Free CAS-005 Exam Braindumps (page: 4)

Page 3 of 20

A security analyst is investigating a possible insider threat incident that involves the use of an unauthorized USB from a shared account to exfiltrate data. The event did not create an alert. The analyst has confirmed the USB hardware ID is not on the device allow list, but has not yet confirmed the owner of the USB device. Which of the following actions should the analyst take next?

  1. Classify the incident as a false positive.
  2. Classify the incident as a false negative.
  3. Classify the incident as a true positive.
  4. Classify the incident as a true negative.

Answer(s): B



Which of the following security features do email signatures provide?

  1. Non-repudiation
  2. Body encryption
  3. Code signing
  4. Sender authentication
  5. Chain of custody

Answer(s): A



A software development company wants to ensure that users can confirm the software is legitimate when installing it. Which of the following is the best way for the company to achieve this security objective?

  1. Code signing
  2. Non-repudiation
  3. Key escrow
  4. Private keys

Answer(s): A



While performing mandatory monthly patch updates on a production application server, the security analyst reports an instance of buffer overflow for a new application that was migrated to the cloud and is also publicly exposed. Security policy requires that only internal users have access to the application. Which of the following should the analyst implement to mitigate the issues reported? (Choose two.)

  1. Configure firewall rules to block all external traffic.
  2. Enable input validation for all fields.
  3. Enable automatic updates to be installed on all servers.
  4. Configure the security group to enable external traffic.
  5. Set up a DLP policy to alert for exfiltration on all application servers.
  6. Enable nightly vulnerability scans.

Answer(s): A,B






Post your Comments and Discuss CompTIA CAS-005 exam with other Community members:

CAS-005 Discussions & Posts