CA1-005 Actual Exam Questions

Last updated on Dec. 16, 2024.
Vendor:CompTIA
Exam Code:CA1-005
Exam Name:CompTIA SecurityX
Exam Questions:115
 

Topic 1 - Exam A

Question #1 Topic 1

A company plans to implement a research facility with intellectual property data that should be protected. The following is the security diagram proposed by the security architect:

Which of the following security architect models is illustrated by the diagram?

  • A. Identity and access management model
  • B. Agent-based security model
  • C. Perimeter protection security model
  • D. Zero Trust security model
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #2 Topic 1

A financial technology firm works collaboratively with business partners in the industry to share threat intelligence within a central platform. This collaboration gives partner organizations the ability to obtain and share data associated with emerging threats from a variety of adversaries. Which of the following should the organization most likely leverage to facilitate this activity? (Choose two.)

  • A. CWPP
  • B. YARA
  • C. ATT&CK
  • D. STIX
  • E. TAXII
  • F. JTAG
Reveal Solution Hide Solution   Discussion  

Correct Answer: DE 🗳️

Question #3 Topic 1

During a gap assessment, an organization notes that BYOD usage is a significant risk. The organization implemented administrative policies prohibiting BYOD usage. However, the organization has not implemented technical controls to prevent the unauthorized use of BYOD assets when accessing the organization's resources. Which of the following solutions should the organization implement to best reduce the risk of BYOD devices? (Choose two.)

  • A. Cloud IAM, to enforce the use of token-based MFA
  • B. Conditional access, to enforce user-to-device binding
  • C. NAC, to enforce device configuration requirements
  • D. PAM, to enforce local password policies
  • E. SD-WAN, to enforce web content filtering through external proxies
  • F. DLP, to enforce data protection capabilities
Reveal Solution Hide Solution   Discussion  

Correct Answer: BC 🗳️

Question #4 Topic 1

A security administrator is performing a gap assessment against a specific OS benchmark. The benchmark requires the following configurations be applied to endpoints:
• Full disk encryption
• Host-based firewall
• Time synchronization
• Password policies
• Application allow listing
• Zero Trust application access
Which of the following solutions best addresses the requirements? (Choose two.)

  • A. MDM
  • B. CASB
  • C. SBoM
  • D. SCAP
  • E. SASE
  • F. HIDS
Reveal Solution Hide Solution   Discussion   3

Correct Answer: AF 🗳️

file Viewing page 1 out of 29 pages.
Viewing questions 1-4 out of 115 questions
Next Questions
Browse atleast 50% to increase passing rate cup
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago