Pass the CompTIA CompTIA CASP CAS-004 Questions and answers with CertsForce

Viewing page 2 out of 13 pages
Viewing questions 16-30 out of questions
Questions # 16:

A company hosts a large amount of data in blob storage for its customers. The company recently had a number of issues with this data being prematurely deleted before the scheduled backup processes could be completed. The management team has asked the security architect for a recommendation that allows blobs to be deleted occasionally, but only after a successful backup. Which of the following solutions will BEST meet this requirement?

Options:

A.

Mirror the blobs at a local data center.


B.

Enable fast recovery on the storage account.


C.

Implement soft delete for blobs.


D.

Make the blob immutable.


Expert Solution
Questions # 17:

A company is repeatedly being breached by hackers who valid credentials. The company’s Chief information Security Officer (CISO) has installed multiple controls for authenticating users, including biometric and token-based factors. Each successive control has increased overhead and complexity but has failed to stop further breaches. An external consultant is evaluating the process currently in place to support the authentication controls. Which of the following recommendation would MOST likely reduce the risk of unauthorized access?

Options:

A.

Implement strict three-factor authentication.


B.

Implement least privilege policies


C.

Switch to one-time or all user authorizations.


D.

Strengthen identify-proofing procedures


Expert Solution
Questions # 18:

A company based in the United States holds insurance details of EU citizens. Which of the following must be adhered to when processing EU citizens' personal, private, and confidential data?

Options:

A.

The principle of lawful, fair, and transparent processing


B.

The right to be forgotten principle of personal data erasure requests


C.

The non-repudiation and deniability principle


D.

The principle of encryption, obfuscation, and data masking


Expert Solution
Questions # 19:

The Chief information Security Officer (CISO) of a small locate bank has a compliance requirement that a third-party penetration test of the core banking application must be conducted annually. Which of the following services would fulfill the compliance requirement with the LOWEST resource usage?

Options:

A.

Black-box testing


B.

Gray-box testing


C.

Red-team hunting


D.

White-box testing


E.

Blue-learn exercises


Expert Solution
Questions # 20:

A software development company is building a new mobile application for its social media platform. The company wants to gain its Users' rust by reducing the risk of on-path attacks between the mobile client and its servers and

by implementing stronger digital trust. To support users’ trust, the company has released the following internal guidelines:

* Mobile clients should verify the identity of all social media servers locally.

* Social media servers should improve TLS performance of their certificate status.

* Social media servers should inform the client to only use HTTPS.

Given the above requirements, which of the following should the company implement? (Select TWO).

Options:

A.

Quick UDP internet connection


B.

OCSP stapling


C.

Private CA


D.

DNSSEC


E.

CRL


F.

HSTS


G.

Distributed object model


Expert Solution
Questions # 21:

A Chief information Security Officer (CISO) is developing corrective-action plans based on the following from a vulnerability scan of internal hosts:

Question # 21

Which of the following MOST appropriate corrective action to document for this finding?

Options:

A.

The product owner should perform a business impact assessment regarding the ability to implement a WAF.


B.

The application developer should use a static code analysis tool to ensure any application code is not vulnerable to buffer overflows.


C.

The system administrator should evaluate dependencies and perform upgrade as necessary.


D.

The security operations center should develop a custom IDS rule to prevent attacks buffer overflows against this server.


Expert Solution
Questions # 22:

A security operations center analyst is investigating anomalous activity between a database server and an unknown external IP address and gathered the following data:

• dbadmin last logged in at 7:30 a.m. and logged out at 8:05 a.m.

• A persistent TCP/6667 connection to the external address was established at 7:55 a.m. The connection is still active.

• Other than bytes transferred to keep the connection alive, only a few kilobytes of data transfer every hour since the start of the connection.

• A sample outbound request payload from PCAP showed the ASCII content: "JOIN #community".

Which of the following is the MOST likely root cause?

Options:

A.

A SQL injection was used to exfiltrate data from the database server.


B.

The system has been hijacked for cryptocurrency mining.


C.

A botnet Trojan is installed on the database server.


D.

The dbadmin user is consulting the community for help via Internet Relay Chat.


Expert Solution
Questions # 23:

A security engineer at a company is designing a system to mitigate recent setbacks caused competitors that are beating the company to market with the new products. Several of the products incorporate propriety enhancements developed by the engineer’s company. The network already includes a SEIM and a NIPS and requires 2FA for all user access. Which of the following system should the engineer consider NEXT to mitigate the associated risks?

Options:

A.

DLP


B.

Mail gateway


C.

Data flow enforcement


D.

UTM


Expert Solution
Questions # 24:

A software company wants to build a platform by integrating with another company's established product. Which of the following provisions would be MOST important to include when drafting an agreement between the two companies?

Options:

A.

Data sovereignty


B.

Shared responsibility


C.

Source code escrow


D.

Safe harbor considerations


Expert Solution
Questions # 25:

A company provides guest WiFi access to the internet and physically separates the guest network from the company’s internal WIFI. Due to a recent incident in which an attacker gained access to the compay’s intend WIFI, the company plans to configure WPA2 Enterprise in an EAP- TLS configuration. Which of the following must be installed on authorized hosts for this new configuration to work properly?

Options:

A.

Active Directory OPOs


B.

PKI certificates


C.

Host-based firewall


D.

NAC persistent agent


Expert Solution
Questions # 26:

A company recently acquired a SaaS provider and needs to integrate its platform into the company's existing infrastructure without impact to the customer's experience. The SaaS provider does not have a mature security program A recent vulnerability scan of the SaaS provider's systems shows multiple critical vulnerabilities attributed to very old and outdated Oss. Which of the following solutions would prevent these vulnerabilities from being introduced into the company's existing infrastructure?

Options:

A.

Segment the systems to reduce the attack surface if an attack occurs


B.

Migrate the services to new systems with a supported and patched OS.


C.

Patch the systems to the latest versions of the existing OSs


D.

Install anti-malware. HIPS, and host-based firewalls on each of the systems


Expert Solution
Questions # 27:

An attack team performed a penetration test on a new smart card system. The team demonstrated that by subjecting the smart card to high temperatures, the secret key could be revealed.

Which of the following side-channel attacks did the team use?

Options:

A.

Differential power analysis


B.

Differential fault analysis


C.

Differential temperature analysis


D.

Differential timing analysis


Expert Solution
Questions # 28:

A Chief Information Officer (CIO) wants to implement a cloud solution that will satisfy the following requirements:

Support all phases of the SDLC.

Use tailored website portal software.

Allow the company to build and use its own gateway software.

Utilize its own data management platform.

Continue using agent-based security tools.

Which of the following cloud-computing models should the CIO implement?

Options:

A.

SaaS


B.

PaaS


C.

MaaS


D.

IaaS


Expert Solution
Questions # 29:

A security consultant needs to protect a network of electrical relays that are used for monitoring and controlling the energy used in a manufacturing facility.

Which of the following systems should the consultant review before making a recommendation?

Options:

A.

CAN


B.

ASIC


C.

FPGA


D.

SCADA


Expert Solution
Questions # 30:

A local government that is investigating a data exfiltration claim was asked to review the fingerprint of the malicious user's actions. An investigator took a forensic image of the VM an downloaded the image to a secured USB drive to share with the government. Which of the following should be taken into consideration during the process of releasing the drive to the government?

Options:

A.

Encryption in transit


B.

Legal issues


C.

Chain of custody


D.

Order of volatility


E.

Key exchange


Expert Solution
Viewing page 2 out of 13 pages
Viewing questions 16-30 out of questions