Pass the CompTIA CompTIA CASP CAS-004 Questions and answers with CertsForce

Viewing page 6 out of 13 pages
Viewing questions 76-90 out of questions
Questions # 76:

A company has hired a security architect to address several service outages on the endpoints due to new malware. The Chief Executive Officer’s laptop was impacted while working from home. The goal is to prevent further endpoint disruption. The edge network is protected by a web proxy.

Which of the following solutions should the security architect recommend?

Options:

A.

Replace the current antivirus with an EDR solution.


B.

Remove the web proxy and install a UTM appliance.


C.

Implement a deny list feature on the endpoints.


D.

Add a firewall module on the current antivirus solution.


Expert Solution
Questions # 77:

Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext?

Options:

A.

Lattice-based cryptography


B.

Quantum computing


C.

Asymmetric cryptography


D.

Homomorphic encryption


Expert Solution
Questions # 78:

A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.

Options:

A.

Impalement application whitelisting and add only the email client to the whitelist for laptop in the claims processing department.


B.

Required all laptops to connect to the VPN before accessing email.


C.

Implement cloud-based content filtering with sandboxing capabilities.


D.

Install a mail gateway to scan incoming messages and strip attachments before they reach the mailbox.


Expert Solution
Questions # 79:

A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application.

Which of the following is the MOST likely cause?

Options:

A.

The user agent client is not compatible with the WAF.


B.

A certificate on the WAF is expired.


C.

HTTP traffic is not forwarding to HTTPS to decrypt.


D.

Old, vulnerable cipher suites are still being used.


Expert Solution
Questions # 80:

A Chief Information Officer is considering migrating all company data to the cloud to save money on expensive SAN storage.

Which of the following is a security concern that will MOST likely need to be addressed during migration?

Options:

A.

Latency


B.

Data exposure


C.

Data loss


D.

Data dispersion


Expert Solution
Questions # 81:

All staff at a company have started working remotely due to a global pandemic. To transition to remote work, the company has migrated to SaaS collaboration tools. The human resources department wants to use these tools to process sensitive information but is concerned the data could be:

Leaked to the media via printing of the documents

Sent to a personal email address

Accessed and viewed by systems administrators

Uploaded to a file storage site

Which of the following would mitigate the department’s concerns?

Options:

A.

Data loss detection, reverse proxy, EDR, and PGP


B.

VDI, proxy, CASB, and DRM


C.

Watermarking, forward proxy, DLP, and MFA


D.

Proxy, secure VPN, endpoint encryption, and AV


Expert Solution
Questions # 82:

An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented.

Which of the following processes can be used to identify potential prevention recommendations?

Options:

A.

Detection


B.

Remediation


C.

Preparation


D.

Recovery


Expert Solution
Questions # 83:

A satellite communications ISP frequently experiences outages and degraded modes of operation over one of its legacy satellite links due to the use of deprecated hardware and software. Three days per week, on average, a contracted company must follow a checklist of 16 different high-latency commands that must be run in serial to restore nominal performance. The ISP wants this process to be automated.

Which of the following techniques would be BEST suited for this requirement?

Options:

A.

Deploy SOAR utilities and runbooks.


B.

Replace the associated hardware.


C.

Provide the contractors with direct access to satellite telemetry data.


D.

Reduce link latency on the affected ground and satellite segments.


Expert Solution
Questions # 84:

Device event logs sources from MDM software as follows:

Question # 84

Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?

Options:

A.

Malicious installation of an application; change the MDM configuration to remove application ID 1220.


B.

Resource leak; recover the device for analysis and clean up the local storage.


C.

Impossible travel; disable the device’s account and access while investigating.


D.

Falsified status reporting; remotely wipe the device.


Expert Solution
Questions # 85:

An organization is designing a network architecture that must meet the following requirements:

Users will only be able to access predefined services.

Each user will have a unique allow list defined for access.

The system will construct one-to-one subject/object access paths dynamically.

Which of the following architectural designs should the organization use to meet these requirements?

Options:

A.

Peer-to-peer secure communications enabled by mobile applications


B.

Proxied application data connections enabled by API gateways


C.

Microsegmentation enabled by software-defined networking


D.

VLANs enabled by network infrastructure devices


Expert Solution
Questions # 86:

An IT administrator is reviewing all the servers in an organization and notices that a server is missing crucial practice against a recent exploit that could gain root access.

Which of the following describes the administrator’s discovery?

Options:

A.

A vulnerability


B.

A threat


C.

A breach


D.

A risk


Expert Solution
Questions # 87:

An organization is considering a BYOD standard to support remote working. The first iteration of the solution will utilize only approved collaboration applications and the ability to move corporate data between those applications. The security team has concerns about the following:

Unstructured data being exfiltrated after an employee leaves the organization

Data being exfiltrated as a result of compromised credentials

Sensitive information in emails being exfiltrated

Which of the following solutions should the security team implement to mitigate the risk of data loss?

Options:

A.

Mobile device management, remote wipe, and data loss detection


B.

Conditional access, DoH, and full disk encryption


C.

Mobile application management, MFA, and DRM


D.

Certificates, DLP, and geofencing


Expert Solution
Questions # 88:

A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company’s services to ensure false positives do not drop legitimate traffic.

Which of the following would satisfy the requirement?

Options:

A.

NIDS


B.

NIPS


C.

WAF


D.

Reverse proxy


Expert Solution
Questions # 89:

A security engineer has been asked to close all non-secure connections from the corporate network. The engineer is attempting to understand why the corporate UTM will not allow users to download email via IMAPS. The engineer formulates a theory and begins testing by creating the firewall ID 58, and users are able to download emails correctly by using IMAP instead. The network comprises three VLANs:

Question # 89

The security engineer looks at the UTM firewall rules and finds the following:

Question # 89

Which of the following should the security engineer do to ensure IMAPS functions properly on the corporate user network?

Options:

A.

Contact the email service provider and ask if the company IP is blocked.


B.

Confirm the email server certificate is installed on the corporate computers.


C.

Make sure the UTM certificate is imported on the corporate computers.


D.

Create an IMAPS firewall rule to ensure email is allowed.


Expert Solution
Questions # 90:

A company is preparing to deploy a global service.

Which of the following must the company do to ensure GDPR compliance? (Choose two.)

Options:

A.

Inform users regarding what data is stored.


B.

Provide opt-in/out for marketing messages.


C.

Provide data deletion capabilities.


D.

Provide optional data encryption.


E.

Grant data access to third parties.


F.

Provide alternative authentication techniques.


Expert Solution
Viewing page 6 out of 13 pages
Viewing questions 76-90 out of questions