CompTIA CAS-005 - CompTIA SecurityX Exam

Question #6 (Topic: Exam A)
Company A is merging with Company B. Company A is a small, local company. Company B has a large, global presence. The two companies have a lot of duplication in their IT systems, processes, and procedures. On the new Chief Information Officer's (CIO's) first day, a fire breaks out at Company B's main data center. Which of the following actions should the CIO take first?
A. Determine whether the incident response plan has been tested at both companies, and use it to respond. B. Review the incident response plans, and engage the disaster recovery plan while relying on the IT leaders from both companies. C. Ensure hot, warm, and mobile disaster recovery sites are available, and give an update to the companies' leadership teams. D. Initiate Company A's IT systems processes and procedures, assess the damage, and perform a BIA.
Answer: B
Question #7 (Topic: Exam A)
The results of an internal audit indicate several employees reused passwords that were previously included in a published list of compromised passwords.
The company has the following employee password policy:

Which of the following should be implemented to best address the password reuse issue? (Choose two.)
A. Increase the minimum age to two days. B. Increase the history to 20. C. Increase the character length to 12. D. Add case-sensitive requirements to character class. E. Decrease the maximum age to 30 days. F. Remove the complexity requirements. G. Increase the maximum age to 120 days.
Answer: AB
Question #8 (Topic: Exam A)
A mobile administrator is reviewing the following mobile device DHCP logs to ensure the proper mobile settings are applied to managed devices:

Which of the following mobile configuration settings is the mobile administrator verifying?
A. Service set identifier authentication B. Wireless network auto joining C. 802.1X with mutual authentication D. Association MAC address randomization
Answer: D
Question #9 (Topic: Exam A)
A security analyst is investigating a possible insider threat incident that involves the use of an unauthorized USB from a shared account to exfiltrate data. The event did not create an alert. The analyst has confirmed the USB hardware ID is not on the device allow list, but has not yet confirmed the owner of the USB device. Which of the following actions should the analyst take next?
A. Classify the incident as a false positive. B. Classify the incident as a false negative. C. Classify the incident as a true positive. D. Classify the incident as a true negative.
Answer: B
Question #10 (Topic: Exam A)
Which of the following security features do email signatures provide?
A. Non-repudiation B. Body encryption C. Code signing D. Sender authentication E. Chain of custody
Answer: A
Download Exam
Page: 2 / 69
Total 343 questions