Pass the CompTIA CompTIA CASP CAS-004 Questions and answers with CertsForce

Viewing page 3 out of 13 pages
Viewing questions 31-45 out of questions
Questions # 31:

An analyst received a list of IOCs from a government agency. The attack has the following characteristics:

1. The attack starts with bulk phishing.

2. If a user clicks on the link, a dropper is downloaded to the computer.

3. Each of the malware samples has unique hashes tied to the user.

The analyst needs to identify whether existing endpoint controls are effective. Which of the following risk mitigation techniques should the analyst use?

Options:

A.

Update the incident response plan.


B.

Blocklist the executable.


C.

Deploy a honeypot onto the laptops.


D.

Detonate in a sandbox.


Expert Solution
Questions # 32:

A security analyst detected a malicious PowerShell attack on a single server. The malware used the Invoke-Expression function to execute an external malicious script. The security analyst scanned the disk with an antivirus application and did not find any IOCs. The security analyst now needs to deploy a protection solution against this type of malware.

Which of the following BEST describes the type of malware the solution should protect against?

Options:

A.

Worm


B.

Logic bomb


C.

Fileless


D.

Rootkit


Expert Solution
Questions # 33:

A company Invested a total of $10 million lor a new storage solution Installed across live on-site datacenters. Fitly percent of the cost of this Investment was for solid-state storage. Due to thehigh rate of wear on this storage, the company Is estimating that 5% will need to be replaced per year. Which of the following is the ALE due to storage replacement?

Options:

A.

$50,000


B.

$125,000


C.

$250,000


D.

$500.000


E.

$51,000,000


Expert Solution
Questions # 34:

A company's Chief Information Officer wants to Implement IDS software onto the current system's architecture to provide an additional layer of security. The software must be able to monitor system activity, provide Information on attempted attacks, and provide analysis of malicious activities to determine the processes or users Involved. Which of the following would provide this information?

Options:

A.

HIPS


B.

UEBA


C.

HlDS


D.

NIDS


Expert Solution
Questions # 35:

An attacker infiltrated an electricity-generation site and disabled the safety instrumented system. Ransomware was also deployed on the engineering workstation. The environment has back-to-back firewalls separating the corporate and OT systems. Which of the following is the MOST likely security consequence of this attack?

Options:

A.

A turbine would overheat and cause physical harm.


B.

The engineers would need to go to the historian.


C.

The SCADA equipment could not be maintained.


D.

Data would be exfiltrated through the data diodes.


Expert Solution
Questions # 36:

An organization's finance system was recently attacked. A forensic analyst is reviewing the contents Of the compromised files for credit card data.

Which of the following commands should the analyst run to BEST determine whether financial data was lost?

Question # 36

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 37:

The Chief Information Security Officer of a startup company has asked a security engineer to implement a software security program in an environment that previously had little oversight.

Which of the following testing methods would be BEST for the engineer to utilize in this situation?

Options:

A.

Software composition analysis


B.

Code obfuscation


C.

Static analysis


D.

Dynamic analysis


Expert Solution
Questions # 38:

A security analyst is trying to identify the source of a recent data loss incident. The analyst has reviewed all the for the time surrounding the identified all the assets on the network at the timeof the data loss. The analyst suspects the key to finding the source was obfuscated in an application. Which of the following tools should the analyst use NEXT?

Options:

A.

Software Decomplier


B.

Network enurrerator


C.

Log reduction and analysis tool


D.

Static code analysis


Expert Solution
Questions # 39:

A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt the data using the keys from the website. Which of the following should the security analyst recommend to protect the affected data?

Options:

A.

Key rotation


B.

Key revocation


C.

Key escrow


D.

Zeroization


E.

Cryptographic obfuscation


Expert Solution
Questions # 40:

An organization developed a social media application that is used by customers in multiple remote geographic locations around the world. The organization’s headquarters and only datacenter are located in New York City. The Chief Information Security Officer wants to ensure the following requirements are met for the social media application:

Low latency for all mobile users to improve the users’ experience

SSL offloading to improve web server performance

Protection against DoS and DDoS attacks

High availability

Which of the following should the organization implement to BEST ensure all requirements are met?

Options:

A.

A cache server farm in its datacenter


B.

A load-balanced group of reverse proxy servers with SSL acceleration


C.

A CDN with the origin set to its datacenter


D.

Dual gigabit-speed Internet connections with managed DDoS prevention


Expert Solution
Questions # 41:

A cybersecurity analyst receives a ticket that indicates a potential incident is occurring. There has been a large in log files generated by a generated by a website containing a ‘’Contact US’’ form. The analyst must determine if the increase in website traffic is due to a recent marketing campaign of if this is a potential incident. Which of the following would BEST assist the analyst?

Options:

A.

Ensuring proper input validation is configured on the ‘’Contact US’’ form


B.

Deploy a WAF in front of the public website


C.

Checking for new rules from the inbound network IPS vendor


D.

Running the website log files through a log reduction and analysis tool


Expert Solution
Questions # 42:

An HVAC contractor requested network connectivity permission to remotely support/troubleshoot equipment issues at a company location. Currently, the company does not have a process that allows vendors remote access to the corporate network Which of the following solutions represents the BEST course of action to allow the contractor access?

Options:

A.

Add the vendor's equipment to the existing network Give the vendor access through the standard corporate VPN


B.

Give the vendor a standard desktop PC to attach the equipment to Give the vendor access through the standard corporate VPN


C.

Establish a certification process for the vendor Allow certified vendors access to the VDI to monitor and maintain the HVAC equipment


D.

Create a dedicated segment with no access to the corporate network Implement dedicated VPN hardware for vendor access


Expert Solution
Questions # 43:

An attacker infiltrated the code base of a hardware manufacturer and inserted malware before the code was compiled. The malicious code is now running at the hardware level across a number of industries and sectors. Which of the following categories BEST describes this type of vendor risk?

Options:

A.

SDLC attack


B.

Side-load attack


C.

Remote code signing


D.

Supply chain attack


Expert Solution
Questions # 44:

A Chief information Security Officer (CISO) has launched to create a rebuts BCP/DR plan for the entire company. As part of the initiative , the security team must gather data supporting s operational importance for the applications used by the business and determine the order in which the application must be back online. Which of the following be the FIRST step taken by the team?

Options:

A.

Perform a review of all policies an procedures related to BGP a and DR and created an educated educational module that can be assigned to at employees to provide training on BCP/DR events.


B.

Create an SLA for each application that states when the application will come back online and distribute this information to the business units.


C.

Have each business unit conduct a BIA and categories the application according to the cumulative data gathered.


D.

Implement replication of all servers and application data to back up detacenters that are geographically from the central datacenter and release an upload BPA to all clients.


Expert Solution
Questions # 45:

An organization recently recovered from an attack that featured an adversary injecting Malicious logic into OS bootloaders on endpoint devices Therefore, the organization decided to require the use of TPM for measured boot and attestation, monitoring each component from the IJEFI through the full loading of OS components. of the following TPM structures enables this storage functionality?

Options:

A.

Endorsement tickets


B.

Clock/counter structures


C.

Command tag structures with MAC schemes


D.

Platform configuration registers


Expert Solution
Viewing page 3 out of 13 pages
Viewing questions 31-45 out of questions