Free CompTIA CAS-005 Exam Questions (page: 3)

Company A is merging with Company B. Company A is a small, local company. Company B has a large, global presence. The two companies have a lot of duplication in their IT systems, processes, and procedures. On the new Chief Information Officer's (CIO's) first day, a fire breaks out at Company B's main data center.
Which of the following actions should the CIO take first?

  1. Determine whether the incident response plan has been tested at both companies, and use it to respond.
  2. Review the incident response plans, and engage the disaster recovery plan while relying on the IT leaders from both companies.
  3. Ensure hot, warm, and mobile disaster recovery sites are available, and give an update to the companies' leadership teams.
  4. Initiate Company A's IT systems processes and procedures, assess the damage, and perform a BIA.

Answer(s): B

Explanation:

When a disaster such as a fire occurs at a primary data center, the immediate priority is to review and implement the incident response plan (IRP) and the disaster recovery plan (DRP). These plans are designed to address and mitigate the impact of such incidents. Since the two companies have recently merged and may have differing systems and procedures, it is crucial to rely on the IT leaders from both companies who are familiar with their respective systems to ensure an effective response.
By reviewing and engaging the existing plans, the CIO can manage the situation efficiently and ensure minimal downtime and data loss while assessing how both companies' IT systems and processes will be integrated in the future.



The results of an internal audit indicate several employees reused passwords that were previously included in a published list of compromised passwords.

The company has the following employee password policy:

Which of the following should be implemented to best address the password reuse issue? (Choose two.)

  1. Increase the minimum age to two days.
  2. Increase the history to 20.
  3. Increase the character length to 12.
  4. Add case-sensitive requirements to character class.
  5. Decrease the maximum age to 30 days.
  6. Remove the complexity requirements.
  7. Increase the maximum age to 120 days.

Answer(s): A,B

Explanation:

Increase the minimum age to two days: Setting a minimum age for passwords ensures that users cannot immediately change their password multiple times in succession to cycle through the password history and reuse a previous password. By increasing the minimum age to two days, it prevents this kind of behavior and enforces better password reuse discipline.
Increase the history to 20: The password history determines how many previous passwords are remembered by the system to prevent reuse. By increasing the history to 20, users are forced to create a significantly different password for a longer period, reducing the likelihood of reusing compromised passwords.



A mobile administrator is reviewing the following mobile device DHCP logs to ensure the proper mobile settings are applied to managed devices:



Which of the following mobile configuration settings is the mobile administrator verifying?

  1. Service set identifier authentication
  2. Wireless network auto joining
  3. 802.1X with mutual authentication
  4. Association MAC address randomization

Answer(s): D

Explanation:

The DHCP logs show multiple distinct MAC addresses associated with the same user and device (UserA- MobileDevice). This behavior suggests that the device is using MAC address randomization, a feature designed to enhance privacy by generating a unique, temporary MAC address when connecting to wireless networks. The mobile administrator is verifying this setting to ensure that the mobile devices are properly randomizing their MAC addresses for added security.



A security analyst is investigating a possible insider threat incident that involves the use of an unauthorized USB from a shared account to exfiltrate data. The event did not create an alert. The analyst has confirmed the USB hardware ID is not on the device allow list, but has not yet confirmed the owner of the USB device.
Which of the following actions should the analyst take next?

  1. Classify the incident as a false positive.
  2. Classify the incident as a false negative.
  3. Classify the incident as a true positive.
  4. Classify the incident as a true negative.

Answer(s): B

Explanation:

A false negative occurs when a threat or security event happens but fails to trigger an alert, leading to undetected malicious activity. In this case, the security analyst has confirmed that an unauthorized USB device was used, which violates policy. However, since the event did not generate an alert despite being an unauthorized action, it indicates a failure in the detection system to identify the threat.



Which of the following security features do email signatures provide?

  1. Non-repudiation
  2. Body encryption
  3. Code signing
  4. Sender authentication
  5. Chain of custody

Answer(s): A

Explanation:

Email signatures, often implemented using digital signatures, provide non-repudiation by verifying the identity of the sender and ensuring that the email has not been tampered with during transit. Non-repudiation means the sender cannot deny having sent the email because the digital signature is uniquely tied to the sender's private key.






Post your Comments and Discuss CompTIA CAS-005 exam prep with other Community members:

CAS-005 Exam Discussions & Posts