Pass the CompTIA CompTIA CASP CAS-004 Questions and answers with CertsForce

Viewing page 1 out of 13 pages
Viewing questions 1-15 out of questions
Questions # 1:

A cybersecurity analyst created the following tables to help determine the maximum budget amount the business can justify spending on an improved email filtering system:

Question # 1

Which of the following meets the budget needs of the business?

Options:

A.

Filter ABC


B.

Filter XYZ


C.

Filter GHI


D.

Filter TUV


Expert Solution
Questions # 2:

A recent data breach stemmed from unauthorized access to an employee’s company account with a cloud-based productivity suite. The attacker exploited excessive permissions granted to a third-party OAuth application to collect sensitive information.

Which of the following BEST mitigates inappropriate access and permissions issues?

Options:

A.

SIEM


B.

CASB


C.

WAF


D.

SOAR


Expert Solution
Questions # 3:

A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

Question # 3

Which of the following would BEST mitigate this vulnerability?

Options:

A.

Network intrusion prevention


B.

Data encoding


C.

Input validation


D.

CAPTCHA


Expert Solution
Questions # 4:

A forensic expert working on a fraud investigation for a US-based company collected a few disk images as evidence.

Which of the following offers an authoritative decision about whether the evidence was obtained legally?

Options:

A.

Lawyers


B.

Court


C.

Upper management team


D.

Police


Expert Solution
Questions # 5:

A security architect is reviewing the following proposed corporate firewall architecture and configuration:

Question # 5

Both firewalls are stateful and provide Layer 7 filtering and routing. The company has the following requirements:

Web servers must receive all updates via HTTP/S from the corporate network.

Web servers should not initiate communication with the Internet.

Web servers should only connect to preapproved corporate database servers.

Employees’ computing devices should only connect to web services over ports 80 and 443.

Which of the following should the architect recommend to ensure all requirements are met in the MOST secure manner? (Choose two.)

Options:

A.

Add the following to Firewall_A: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0/0 TCP 80,443


B.

Add the following to Firewall_A: 15 PERMIT FROM 192.168.1.0/24 TO 0.0.0.0 TCP 80,443


C.

Add the following to Firewall_A: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0/0 TCP/UDP 0-65535


D.

Add the following to Firewall_B: 15 PERMIT FROM 0.0.0.0/0 TO 10.0.0.0/16 TCP/UDP 0-65535


E.

Add the following to Firewall_B: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0 TCP/UDP 0-65535


F.

Add the following to Firewall_B: 15 PERMIT FROM 192.168.1.0/24 TO 10.0.2.10/32 TCP 80,443


Expert Solution
Questions # 6:

A software development company makes Its software version available to customers from a web portal. On several occasions, hackers were able to access the software repository to change the package that is automatically published on the website. Which of the following would be the BEST technique to ensure the software the users download is the official software released by the company?

Options:

A.

Distribute the software via a third-party repository.


B.

Close the web repository and deliver the software via email.


C.

Email the software link to all customers.


D.

Display the SHA checksum on the website.


Expert Solution
Questions # 7:

Users are claiming that a web server is not accessible. A security engineer logs for the site. The engineer connects to the server and runs netstat -an and receives the following output:

Question # 7 Which of the following is MOST likely happening to the server?

Options:

A.

Port scanning


B.

ARP spoofing


C.

Buffer overflow


D.

Denial of service


Expert Solution
Questions # 8:

An organization requires a contractual document that includes

• An overview of what is covered

• Goals and objectives

• Performance metrics for each party

• A review of how the agreement is managed by all parties

Which of the following BEST describes this type of contractual document?

Options:

A.

SLA


B.

BAA


C.

NDA


D.

ISA


Expert Solution
Questions # 9:

A company security engineer arrives at work to face the following scenario:

1) Website defacement

2) Calls from the company president indicating the website needs to be fixed Immediately because It Is damaging the brand

3) A Job offer from the company's competitor

4) A security analyst's investigative report, based on logs from the past six months, describing how lateral movement across the network from various IP addresses originating from a foreign adversary country resulted in exfiltrated data

Which of the following threat actors Is MOST likely involved?

Options:

A.

Organized crime


B.

Script kiddie


C.

APT/nation-state


D.

Competitor


Expert Solution
Questions # 10:

A healthcare system recently suffered from a ransomware incident As a result the board of directors decided to hire a security consultant to improve existing network security. The security consultant found that the healthcare network was completely flat, had no privileged access limits and had openRDP access to servers with personal health information. As the consultant builds the remediation plan, which of the following solutions would BEST solve these challenges? (Select THREE).

Options:

A.

SD-WAN


B.

PAM


C.

Remote access VPN


D.

MFA


E.

Network segmentation


F.

BGP


G.

NAC


Expert Solution
Questions # 11:

A financial services company wants to migrate its email services from on-premises servers to a cloud-based email solution. The Chief information Security Officer (CISO) must brief board of directors on the potential security concerns related to this migration. The board is concerned about the following.

* Transactions being required by unauthorized individual

* Complete discretion regarding client names, account numbers, and investment information.

* Malicious attacker using email to distribute malware and ransom ware.

* Exfiltration of sensitivity company information.

The cloud-based email solution will provide an6-malware, reputation-based scanning, signature-based scanning, and sandboxing. Which of the following is the BEST option to resolve the board’s concerns for this email migration?

Options:

A.

Data loss prevention


B.

Endpoint detection response


C.

SSL VPN


D.

Application whitelisting


Expert Solution
Questions # 12:

Users are reporting intermittent access issues with & new cloud application that was recently added to the network. Upon investigation, he scary administrator notices the human resources department Is able to run required queries with the new application, but the marketing department is unable to pull any needed reports on various resources using the new application. Which of the following MOST likely needs to be done to avoid this in the future?

Options:

A.

Modify the ACLs.


B.

Review the Active Directory.


C.

Update the marketing department's browser.


D.

Reconfigure the WAF.


Expert Solution
Questions # 13:

A security engineer is troubleshooting an issue in which an employee is getting an IP address in the range on the wired network. The engineer plus another PC into the same port, and that PC gets an IP address in the correct range. The engineer then puts the employee’ PC on the wireless network and finds the PC still not get an IP address in the proper range. The PC is up to date on all software and antivirus definitions, and the IP address is not an APIPA address. Which of the following is MOST likely the problem?

Options:

A.

The company is using 802.1x for VLAN assignment, and the user or computer is in the wrong group.


B.

The DHCP server has a reservation for the PC’s MAC address for the wired interface.


C.

The WiFi network is using WPA2 Enterprise, and the computer certificate has the wrong IP address in the SAN field.


D.

The DHCP server is unavailable, so no IP address is being sent back to the PC.


Expert Solution
Questions # 14:

The goal of a Chief information Security Officer (CISO) providing up-to-date metrics to a bank’s risk committee is to ensure:

Options:

A.

Budgeting for cybersecurity increases year over year.


B.

The committee knows how much work is being done.


C.

Business units are responsible for their own mitigation.


D.

The bank is aware of the status of cybersecurity risks


Expert Solution
Questions # 15:

An engineering team is developing and deploying a fleet of mobile devices to be used for specialized inventory management purposes. These devices should:

* Be based on open-source Android for user familiarity and ease.

* Provide a single application for inventory management of physical assets.

* Permit use of the camera be only the inventory application for the purposes of scanning

* Disallow any and all configuration baseline modifications.

* Restrict all access to any device resource other than those requirement ?

Options:

A.

Set an application wrapping policy, wrap the application, distributes the inventory APK via the MAM tool, and test the application restrictions.


B.

Write a MAC sepolicy that defines domains with rules, label the inventory application, build the policy, and set to enforcing mode.


C.

Swap out Android Linux kernel version for >2,4,0, but the internet build Android, remove unnecessary functions via MDL, configure to block network access, and perform integration testing


D.

Build and install an Android middleware policy with requirements added, copy the file into/ user/init, and then built the inventory application.


Expert Solution
Viewing page 1 out of 13 pages
Viewing questions 1-15 out of questions