflows that allow users to request that untruthful data be retraced and scrubbed from online publications to comply with the right to be forgotten Which of the following regulations is the organization most likely trying to address'

Show Answer Hide Answer
Correct Answer: A

The General Data Protection Regulation (GDPR) is the regulation most likely being addressed by the news organization. GDPR includes provisions for the 'right to be forgotten,' which allows individuals to request the deletion of personal data that is no longer necessary for the purposes for which it was collected. This regulation aims to protect the privacy and personal data of individuals within the European Union.


CompTIA SecurityX Study Guide: Covers GDPR and its requirements, including the right to be forgotten.

GDPR official documentation: Details the rights of individuals, including data erasure and the right to be forgotten.

'GDPR: A Practical Guide to the General Data Protection Regulation' by IT Governance Privacy Team: Provides a comprehensive overview of GDPR compliance, including workflows for data deletion requests.