Pass the CompTIA CompTIA CASP CAS-004 Questions and answers with CertsForce

Viewing page 8 out of 13 pages
Viewing questions 106-120 out of questions
Questions # 106:

A CRM company leverages a CSP PaaS service to host and publish its SaaS product. Recently, a large customer requested that all infrastructure components must meet strict regulatory requirements, including configuration management, patch management, and life-cycle management. Which of the following organizations is responsible for ensuring those regulatory requirements are met?

Options:

A.

The CRM company


B.

The CRM company's customer


C.

The CSP


D.

The regulatory body


Expert Solution
Questions # 107:

A security analyst received the following finding from a cloud security assessment tool:

Virtual Machine Data Disk is encrypted with the default encryption key.

Because the organization hosts highly sensitive data files, regulations dictate it must be encrypted so it is unreadable to the CSP. Which of the following should be implemented to remediate the finding and meet the regulatory requirement? (Select two).

Options:

A.

Disk encryption with customer-provided keys


B.

Disk encryption with keys from a third party


C.

Row-level encryption with a key escrow


D.

File-level encryption with cloud vendor-provided keys


E.

File-level encryption with customer-provided keys


F.

Disk-level encryption with a cross-signed certificate


Expert Solution
Questions # 108:

A web application server is running a legacy operating system with an unpatched RCE (Remote Code Execution) vulnerability. The server cannot be upgraded until the corresponding application code is updated. Which of the following compensating controls would prevent successful exploitation?

Options:

A.

Segmentation


B.

CASB


C.

HIPS


D.

UEBA


Expert Solution
Questions # 109:

PKI can be used to support security requirements in the change management process. Which of the following capabilities does PKI provide for messages?

Options:

A.

Non-repudiation


B.

Confidentiality


C.

Delivery receipts


D.

Attestation


Expert Solution
Questions # 110:

A company with customers in the United States and Europe wants to ensure its content is delivered to end users with low latency. Content includes both sensitive and public information. The company's data centers are located on the West Coast of the United States. Users on the East Coast of the United States and users in Europe are experiencing slow application response. Which of the following would allow the company to improve application response quickly?

Options:

A.

Installing reverse caching proxies in both data centers and implementing proxy auto scaling


B.

Using HTTPS to serve sensitive content and HTTP for public content


C.

Using colocation services in regions where the application response is slow


D.

Implementing a CDN and forcing all traffic through the CDN


Expert Solution
Questions # 111:

A major broadcasting company that requires continuous availability to streaming content needs to be resilient against DDoS attacks Which of the following is the MOST important infrastructure security design element to prevent an outage7

Options:

A.

Supporting heterogeneous architecture


B.

Leveraging content delivery network across multiple regions


C.

Ensuring cloud autoscaling is in place


D.

Scaling horizontally to handle increases in traffic


Expert Solution
Questions # 112:

An accounting team member received a voicemail message from someone who sounded like the Chief Financial Officer (CFO). In the voicemail message, the caller requested a wire transfer to a bank account the organization had not used before. Which of the following best describes this type of attack?

Options:

A.

The attacker used deepfake technology to simulate the CFO's voice.


B.

The CFO tried to commit a form of embezzlement.


C.

The attacker used caller ID spoofing to imitate the CFO's internal phone extension.


D.

The attacker successfully phished someone in the accounts payable department.


Expert Solution
Questions # 113:

A company just released a new video card. Due to limited supply and high demand, attackers are employing automated systems to purchase the device through the company's web store so they can resell it on the secondary market. The company's intended customers are frustrated. A security engineer suggests implementing aCAPTCHAsystem on the web store to help reduce thenumber of video cards purchased through automated systems. Which of the following now describes the level of risk?

Options:

A.

Inherent


B.

Low


C.

Mitigated


D.

Residual


E.

Transferred


Expert Solution
Questions # 114:

A large organization is planning to migrate from on premises to the cloud. The Chief Information Security Officer (CISO) is concerned about security responsibilities. If the company decides to migrate to the cloud, which of the following describes who is responsible for the security of the new physical datacenter?

Options:

A.

Third-party assessor


B.

CSP


C.

Organization


D.

Shared responsibility


Expert Solution
Questions # 115:

A security engineer is implementing DLP. Which of the following should the security engineer include in the overall DLP strategy?

Options:

A.

Tokenization


B.

Network traffic analysis


C.

Data classification


D.

Multifactor authentication


Expert Solution
Questions # 116:

A small bank is evaluating different methods to address and resolve the following requirements

" Must be able to store credit card data using the smallest amount of data possible

• Must be compliant with PCI DSS

• Must maintain confidentiality if one piece of the layer is compromised

Which of the following is the best solution for the bank?

Options:

A.

Scrubbing


B.

Tokenization


C.

Masking


D.

Homomorphic encryption


Expert Solution
Questions # 117:

A senior security analyst is helping the development team improve the security of an application that is being developed. The developers use third-party libraries and applications. The software in development used old, third-party packages that were not replaced before market distribution. Which of the following should be implemented into the SDLC to resolve the issue?

Options:

A.

Software composition analysis


B.

A SCAP scanner


C.

ASAST


D.

A DAST


Expert Solution
Questions # 118:

Which of the following best describes a risk associated with using facial recognition to locally authenticate to a mobile device?

Options:

A.

Data remanence


B.

Deepfake


C.

Metadata scraping


D.

Biometric impersonation


Expert Solution
Questions # 119:

A systems engineer needs to develop a solution that uses digital certificates to allow authentication to laptops. Which of the following authenticator types would be most appropriate for the engineer to include in the design?

Options:

A.

TOTP token


B.

Device certificate


C.

Smart card


D.

Biometric


Expert Solution
Questions # 120:

An analyst needs to evaluate all images and documents that are publicly shared on a website. Which of the following would be the best tool to evaluate the metadata of these files?

Options:

A.

OllyDbg


B.

ExifTool


C.

Volatility


D.

Ghidra


Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 106-120 out of questions