Pass the CompTIA CompTIA CASP CAS-004 Questions and answers with CertsForce

Viewing page 12 out of 13 pages
Viewing questions 166-180 out of questions
Questions # 166:

A company has decided that only administrators are permitted to use PowerShell on their Windows computers. Which of the following is the BEST way for an administrator to implement this decision?

Options:

A.

Monitor the Application and Services Logs group within Windows Event Log.


B.

Uninstall PowerSheII from all workstations.


C.

Configure user settings in Group Policy.


D.

Provide user education and training.


E.

Block PowerSheII via HIDS.


Expert Solution
Questions # 167:

A company created an external, PHP-based web application for its customers. A security researcher reports that the application has the Heartbleed vulnerability. Which of the following would BEST resolve and mitigate the issue? (Select TWO).

Options:

A.

Deploying a WAF signature


B.

Fixing the PHP code


C.

Changing the web server from HTTPS to HTTP


D.

UsingSSLv3


E.

Changing the code from PHP to ColdFusion


F.

Updating the OpenSSL library


Expert Solution
Questions # 168:

The Chief Information Security Officer (CISO) is working with a new company and needs a legal “document to ensure all parties understand their roles during an assessment. Which of the following should the CISO have each party sign?

Options:

A.

SLA


B.

ISA


C.

Permissions and access


D.

Rules of engagement


Expert Solution
Questions # 169:

A security manager has written an incident response playbook for insider attacks and is ready to begin testing it. Which of the following should the manager conduct to test the playbook?

Options:

A.

Automated vulnerability scanning


B.

Centralized logging, data analytics, and visualization


C.

Threat hunting


D.

Threat emulation


Expert Solution
Questions # 170:

An administrator at a software development company would like to protect the integrity of the company's applications with digital signatures. The developers report that the signing process keeps failing on all applications. The same key pair used for signing, however, is working properly on the website, is valid, and is issued by a trusted CA. Which of the following is MOST likely the cause of the

signature failing?

Options:

A.

The NTP server is set incorrectly for the developers


B.

The CA has included the certificate in its CRL.


C.

The certificate is set for the wrong key usage.


D.

Each application is missing a SAN or wildcard entry on the certificate


Expert Solution
Questions # 171:

A consultant needs access to a customer's cloud environment. The customer wants to enforce the following engagement requirements:

• All customer data must remain under the control of the customer at all times.

• Third-party access to the customer environment must be controlled by the customer.

• Authentication credentials and access control must be under the customer's control.

Which of the following should the consultant do to ensure all customer requirements are satisfied when accessing the cloud environment?

Options:

A.

use the customer's SSO with read-only credentials and share data using the customer's provisioned secure network storage


B.

use the customer-provided VDI solution to perform work on the customer's environment.


C.

Provide code snippets to the customer and have the customer run code and securely deliver its output


D.

Request API credentials from the customer and only use API calls to access the customer's environment.


Expert Solution
Questions # 172:

In comparison with traditional on-premises infrastructure configurations, defining ACLs in a CSP relies on:

Options:

A.

cloud-native applications.


B.

containerization.


C.

serverless configurations.


D.

software-defined netWorking.


E.

secure access service edge.


Expert Solution
Questions # 173:

A global organization's Chief Information Security Officer (CISO) has been asked to analyze the risks involved in a plan to move the organization's current MPLS-based WAN network to use commodity Internet and SD-WAN hardware. The SD-WAN provider is currently highly regarded but Is a regional provider. Which of the following is MOST likely identified as a potential risk by the CISO?

Options:

A.

The SD-WAN provider would not be able to handle the organization's bandwidth requirements.


B.

The operating costs of the MPLS network are too high for the organization.


C.

The SD-WAN provider uses a third party for support.


D.

Internal IT staff will not be able to properly support remote offices after the migration.


Expert Solution
Questions # 174:

A cloud security engineer is setting up a cloud-hosted WAF. The engineer needs to implement a solution to protect the multiple websites the organization hosts. The organization websites are:

* www.mycompany.org

* www.mycompany.com

* campus.mycompany.com

* wiki. mycompany.org

The solution must save costs and be able to protect all websites. Users should be able to notify the cloud security engineer of any on-path attacks. Which of the following is the BEST solution?

Options:

A.

Purchase one SAN certificate.


B.

Implement self-signed certificates.


C.

Purchase one certificate for each website.


D.

Purchase one wildcard certificate.


Expert Solution
Questions # 175:

A security researcher detonated some malware in a lab environment and identified the following commands running from the EDR tool:

Question # 175

With which of the following MITRE ATT&CK TTPs is the command associated? (Select TWO).

Options:

A.

Indirect command execution


B.

OS credential dumping


C.

Inhibit system recovery


D.

External remote services


E.

System information discovery


F.

Network denial of service


Expert Solution
Questions # 176:

A systems administrator was given the following IOC to detect the presence of a malicious piece of software communicating with its command-and-control server:

post /malicious. php

User-Agent: Malicious Tool V 1.0

Host: www.rcalicious.com

The IOC documentation suggests the URL is the only part that could change. Which of the following regular expressions would allow the systems administrator to determine if any of the company hosts are compromised, while reducing false positives?

Options:

A.

User-Agent: Malicious Tool.*


B.

www\. malicious\. com\/malicious. php


C.

POST /malicious\. php


D.

Hose: [a-2] *\.malicious\.com


E.

malicious. *


Expert Solution
Questions # 177:

The CI/CD pipeline requires code to have close to zero defects and zero vulnerabilities. The current process for any code releases into production uses two-week Agile sprints. Which of the following would BEST meet the requirement?

Options:

A.

An open-source automation server


B.

A static code analyzer


C.

Trusted open-source libraries


D.

A single code repository for all developers


Expert Solution
Questions # 178:

Which of the following describes the system responsible for storing private encryption/decryption files with a third party to ensure these files are stored safely?

Options:

A.

Key escrow


B.

TPM


C.

Trust models


D.

Code signing


Expert Solution
Questions # 179:

In order to authenticate employees who, call in remotely, a company's help desk staff must be able to view partial Information about employees because the full information may be considered sensitive. Which of the following solutions should be implemented to authenticate employees?

Options:

A.

Data scrubbing


B.

Field masking


C.

Encryption in transit


D.

Metadata


Expert Solution
Questions # 180:

A cloud security architect has been tasked with selecting the appropriate solution given the following:

* The solution must allow the lowest RTO possible.

* The solution must have the least shared responsibility possible.

« Patching should be a responsibility of the CSP.

Which of the following solutions can BEST fulfill the requirements?

Options:

A.

Paas


B.

laas


C.

Private


D.

Saas


Expert Solution
Viewing page 12 out of 13 pages
Viewing questions 166-180 out of questions