Pass the CompTIA CompTIA CASP CAS-004 Questions and answers with CertsForce

Viewing page 5 out of 13 pages
Viewing questions 61-75 out of questions
Questions # 61:

A security architect is implementing a web application that uses a database back end. Prior to the production, the architect is concerned about the possibility of XSS attacks and wants to identify security controls that could be put in place to prevent these attacks.

Which of the following sources could the architect consult to address this security concern?

Options:

A.

SDLC


B.

OVAL


C.

IEEE


D.

OWASP


Expert Solution
Questions # 62:

An enterprise is deploying APIs that utilize a private key and a public key to ensure the connection string is protected. To connect to the API, customers must use the private key.

Which of the following would BEST secure the REST API connection to the database while preventing the use of a hard-coded string in the request string?

Options:

A.

Implement a VPN for all APIs.


B.

Sign the key with DSA.


C.

Deploy MFA for the service accounts.


D.

Utilize HMAC for the keys.


Expert Solution
Questions # 63:

A company plans to build an entirely remote workforce that utilizes a cloud-based infrastructure. The Chief Information Security Officer asks the security engineer to design connectivity to meet the following requirements:

Only users with corporate-owned devices can directly access servers hosted by the cloud provider.

The company can control what SaaS applications each individual user can access.

User browser activity can be monitored.

Which of the following solutions would BEST meet these requirements?

Options:

A.

IAM gateway, MDM, and reverse proxy


B.

VPN, CASB, and secure web gateway


C.

SSL tunnel, DLP, and host-based firewall


D.

API gateway, UEM, and forward proxy


Expert Solution
Questions # 64:

A company hired a third party to develop software as part of its strategy to be quicker to market. The company’s policy outlines the following requirements:

https://i.postimg.cc/8P9sB3zx/image.png

The credentials used to publish production software to the container registry should be stored in a secure location.

Access should be restricted to the pipeline service account, without the ability for the third-party developer to read the credentials directly.

Which of the following would be the BEST recommendation for storing and monitoring access to these shared credentials?

Options:

A.

TPM


B.

Local secure password file


C.

MFA


D.

Key vault


Expert Solution
Questions # 65:

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.

Which of the following would be BEST for the developer to perform? (Choose two.)

Options:

A.

Utilize code signing by a trusted third party.


B.

Implement certificate-based authentication.


C.

Verify MD5 hashes.


D.

Compress the program with a password.


E.

Encrypt with 3DES.


F.

Make the DACL read-only.


Expert Solution
Questions # 66:

Due to locality and budget constraints, an organization’s satellite office has a lower bandwidth allocation than other offices in the organization. As a result, the local security infrastructure staff is assessing architectural options that will help preserve network bandwidth and increase speed to both internal and external resources while not sacrificing threat visibility.

Which of the following would be the BEST option to implement?

Options:

A.

Distributed connection allocation


B.

Local caching


C.

Content delivery network


D.

SD-WAN vertical heterogeneity


Expert Solution
Questions # 67:

An organization recently started processing, transmitting, and storing its customers’ credit card information. Within a week of doing so, the organization suffered a massive breach that resulted in the exposure of the customers’ information.

Which of the following provides the BEST guidance for protecting such information while it is at rest and in transit?

Options:

A.

NIST


B.

GDPR


C.

PCI DSS


D.

ISO


Expert Solution
Questions # 68:

A security analyst notices a number of SIEM events that show the following activity:

Question # 68

Which of the following response actions should the analyst take FIRST?

Options:

A.

Disable powershell.exe on all Microsoft Windows endpoints.


B.

Restart Microsoft Windows Defender.


C.

Configure the forward proxy to block 40.90.23.154.


D.

Disable local administrator privileges on the endpoints.


Expert Solution
Questions # 69:

A security analyst is performing a vulnerability assessment on behalf of a client. The analyst must define what constitutes a risk to the organization.

Which of the following should be the analyst’s FIRST action?

Options:

A.

Create a full inventory of information and data assets.


B.

Ascertain the impact of an attack on the availability of crucial resources.


C.

Determine which security compliance standards should be followed.


D.

Perform a full system penetration test to determine the vulnerabilities.


Expert Solution
Questions # 70:

A security analyst is concerned that a malicious piece of code was downloaded on a Linux system. After some research, the analyst determines that the suspected piece of code is performing a lot of input/output (I/O) on the disk drive.

Question # 70

Based on the output above, from which of the following process IDs can the analyst begin an investigation?

Options:

A.

65


B.

77


C.

83


D.

87


Expert Solution
Questions # 71:

A security architect works for a manufacturing organization that has many different branch offices. The architect is looking for a way to reduce traffic and ensure the branch offices receive the latest copy of revoked certificates issued by the CA at the organization’s headquarters location. The solution must also have the lowest power requirement on the CA.

Which of the following is the BEST solution?

Options:

A.

Deploy an RA on each branch office.


B.

Use Delta CRLs at the branches.


C.

Configure clients to use OCSP.


D.

Send the new CRLs by using GPO.


Expert Solution
Questions # 72:

A security engineer was auditing an organization’s current software development practice and discovered that multiple open-source libraries were Integrated into the organization’s software. The organization currently performs SAST and DAST on the software it develops.

Which of the following should the organization incorporate into the SDLC to ensure the security of the open-source libraries?

Options:

A.

Perform additional SAST/DAST on the open-source libraries.


B.

Implement the SDLC security guidelines.


C.

Track the library versions and monitor the CVE website for related vulnerabilities.


D.

Perform unit testing of the open-source libraries.


Expert Solution
Questions # 73:

A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log.

Which of the following actions would BEST address the potential risks by the activity in the logs?

Options:

A.

Alerting the misconfigured service account password


B.

Modifying the AllowUsers configuration directive


C.

Restricting external port 22 access


D.

Implementing host-key preferences


Expert Solution
Questions # 74:

A business stores personal client data of individuals residing in the EU in order to process requests for mortgage loan approvals.

Which of the following does the business’s IT manager need to consider?

Options:

A.

The availability of personal data


B.

The right to personal data erasure


C.

The company’s annual revenue


D.

The language of the web application


Expert Solution
Questions # 75:

A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:

Unauthorized insertions into application development environments

Authorized insiders making unauthorized changes to environment configurations

Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)

Options:

A.

Perform static code analysis of committed code and generate summary reports.


B.

Implement an XML gateway and monitor for policy violations.


C.

Monitor dependency management tools and report on susceptible third-party libraries.


D.

Install an IDS on the development subnet and passively monitor for vulnerable services.


E.

Model user behavior and monitor for deviations from normal.


F.

Continuously monitor code commits to repositories and generate summary logs.


Expert Solution
Viewing page 5 out of 13 pages
Viewing questions 61-75 out of questions