Pass the CompTIA CompTIA CASP CAS-004 Questions and answers with CertsForce

Viewing page 7 out of 13 pages
Viewing questions 91-105 out of questions
Questions # 91:

An organization is preparing to migrate its production environment systems from an on-premises environment to a cloud service. The lead security architect is concerned that the organization's current methods for addressing risk may not be possible in the cloud environment.

Which of the following BEST describes the reason why traditional methods of addressing risk may not be possible in the cloud?

Options:

A.

Migrating operations assumes the acceptance of all risk.


B.

Cloud providers are unable to avoid risk.


C.

Specific risks cannot be transferred to the cloud provider.


D.

Risks to data in the cloud cannot be mitigated.


Expert Solution
Questions # 92:

A vulnerability analyst identified a zero-day vulnerability in a company’s internally developed software. Since the current vulnerability management system does not have any checks for this vulnerability, an engineer has been asked to create one.

Which of the following would be BEST suited to meet these requirements?

Options:

A.

ARF


B.

ISACs


C.

Node.js


D.

OVAL


Expert Solution
Questions # 93:

A security engineer needs to recommend a solution that will meet the following requirements:

Identify sensitive data in the provider’s network

Maintain compliance with company and regulatory guidelines

Detect and respond to insider threats, privileged user threats, and compromised accounts

Enforce datacentric security, such as encryption, tokenization, and access control

Which of the following solutions should the security engineer recommend to address these requirements?

Options:

A.

WAF


B.

CASB


C.

SWG


D.

DLP


Expert Solution
Questions # 94:

A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.

The technician will define this threat as:

Options:

A.

a decrypting RSA using obsolete and weakened encryption attack.


B.

a zero-day attack.


C.

an advanced persistent threat.


D.

an on-path attack.


Expert Solution
Questions # 95:

After investigating a recent security incident, a SOC analyst is charged with creating a reference guide for the entire team to use. Which of the following should the analyst create to address future incidents?

Options:

A.

Root cause analysis


B.

Communication plan


C.

Runbook


D.

Lessons learned


Expert Solution
Questions # 96:

Which of the following technologies would need to be in an unmanaged state to perform forensic analysis on a laptop with an unknown encryption key?

Options:

A.

FIM


B.

ECC


C.

FTK


D.

TPM


Expert Solution
Questions # 97:

An employee's device was missing for 96 hours before being reported. The employee called the help desk to ask for another device Which of the following phases of the incident response cycle needs improvement?

Options:

A.

Containment


B.

Preparation


C.

Resolution


D.

Investigation


Expert Solution
Questions # 98:

Which of the following is the reason why security engineers often cannot upgrade the security of embedded facility automation systems?

Options:

A.

They are constrained by available compute.


B.

They lack X86-64 processors.


C.

They lack EEPROM.


D.

They are not logic-bearing devices.


Expert Solution
Questions # 99:

A security analyst is reviewing the following output from a vulnerability scan from an organization's internet-facing web services:

Question # 99

Which of the following indicates a susceptibility whereby an attacker can take advantage of the trust relationship between the client and the server?

Options:

A.

Line 06


B.

Line 10


C.

Line 13


D.

Line 17


Expert Solution
Questions # 100:

An analyst reviews the following output collected during the execution of a web application security assessment:

Question # 100

Which of the following attacks would be most likely to succeed, given the output?

Options:

A.

NULL and unauthenticated cipher downgrade attack


B.

Availability attack from manipulation of associated authentication data


C.

Padding oracle attack


D.

On-path forced renegotiation to insecure ciphers


Expert Solution
Questions # 101:

The information security manager at a 24-hour manufacturing facility is reviewing a contract for potential risks to the organization. The contract pertains to the support of printers and multifunction devices during non-standard business hours. Which of the following will the security manager most likely identify as a risk?

Options:

A.

Print configurations settings for locked print jobs


B.

The lack of an NDA with the company that supports its devices


C.

The lack of an MSA to govern other services provided by the service provider


D.

The lack of chain of custody for devices prior to deployment at the company


Expert Solution
Questions # 102:

A security technician is investigating a system that tracks inventory via a batch update each night. The technician is concerned that the system poses a risk to the business, as errors are occasionally generated and reported inventory appears incorrect. The following output log is provided:

Question # 102

The technician reviews the output of the batch job and discovers that the inventory was never less than zero, and the final inventory was 100 rather than 60. Which of the following should the technician do to resolve this issue?

Options:

A.

Ensure that the application is using memory-safe functions to prevent integer overflows.


B.

Recommend thread-safe processes in the code to eliminate race conditions.


C.

Require the developers to include exception handlers to accommodate out-of-bounds results.


D.

Move the batch processing from client side to server side to remove client processing inconsistencies.


Expert Solution
Questions # 103:

An IT director is working on a solution to meet the challenge of remotely managing laptop devices and securely locking them down. The solution must meet the following requirements:

• Cut down on patch management.

• Make use of standard configurations.

• Allow for custom resource configurations.

• Provide access to the enterprise system from multiple types of devices.

Which of the following would meet these requirements?

Options:

A.

MDM


B.

Emulator


C.

Hosted hypervisor


D.

VDI


Expert Solution
Questions # 104:

A company wants to use a process to embed a sign of ownership covertly inside a proprietary document without adding any identifying attributes. Which of the following would be best to use as part of the process to support copyright protections of the document?

Options:

A.

Steganography


B.

E-signature


C.

Watermarking


D.

Cryptography


Expert Solution
Questions # 105:

An organization performed a risk assessment and discovered that less than 50% of its employees have been completing security awareness training. Which of the following should the ChiefInformation Security Officer highlight as an area of Increased vulnerability in a report to the management team?

Options:

A.

Social engineering


B.

Third-party compromise


C.

APT targeting


D.

Pivoting


Expert Solution
Viewing page 7 out of 13 pages
Viewing questions 91-105 out of questions