Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CAS-005 Exam Dumps - CompTIA SecurityX Certification Exam

Searching for workable clues to ace the CompTIA CAS-005 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CAS-005 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 4

A manufacturing plant is updating its IT services. During discussions, the senior management team created the following list of considerations:

• Staff turnover is high and seasonal.

• Extreme conditions often damage endpoints.

• Losses from downtime must be minimized.

• Regulatory data retention requirements exist.

Which of the following best addresses the considerations?

A.

Establishing further environmental controls to limit equipment damage

B.

Using a non-persistent virtual desktop interface with thin clients

C.

Deploying redundant file servers and configuring database journaling

D.

Maintaining an inventory of spare endpoints for rapid deployment

Full Access
Question # 5

An audit finding reveals that a legacy platform has not retained loos for more than 30 days The platform has been segmented due to its interoperability with newer technology. As a temporarysolution, the IT department changed the log retention to 120 days. Which of the following should the security engineer do to ensure the logs are being properly retained?

A.

Configure a scheduled task nightly to save the logs

B.

Configure event-based triggers to export the logs at a threshold.

C.

Configure the SIEM to aggregate the logs

D.

Configure a Python script to move the logs into a SQL database.

Full Access
Question # 6

A security team is responding to malicious activity and needs to determine the scope of impact the malicious activity appears to affect certain version of an application used by the organization Which of the following actions best enables the team to determine the scope of Impact?

A.

Performing a port scan

B.

Inspecting egress network traffic

C.

Reviewing the asset inventory

D.

Analyzing user behavior

Full Access
Question # 7

An analyst needs to identify security event trends. The following is an excerpt from the SIEM:

Time

Alert

Source

Destination

20250407-UTC

Successful login from uncommon auth method in 24 hours

user1

AD-DC-01.corp

20250407-UTC

User accessed sensitive resources

user1

NFS-01/financial/share

20250407-UTC

Potential password spraying from host

10.10.15.100

iga-server.corp

20250407-UTC

Threshold exceeded user visiting high risk websites

user2

freehacks.com

20250407-UTC

Risk score exceeded for user

user1

bar.ru

20250407-UTC

NULL

NULL

NULL

Which of the following is the most practical way to identify trends?

A.

Decreasing the timing window for detections related to user1

B.

Incorporating audit log reduction

C.

Correlating based on source field in batches of time

D.

Disabling the noisy rules based on total alerts fired per day

Full Access
Question # 8

An organization is developing a disaster recovery plan that requires data to be backed up and available at a moment ' s notice. Which of the following should the organization consider first to address this requirement?

A.

Implement a change management plan to ensure systems are using the appropriate versions.

B.

Hire additional on-call staff to be deployed if an event occurs.

C.

Design an appropriate warm site for business continuity.

D.

Identify critical business processes and determine associated software and hardware requirements.

Full Access
Go to page: