Free CompTIA CAS-005 Exam Questions (page: 4)

A software development company wants to ensure that users can confirm the software is legitimate when installing it.
Which of the following is the best way for the company to achieve this security objective?

  1. Code signing
  2. Non-repudiation
  3. Key escrow
  4. Private keys

Answer(s): A

Explanation:

Code signing is the process of digitally signing software or executables using a cryptographic certificate. This ensures that users can verify the authenticity of the software and confirm it has not been altered or tampered with since it was signed. It provides assurance that the software is legitimate and originates from the claimed source, addressing the company's security objective.



While performing mandatory monthly patch updates on a production application server, the security analyst reports an instance of buffer overflow for a new application that was migrated to the cloud and is also publicly exposed. Security policy requires that only internal users have access to the application.
Which of the following should the analyst implement to mitigate the issues reported? (Choose two.)

  1. Configure firewall rules to block all external traffic.
  2. Enable input validation for all fields.
  3. Enable automatic updates to be installed on all servers.
  4. Configure the security group to enable external traffic.
  5. Set up a DLP policy to alert for exfiltration on all application servers.
  6. Enable nightly vulnerability scans.

Answer(s): A,B

Explanation:

Configure firewall rules to block all external traffic: Since the security policy requires that only internal users have access to the application, configuring firewall rules to block all external traffic ensures that the application is not exposed to unauthorized users on the internet. This mitigates unauthorized access risks.
Enable input validation for all fields: Buffer overflows often exploit improper or lack of input validation.
Enabling strict input validation ensures that only properly formatted data is accepted, preventing malicious input designed to exploit vulnerabilities in the application.



PKI can be used to support security requirements in the change management process.
Which of the following capabilities does PKI provide for messages?

  1. Non-repudiation
  2. Confidentiality
  3. Delivery receipts
  4. Attestation

Answer(s): A

Explanation:

PKI (Public Key Infrastructure) uses digital signatures to provide non-repudiation, which ensures that the sender of a message cannot deny having sent it. In the context of the change management process, PKI ensures that actions or approvals are traceable to the responsible individual, which is critical for maintaining accountability and the integrity of the process.



Several unlabeled documents in a cloud document repository contain cardholder information.
Which of the following configuration changes should be made to the DLP system to correctly label these documents in the future?

  1. Digital rights management
  2. Network traffic decryption
  3. Regular expressions
  4. Watermarking

Answer(s): C

Explanation:

Data Loss Prevention (DLP) systems can use regular expressions to identify and classify sensitive information, such as cardholder data, based on patterns (e.g., patterns for credit card numbers). By configuring the DLP system with appropriate regular expressions, the system can correctly identify and label documents containing such information in the future, ensuring compliance and enhancing security.



A systems administrator at a web-hosting provider has been tasked with renewing the public certificates of all customer sites.
Which of the following would best support multiple domain names while minimizing the amount of certificates needed?

  1. OCSP
  2. CRL
  3. SAN
  4. CA

Answer(s): C

Explanation:

SAN (Subject Alternative Name) is an extension to SSL/TLS certificates that allows a single certificate to secure multiple domain names. This method is ideal for situations where you want to secure several domains or subdomains with one certificate, reducing the complexity and number of certificates needed. SAN certificates are commonly used to support multiple domain names under a single SSL certificate, making them the best choice for the given scenario.






Post your Comments and Discuss CompTIA CAS-005 exam prep with other Community members:

CAS-005 Exam Discussions & Posts