Free CompTIA CAS-005 Exam Braindumps (page: 2)

92.2% Passing Rate DOWNLOAD PDF EXAM
343 Questions & Answers
Page 2 of 82

A security engineer is reviewing event logs because an employee successfully connected a personal Windows laptop to the corporate network, which is against company policy. Company policy allows all Windows 10 and 11 laptops to connect to the system as long as the MDM agent installed by IT is running. Only compliant devices can connect, and the logic in the system to evaluate compliant laptops is as follows:


Which of the following most likely occurred when the employee connected a personally owned Windows laptop and was allowed on the network?

  1. The agent was not running on the laptop, which triggered a false positive.
  2. The OS was a valid version, but the MDM agent was not installed, triggering a true positive.
  3. The OS was running a Windows version below 10 and triggered a false negative.
  4. The OS version was higher than 11, and the MDM agent was running, triggering a true negative.

Answer(s): C

Explanation:

The provided logic checks for compliance based on the OsVersion and whether the agentRunning is true. Here's how the logic works:
If OsVersion >= 10:
If agentRunning is true, the device is compliant.
If agentRunning is false, the device is non-compliant.
Else (if OsVersion < 10):
The device is marked as compliant.
This logic means that laptops with an OS version below 10 are mistakenly considered compliant, which is a false negative because they do not meet the policy requirement. This is likely how the employee's laptop, running a version of Windows below 10, was able to connect to the network against policy.



An organization is working to secure its development process to ensure developers cannot deploy artifacts directly into the production environment.
Which of the following security practice recommendations would be the best to accomplish this objective?

  1. Implement least privilege access to all systems.
  2. Roll out security awareness training for all users.
  3. Set up policies and systems with separation of duties.
  4. Enforce job rotations for all developers and administrators.
  5. Utilize mandatory vacations for all developers.
  6. Review all access to production systems on a quarterly basis.

Answer(s): C

Explanation:

Separation of duties is a key security practice that ensures no single individual has the capability to perform all tasks required to deploy artifacts into the production environment. By separating responsibilities, such as development and production deployment, the organization can prevent unauthorized or accidental changes in production systems. This directly addresses the requirement that developers should not deploy artifacts into production, enhancing the security and integrity of the deployment process.



A security architect discovers the following while reviewing code for a company's website: selection = "SELECT Item FROM Catalog WHERE ItemID = " & Request("ItemID") Which of the following should the security architect recommend?

  1. Client-side processing
  2. Query parameterization
  3. Data normalization
  4. Escape character blocking
  5. URL encoding

Answer(s): B

Explanation:

The code provided constructs an SQL query by directly concatenating user input (Request("ItemID")) with the query string. This approach is vulnerable to SQL injection attacks, where malicious input can be crafted to manipulate or compromise the database.
Query parameterization ensures that user input is treated as a parameter rather than executable code. By using parameterized queries, the database engine automatically escapes and safely handles input, eliminating the risk of SQL injection. This is the recommended best practice to secure database interactions against such vulnerabilities.



A security architect needs to enable a container orchestrator for DevSecOps and SOAR initiatives. The engineer has discovered that several Ansible YAML files used for the automation of configuration management have the following content:


Which of the following should the engineer do to correct the security issues presented within this content?

  1. Update the kubernetes.core.k8s module to kubernetes.core.k8s_service in the main.yml file.
  2. Update the COMPTIA001 hostname to localhost using the hostnamectl command.
  3. Update the state: present module to state: absent in the main.yml file.
  4. Update or remove the ansible.cfg file.
  5. Update the insecure-bind-address from localhost to the COMPTIA001 in the manifests file.

Answer(s): D

Explanation:

The Ansible configuration file (/etc/ansible/ansible.cfg) contains an enable_plugins directive that allows Kubernetes modules to interact with Kubernetes resources. However, it does not enforce secure practices for managing these interactions, which could potentially expose sensitive data or allow unauthorized changes if not correctly configured or overly permissive.
The insecure configuration in the Ansible YAML file or the ansible.cfg file should be reviewed or updated to enforce stricter security. Specifically, the configuration might inadvertently expose Kubernetes services to untrusted sources, and enabling plugins like kubernetes.core.k8s without sufficient control could lead to vulnerabilities.
Updating or removing the ansible.cfg file ensures that secure defaults are applied, or more secure plugin configurations can be explicitly added, addressing the underlying issue.






Post your Comments and Discuss CompTIA CAS-005 exam prep with other Community members:

CAS-005 Exam Discussions & Posts