Pass the CompTIA CompTIA CASP CAS-004 Questions and answers with CertsForce

Viewing page 9 out of 13 pages
Viewing questions 121-135 out of questions
Questions # 121:

During a network defense engagement, a red team is able to edit the following registry key:

Question # 121

Which of the following tools is the red team using to perform this action?

Options:

A.

PowerShell


B.

SCAP scanner


C.

Network vulnerability scanner


D.

Fuzzer


Expert Solution
Questions # 122:

A network administrator who manages a Linux web server notices the following traffic:

http://corr.ptia.org/.../.../.../... /etc./shadow

Which of the following Is the BEST action for the network administrator to take to defend against this type of web attack?

Options:

A.

Validate the server certificate and trust chain.


B.

Validate the server input and append the input to the base directory path.


C.

Validate that the server is not deployed with default account credentials.


D.

Validate that multifactor authentication is enabled on the server for all user accounts.


Expert Solution
Questions # 123:

A security administrator wants to enable a feature that would prevent a compromised encryption key from being used to decrypt all the VPN traffic. Which of the following should the security administrator use?

Options:

A.

Salsa20 cipher


B.

TLS-based VPN


C.

PKI-based IKE IPSec negotiation


D.

Perfect forward secrecy


Expert Solution
Questions # 124:

A security engineer is creating a single CSR for the following web server hostnames:

• wwwint internal

• www company com

• home.internal

• www internal

Which of the following would meet the requirement?

Options:

A.

SAN


B.

CN


C.

CA


D.

CRL


E.

Issuer


Expert Solution
Questions # 125:

A company that provides services to clients who work with highly sensitive data would like to provide assurance that the data’s confidentiality is maintained in a dynamic, low-risk environment. Which of the following would best achieve this goal? (Select two).

Options:

A.

Install a SOAR on all endpoints.


B.

Hash all files.


C.

Install SIEM within a SOC.


D.

Encrypt all data and files at rest, in transit, and in use.


E.

Configure SOAR to monitor and intercept files and data leaving the network.


F.

Implement file integrity monitoring.


Expert Solution
Questions # 126:

Signed applications reduce risks by:

Options:

A.

encrypting the application's data on the device.


B.

requiring the developer to use code-level hardening techniques.


C.

providing assurance that the application is using unmodified source code.


D.

costing the developer money to publish, which reduces the likelihood of malicious intent.


Expert Solution
Questions # 127:

A Chief Information Security Officer is concerned about the condition of the code security being used for web applications. It is important to get the review right the first time, and the company is willing to use a tool that will allow developers to validate code as it is written. Which of the following methods should the company use?

Options:

A.

SAST


B.

DAST


C.

Fuzz testing


D.

Intercepting proxy


Expert Solution
Questions # 128:

Which of the following should an organization implement to prevent unauthorized API key sharing?

Options:

A.

OTP


B.

Encryption


C.

API gateway


D.

HSM


Expert Solution
Questions # 129:

A security analyst is examining a former employee's laptop for suspected evidence of suspicious activity. The analyst usesddduring the investigation. Which of the following best explains why the analyst is using this tool?

Options:

A.

To capture an image of the hard drive


B.

To reverse engineer binary programs


C.

To recover deleted logs from the laptop


D.

To deduplicate unnecessary data from the hard drive


Expert Solution
Questions # 130:

A company is developing a new service product offering that will involve the storage of personal health information. The Chief Information Security Officer (CISO) is researching the relevant compliance regulations. Which of the following best describes the CISO's action?

Options:

A.

Data retention


B.

Data classification


C.

Due diligence


D.

Reference framework


Expert Solution
Questions # 131:

A control systems analyst is reviewing the defensive posture of engineering workstations on the shop floor. Upon evaluation, the analyst makes the following observations:

• Unsupported, end-of-life operating systems were still prevalent on the shop floor.

• There are no security controls for systems with supported operating systems.

• There is little uniformity of installed software among the workstations.

Which of the following would have the greatest impact on the attack surface?

Options:

A.

Deploy antivirus software to all of the workstations.


B.

Increase the level of monitoring on the workstations.


C.

Utilize network-based allow and block lists.


D.

Harden all of the engineering workstations using a common strategy.


Expert Solution
Questions # 132:

When managing and mitigating SaaS cloud vendor risk, which of the following responsibilities belongs to the client?

Options:

A.

Data


B.

Storage


C.

Physical security


D.

Network


Expert Solution
Questions # 133:

To bring digital evidence in a court of law the evidence must be:

Options:

A.

material


B.

tangible


C.

consistent


D.

conserved


Expert Solution
Questions # 134:

A forensic investigator started the process of gathering evidence on a laptop in response to an incident The investigator took a snapshof of the hard drive, copied relevant log files and then performed a memory dump Which of the following steps in the process should have occurred first?

Options:

A.

Preserve secure storage


B.

Clone the disk.


C.

Collect the most volatile data


D.

Copy the relevant log files


Expert Solution
Questions # 135:

A security administrator needs to implement a security solution that will

• Limit the attack surface in case of an incident

• Improve access control for external and internal network security.

• Improve performance with less congestion on network traffic

Which of the following should the security administrator do?

Options:

A.

Integrate threat intelligence feeds into the FIM


B.

Update firewall rules to match new IP addresses in use


C.

Configure SIEM dashboards to provide alerts and visualizations


D.

Deploy DLP rules based on updated Pll formatting


Expert Solution
Viewing page 9 out of 13 pages
Viewing questions 121-135 out of questions