Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CAS-005 CompTIA Exam Lab Questions

Page: 7 / 26
Total 344 questions

CompTIA SecurityX Certification Exam Questions and Answers

Question 25

An organization with a remote workforce has a new client with the following requirements:

    Consultants need to travel to the client site.

    The company has proprietary information on its hard drives.

    The company prohibits BYOD.

Which of the following would be the most beneficial for the organization to implement?

Options:

A.

Virtual hardware

B.

Measured boot

C.

Secure enclave

D.

Host-based encryption

Question 26

A security analyst receives the following SIEM alert for review:

Time | Event

03/07/2025 UTC 13:54:06 | MACHINE: hr_talent_01.corp.local " cd " SUCCESS

03/07/2025 UTC 13:54:07 | MACHINE: hr_talent_01.corp.local " cd ../../ " SUCCESS

03/07/2025 UTC 13:54:08 | MACHINE: hr_talent_01.corp.local " sudo cat /etc/shadow " SUCCESS

Which of the following best describes the incident that occurred on the device?

Options:

A.

A file injection attack occurred on the device.

B.

An attacker viewed password hashes on the device.

C.

A sensitive file was exfiltrated from the device.

D.

A directory traversal attack occurred on the device.

Question 27

Which of the following best describes the reason PQC preparation is important?

Options:

A.

To protect data against decryption due to increases in computational resource availability

B.

To have larger key lengths available through key stretching

C.

To improve encryption performance and speed using lightweight cryptography

D.

To leverage asymmetric encryption for large amounts of data

Question 28

An organization found a significant vulnerability associated with a commonly used package in a variety of operating systems. The organization develops a registry of software dependencies to facilitate incident response activities. As part of the registry, the organization creates hashes of packages that have been formally vetted. Which of the following attack vectors does this registry address?

Options:

A.

Supply chain attack B. Cipher substitution attack C. Side-channel analysis D. On-path attack E. Pass-the-hash attack

Page: 7 / 26
Total 344 questions