Pass the CompTIA CompTIA CASP CAS-004 Questions and answers with CertsForce

Viewing page 4 out of 13 pages
Viewing questions 46-60 out of questions
Questions # 46:

A forensic investigator would use the foremost command for:

Options:

A.

cloning disks.


B.

analyzing network-captured packets.


C.

recovering lost files.


D.

extracting features such as email addresses


Expert Solution
Questions # 47:

Due to adverse events, a medium-sized corporation suffered a major operational disruption that caused its servers to crash and experience a major power outage. Which of the following should be created to prevent this type of issue in the future?

Options:

A.

SLA


B.

BIA


C.

BCM


D.

BCP


E.

RTO


Expert Solution
Questions # 48:

An energy company is required to report the average pressure of natural gas used over the past quarter. A PLC sends data to a historian server that creates the required reports.

Which of the following historian server locations will allow the business to get the required reports in an ОТ and IT environment?

Options:

A.

In the ОТ environment, use a VPN from the IT environment into the ОТ environment.


B.

In the ОТ environment, allow IT traffic into the ОТ environment.


C.

In the IT environment, allow PLCs to send data from the ОТ environment to the IT environment.


D.

Use a screened subnet between the ОТ and IT environments.


Expert Solution
Questions # 49:

Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?

Options:

A.

Key sharing


B.

Key distribution


C.

Key recovery


D.

Key escrow


Expert Solution
Questions # 50:

A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services.

Which of the following should be modified to prevent the issue from reoccurring?

Options:

A.

Recovery point objective


B.

Recovery time objective


C.

Mission-essential functions


D.

Recovery service level


Expert Solution
Questions # 51:

During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels.

Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?

Options:

A.

Spawn a shell using sudo and an escape string such as sudo vim -c ‘!sh’.


B.

Perform ASIC password cracking on the host.


C.

Read the /etc/passwd file to extract the usernames.


D.

Initiate unquoted service path exploits.


E.

Use the UNION operator to extract the database schema.


Expert Solution
Questions # 52:

An organization’s hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.

Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?

Options:

A.

Deploy a SOAR tool.


B.

Modify user password history and length requirements.


C.

Apply new isolation and segmentation schemes.


D.

Implement decoy files on adjacent hosts.


Expert Solution
Questions # 53:

A new web server must comply with new secure-by-design principles and PCI DSS. This includes mitigating the risk of an on-path attack. A security analyst is reviewing the following web server configuration:

Question # 53

Which of the following ciphers should the security analyst remove to support the business requirements?

Options:

A.

TLS_AES_128_CCM_8_SHA256


B.

TLS_DHE_DSS_WITH_RC4_128_SHA


C.

TLS_CHACHA20_POLY1305_SHA256


D.

TLS_AES_128_GCM_SHA256


Expert Solution
Questions # 54:

A junior developer is informed about the impact of new malware on an Advanced RISC Machine (ARM) CPU, and the code must be fixed accordingly. Based on the debug, the malware is able to insert itself in another process memory location.

Which of the following technologies can the developer enable on the ARM architecture to prevent this type of malware?

Options:

A.

Execute never


B.

No-execute


C.

Total memory encryption


D.

Virtual memory encryption


Expert Solution
Questions # 55:

A customer reports being unable to connect to a website at www.test.com to consume services. The customer notices the web application has the following published cipher suite:

Question # 55

Which of the following is the MOST likely cause of the customer’s inability to connect?

Options:

A.

Weak ciphers are being used.


B.

The public key should be using ECDSA.


C.

The default should be on port 80.


D.

The server name should be test.com.


Expert Solution
Questions # 56:

During a remodel, a company’s computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room.The company wants to be able to identify any unauthorized individuals who enter the storage room by following an authorized employee.

Which of the following processes would BEST satisfy this requirement?

Options:

A.

Monitor camera footage corresponding to a valid access request.


B.

Require both security and management to open the door.


C.

Require department managers to review denied-access requests.


D.

Issue new entry badges on a weekly basis.


Expert Solution
Questions # 57:

A network architect is designing a new SD-WAN architecture to connect all local sites to a central hub site. The hub is then responsible for redirecting traffic to public cloud and datacenter applications. The SD-WAN routers are managed through a SaaS, and the same security policy is applied to staff whether working in the office or at a remote location. The main requirements are the following:

1. The network supports core applications that have 99.99% uptime.

2. Configuration updates to the SD-WAN routers can only be initiated from the management service.

3. Documents downloaded from websites must be scanned for malware.

Which of the following solutions should the network architect implement to meet the requirements?

Options:

A.

Reverse proxy, stateful firewalls, and VPNs at the local sites


B.

IDSs, WAFs, and forward proxy IDS


C.

DoS protection at the hub site, mutual certificate authentication, and cloud proxy


D.

IPSs at the hub, Layer 4 firewalls, and DLP


Expert Solution
Questions # 58:

After a security incident, a network security engineer discovers that a portion of the company’s sensitive external traffic has been redirected through a secondary ISP that is not normally used.

Which of the following would BEST secure the routes while allowing the network to function in the event of a single provider failure?

Options:

A.

Disable BGP and implement a single static route for each internal network.


B.

Implement a BGP route reflector.


C.

Implement an inbound BGP prefix list.


D.

Disable BGP and implement OSPF.


Expert Solution
Questions # 59:

A company is migrating from company-owned phones to a BYOD strategy for mobile devices. The pilot program will start with the executive management team and be rolled out to the rest of the staff in phases. The company’s Chief Financial Officer loses a phone multiple times a year.

Which of the following will MOST likely secure the data on the lost device?

Options:

A.

Require a VPN to be active to access company data.


B.

Set up different profiles based on the person’s risk.


C.

Remotely wipe the device.


D.

Require MFA to access company applications.


Expert Solution
Questions # 60:

An organization wants to perform a scan of all its systems against best practice security configurations.

Which of the following SCAP standards, when combined, will enable the organization to view each of the configuration checks in a machine-readable checklist format for fill automation? (Choose two.)

Options:

A.

ARF


B.

XCCDF


C.

CPE


D.

CVE


E.

CVSS


F.

OVAL


Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 46-60 out of questions