exam questions

Exam CAS-005 All Questions

View all questions & answers for the CAS-005 exam

Exam CAS-005 topic 1 question 73 discussion

Actual exam question from CompTIA's CAS-005
Question #: 73
Topic #: 1
[All CAS-005 Questions]

During an adversarial simulation exercise, an external team was able to gain access to sensitive information and systems without the organization detecting this activity. Which of the following mitigation strategies should the organization use to best resolve the findings?

  • A. Configuring a honeypot for adversary characterization
  • B. Leveraging simulators for attackers
  • C. Setting up a honey network for attackers
  • D. Utilizing decoy accounts and documents
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
vicbersong
1 month, 2 weeks ago
Selected Answer: D
❌ Why the other options are less effective: A. Configuring a honeypot for adversary characterization A honeypot is useful, but it’s often a single system and may not attract or detect attackers once they’re inside the network unless specifically accessed. B. Leveraging simulators for attackers Simulators are great for training or pre-deployment testing, but they don’t directly address real-time detection or help catch adversaries already in your network. C. Setting up a honey network for attackers Similar to a honeypot but on a larger scale; effective, but complex and overkill for a first step. It also requires significant resources to manage and doesn’t guarantee interaction from attackers.
upvoted 2 times
...
vicbersong
1 month, 2 weeks ago
Selected Answer: D
✅ Explanation: The scenario describes a failure to detect unauthorized access during an adversarial simulation — likely a red team exercise. This points to gaps in detection and deception capabilities. D. Utilizing decoy accounts and documents These are deception techniques designed to lure attackers and trigger alerts when accessed. They help identify lateral movement, privilege escalation, and unauthorized access in real-time. When attackers interact with fake credentials or sensitive-looking files (e.g., fake HR records or fake SSH keys), alerts can be generated without compromising real assets. This is a proactive detection strategy ideal for catching stealthy adversaries.
upvoted 2 times
...
Pmonty4
2 months, 2 weeks ago
Selected Answer: A
Fixing man
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...