CompTIA CAS-005 Question Answer
A cybersecurity architect seeks to improve vulnerability management and orchestrate a large number of vulnerability checks. Key constraints include:
. There are 512 containerized microservices.
. Vulnerability data is sourced from multiple scanners.
. CIS baselines must be enforced.
. Scan activity must be scheduled.
Which of the following automation workflows best meets this objective?
CompTIA CAS-005 Summary
- Vendor: CompTIA
- Product: CAS-005
- Update on: Dec 8, 2025
- Questions: 326

