Pass the CompTIA CompTIA CASP CAS-004 Questions and answers with CertsForce

Viewing page 10 out of 13 pages
Viewing questions 136-150 out of questions
Questions # 136:

A company recently deployed new servers to create an additional cluster to support a new application. The corporate security policy states that all new servers must be resilient. The new cluster has a high-availability configuration for a smooth failover. The failover was successful following a recent power outage, but both clusters lost critical data, which impacted recovery time. Which of the following needs to be configured to help ensure minimal delays when power outages occur in the future?

Options:

A.

Replication


B.

Caching


C.

Containerization


D.

Redundancy


E.

High availability


Expert Solution
Questions # 137:

A Chief Security Officer (CSO) is concerned about the number of successful ransomware attacks that have hit the company. The data Indicates most of the attacks came through a fake email. The company has added training, and the CSO now wants to evaluate whether the training has been successful. Which of the following should the CSO implement?

Options:

A.

Simulating a spam campaign


B.

Conducting a sanctioned vishing attack


C.

Performing a risk assessment


D.

Executing a penetration test


Expert Solution
Questions # 138:

A recent audit discovered that multiple employees had been using their badges to walk through the secured data center to get to the employee break room. Most of the employees were given access during a previous project, but the access was not removed in a timely manner when the project was complete. Which of the following would reduce the likelihood of this scenario occurring again?

Options:

A.

Create an automated quarterly attestation process that requires management approval for data center access and removes unapproved access.


B.

Require all employees to sign an AUP that prohibits accessing the data center without an active service ticket number.


C.

Remove all access to the data center badge readers and only re-add employees with a valid business purpose for entering the floor.


D.

Implement time-of-day restrictions on the data center badge readers and create automated alerts for unapproved swipe attempts.


Expert Solution
Questions # 139:

A company wants to prevent a partner company from denying agreement to a transaction. Which of the following is the best solution for the company?

Options:

A.

Federation


B.

Key escrow


C.

Salting hashes


D.

Digital signatures


Expert Solution
Questions # 140:

A penetration tester discovers a condition that causes unexpected behavior in a web application. This results in the dump of the interpreter's debugging information, which includes the interpreter's version, full path of binary files, and the user ID running the process. Which of the following actions would best mitigate this risk?

Options:

A.

Include routines in the application for message handling


B.

Adopt a compiled programming language instead.


C.

Perform SAST vulnerability scans on every build.


D.

Validate user-generated input.


Expert Solution
Questions # 141:

A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

php-template

CopyEdit

<!DOCTYPE doc [

&xxe;

]>

Which of the following wouldbestmitigate this vulnerability?

Options:

A.

CAPTCHA


B.

Input validation


C.

Data encoding


D.

Network intrusion prevention


Expert Solution
Questions # 142:

Company A acquired Company B. During an initial assessment, the companies discover they are using the same SSO system. To help users with the transition, Company A is requiring the following:

• Before the merger is complete, users from both companies should use a single set of usernames and passwords.

• Users in the same departments should have the same set of rights and privileges, but they should have different sets of rights and privileges if they have different IPs.

• Users from Company B should be able to access Company A's available resources.

Which of the following are the BEST solutions? (Select TWO).

Options:

A.

Installing new Group Policy Object policies


B.

Establishing one-way trust from Company B to Company A


C.

Enabling multifactor authentication


D.

Implementing attribute-based access control


E.

Installing Company A's Kerberos systems in Company B's network


F.

Updating login scripts


Expert Solution
Questions # 143:

An engineering team has deployed a new VPN service that requires client certificates to be used in order to successfully connect. On iOS devices, however, the following error occurs after importing the .p12 certificate file:

mbedTLS: ca certificate undefined

Which of the following is the root cause of this issue?

Options:

A.

iOS devices have an empty root certificate chain by default.


B.

OpenSSL is not configured to support PKCS#12 certificate files.


C.

The VPN client configuration is missing the CA private key.


D.

The iOS keychain imported only the client public and private keys.


Expert Solution
Questions # 144:

Which of the following BEST describes a common use case for homomorphic encryption ?

Options:

A.

Processing data on a server after decrypting in order to prevent unauthorized access in transit


B.

Maintaining the confidentiality of data both at rest and in transit to and from a CSP for processing


C.

Transmitting confidential data to a CSP for processing on a large number of resources without revealing information


D.

Storing proprietary data across multiple nodes in a private cloud to prevent access by unauthenticated users


Expert Solution
Questions # 145:

A software development company is building a new mobile application for its social media platform. The company wants to gain its users' trust by reducing the risk of on-path attacks between the mobile

client and its servers and by implementing stronger digital trust. To support users' trust, the company has released the following internal guidelines:

• Mobile clients should verify the identity of all social media servers locally.

• Social media servers should improve TLS performance of their certificate status

• Social media servers should inform the client to only use HTTPS.

Given the above requirements, which of the following should the company implement? (Select TWO).

Options:

A.

Quick UDP internet connection


B.

OCSP stapling


C.

Private CA


D.

DNSSEC


E.

CRL


F.

HSTS


G.

Distributed object model


Expert Solution
Questions # 146:

An organization is looking to establish more robust security measures by implementing PKI. Which of the following should the security analyst implement when considering mutual authentication?

Options:

A.

Perfect forward secrecy on both endpoints


B.

Shared secret for both endpoints


C.

Public keys on both endpoints


D.

A common public key on each endpoint


E.

A common private key on each endpoint


Expert Solution
Questions # 147:

A company wants to refactor a monolithic application to take advantage of cloud native services and service microsegmentation to secure sensitive application components. Which of the following should the company implement to ensure the architecture is portable?

Options:

A.

Virtualized emulators


B.

Type 2 hypervisors


C.

Orchestration


D.

Containerization


Expert Solution
Questions # 148:

A security manager wants to transition the organization to a zero trust architecture. To meet this requirement, the security manager has instructed administrators to remove trusted zones, role-based access, and one-time authentication. Which of the following will need to be implemented to achieve this objective? (Select THREE).

Options:

A.

Least privilege


B.

VPN


C.

Policy automation


D.

PKI


E.

Firewall


F.

Continuous validation


G.

Continuous integration


Expert Solution
Questions # 149:

A security consultant is designing an infrastructure security solution for a client company that has provided the following requirements:

• Access to critical web services at the edge must be redundant and highly available.

• Secure access services must be resilient to a proprietary zero-day vulnerability in a single component.

• Automated transition of secure access solutions must be able to be triggered by defined events or manually by security operations staff.

Which of the following solutions BEST meets these requirements?

Options:

A.

Implementation of multiple IPSec VPN solutions with diverse endpoint configurations enabling user optionality in the selection of a remote access provider


B.

Remote access services deployed using vendor-diverse redundancy with event response driven by playbooks.


C.

Two separate secure access solutions orchestrated by SOAR with components provided by the same vendor for compatibility.


D.

Reverse TLS proxy configuration using OpenVPN/OpenSSL with scripted failover functionality that connects critical web services out to endpoint computers.


Expert Solution
Questions # 150:

A security architect recommends replacing the company’s monolithic software application with a containerized solution. Historically, secrets have been stored in the application's configuration files. Which of the following changes should the security architect make in the new system?

Options:

A.

Use a secrets management tool.


B.

‘Save secrets in key escrow.


C.

Store the secrets inside the Dockerfiles.


D.

Run all Dockerfles in a randomized namespace.


Expert Solution
Viewing page 10 out of 13 pages
Viewing questions 136-150 out of questions