Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions
Questions # 1:

Asoftware company deployed a new application based on its internal code repository Several customers are reporting anti-malware alerts on workstations used to test the application Which of the following is the most likely cause of the alerts?

Options:

A.

Misconfigured code commit


B.

Unsecure bundled libraries


C.

Invalid code signing certificate


D.

Data leakage


Expert Solution
Questions # 2:

A SOC analyst is investigating an event in which a penetration tester was able to successfully create and execute a payload. The analyst pulls the following command history from the affected server-

Question # 2

Which of the following should the analyst implement lo improve the security of the server?

Options:

A.

Kernel-supported ASLR controls


B.

Application controls with allow lists


C.

OS restrictions of globally writable folders


D.

EDR signatures that terminate specific processes


Expert Solution
Questions # 3:

Which of the following tests explains why AI output could be inaccurate?

Options:

A.

Model poisoning


B.

Social engineering


C.

Output handling


D.

Prompt injections


Expert Solution
Questions # 4:

A compliance officer is reviewing the data sovereignty laws in several countries where the organization has no presence Which of the following is the most likely reason for reviewing these laws?

Options:

A.

The organization is performing due diligence of potential tax issues.


B.

The organization has been subject to legal proceedings in countries where it has a presence.


C.

The organization is concerned with new regulatory enforcement in other countries


D.

The organization has suffered brand reputation damage from incorrect media coverage


Expert Solution
Questions # 5:

During a security review for the CI/CD process, a security engineer discovers the following information in a testing repository from the company:

Question # 5

Which of the following options is the best countermeasure to prevent this issue in the future?

Options:

A.

Performing an application penetration test over the testing environment before moving to production


B.

Changing the repository technology to avoid inclusion of confidential information


C.

Automating the upload process of code to the repository and improving the software development life cycle


D.

Using a secrets management platform to share and manage confidential information


Expert Solution
Questions # 6:

Engineers at a cloud service provider can now access newly deployed customer environments from their personal laptops. The engineers are concerned that unmanaged systems may present unknown vulnerabilities to customer environments, which might become a significant liability to the service provider. Which of the following deployments provides the most secure solution to prevent access through non-authorized endpoints?

Options:

A.

Modifying MDM policies to provide device attestation on all devices connecting to the cloud service's management console


B.

Requiring that a corporate-licensed and -managed EDR solution is installed on employee-owned laptops


C.

Configuring the device's certificate-based authentication on the corporate VPN and requiring that all activity in customer environments be performed using the VPN


D.

Implementing host checking on remote desktop sessions to jump boxes used for managing customer environments


Expert Solution
Questions # 7:

Recent repents indicate that a software tool is being exploited Attackers were able to bypass user access controls and load a database. A security analyst needs to find the vulnerability and recommend a mitigation. The analyst generates the following output:

Question # 7

Which of the following would the analyst most likely recommend?

Options:

A.

Installing appropriate EDR tools to block pass-the-hash attempts


B.

Adding additional time to software development to perform fuzz testing


C.

Removing hard coded credentials from the source code


D.

Not allowing users to change their local passwords


Expert Solution
Questions # 8:

Due to locality and budget constraints, an organization’s satellite office has a lower bandwidth allocation than other offices. As a result, the local securityinfrastructure staff is assessing architectural options that will help preserve network bandwidth and increase speed to both internal and external resources while not sacrificing threat visibility. Which of the following would be the best option to implement?

Options:

A.

Distributed connection allocation


B.

Local caching


C.

Content delivery network


D.

SD-WAN vertical heterogeneity


Expert Solution
Questions # 9:

After an organization met with its ISAC, the organization decided to test the resiliency of its security controls against a small number of advanced threat actors. Which of the following will enable the security administrator to accomplish this task?

Options:

A.

Adversary emulation


B.

Reliability factors


C.

Deployment of a honeypot


D.

Internal reconnaissance


Expert Solution
Questions # 10:

A building camera is remotely accessed and disabled from the remote console application during off-hours. A security analyst reviews the following logs:

Question # 10

A security architect is onboarding a new EDR agent on servers that traditionally do not have internet access. In order for the agent to receive updates and report back to the management console, some changes must be made. Which of the following should the architect do to best accomplish this requirement? (Select two).

Options:

A.

Create a firewall rule to only allow traffic from the subnet to the internet via a proxy.


B.

Configure a proxy policy that blocks all traffic on port 443.


C.

Configure a proxy policy that allows only fully qualified domain names needed to communicate to a portal.


D.

Create a firewall rule to only allow traffic from the subnet to the internet via port 443.


E.

Create a firewall rule to only allow traffic from the subnet to the internet to fully qualified names that are not identified as malicious by the firewall vendor.


F.

Configure a proxy policy that blocks only lists of known-bad, fully qualified domain names.


Expert Solution
Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions