Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free CAS-005 Questions Attempt

Page: 22 / 26
Total 344 questions

CompTIA SecurityX Certification Exam Questions and Answers

Question 85

Which of the following best describes a common use case for homomorphic encryption?

Options:

A.

Processing data on a server after decrypting in order to prevent unauthorized access in transit

B.

Maintaining the confidentiality of data both at rest and in transit to and from a CSP for processing

C.

Transmitting confidential data to a CSP for processing on a large number of resources without revealing information

D.

Storing proprietary data across multiple nodes in a private cloud to prevent access by unauthenticated users

Question 86

An organization decides to move to a distributed workforce model. Several legacy systems exist on premises and cannot be migrated because of existing compliance requirements. However, all new systems are required to be cloud-based. Which of the following would best ensure network access security?

Options:

A.

Utilizing a VPN for all users who require legacy system access

B.

Shifting all legacy systems to the existing public cloud infrastructure

C.

Configuring an SDN to block malicious traffic to on-premises networks

D.

Deploying microsegmentation with a firewall acting as the core router

Question 87

A developer receives feedback about code quality and efficiency. The developer needs to identify and resolve the following coding issues before submitting the code changes for peer review:

    Indexing beyond arrays

    Dereferencing null pointers

    Potentially dangerous data type combinations

    Unreachable code

    Non-portable constructs

Which of the following would be most appropriate for the developer to use in this situation?

Options:

A.

Linting

B.

SBoM

C.

DAST

D.

Branch protection

E.

Software composition analysis

Question 88

An analyst needs to identify security event trends. The following is an excerpt from the SIEM:

Time

Alert

Source

Destination

20250407-UTC

Successful login from uncommon auth method in 24 hours

user1

AD-DC-01.corp

20250407-UTC

User accessed sensitive resources

user1

NFS-01/financial/share

20250407-UTC

Potential password spraying from host

10.10.15.100

iga-server.corp

20250407-UTC

Threshold exceeded user visiting high risk websites

user2

freehacks.com

20250407-UTC

Risk score exceeded for user

user1

bar.ru

20250407-UTC

NULL

NULL

NULL

Which of the following is the most practical way to identify trends?

Options:

A.

Decreasing the timing window for detections related to user1

B.

Incorporating audit log reduction

C.

Correlating based on source field in batches of time

D.

Disabling the noisy rules based on total alerts fired per day

Page: 22 / 26
Total 344 questions