Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following security risks should be considered as an organization reduces cost and increases availability of services by adopting serverless computing?

Options:

A.

Level of control and influence governments have over cloud service providers


B.

Type of virtualization or emulation technology used in the provisioning of services


C.

Vertical scalability of the infrastructure underpinning the serverless offerings


D.

Use of third-party monitoring of service provisioning and configurations


Expert Solution
Questions # 2:

An organization currently has IDS, firewall, and DLP systems in place. The systems administrator needs to integrate the tools in the environment to reduce response time. Which of the following should the administrator use?

Options:

A.

SOAR


B.

CWPP


C.

XCCDF


D.

CMDB


Expert Solution
Questions # 3:

An organization recently implemented a purchasing freeze that has impacted endpoint life-cycle management efforts. Which of the following should a security manager do to reduce risk without replacing the endpoints?

Options:

A.

Remove unneeded services


B.

Deploy EDR


C.

Dispose of end-of-support devices


D.

Reimage the system


Expert Solution
Questions # 4:

During a recentsecurity event, access from thenon-production environment to the production environmentenabledunauthorized usersto:

Installunapproved software

Makeunplanned configuration changes

During theinvestigation, the following findings were identified:

Several new users were added in bulkby theIAM team

Additionalfirewalls and routerswere recently added

Vulnerability assessmentshave been disabled formore than 30 days

Theapplication allow listhas not been modified intwo weeks

Logs were unavailablefor various types of traffic

Endpoints have not been patchedinover ten days

Which of the following actions would most likely need to be taken toensure proper monitoring?(Select two)

Options:

A.

Disable bulk user creationsby the IAM team


B.

Extend log retention for all security and network devices to180 daysfor all traffic


C.

Review the application allow listdaily


D.

Routinely update allendpoints and network devicesas soon as new patches/hot fixes are available


E.

Ensure allnetwork and security devicesare sending relevant data to theSIEM


F.

Configure firewall rules toonly allow production-to-non-productiontraffic


Expert Solution
Questions # 5:

A social media company wants to change encryption ciphers after identifying weaknesses in the implementation of the existing ciphers. The company needs the new ciphers to meet the following requirements:

• Utilize less RAM than competing ciphers.

• Be more CPU-efficient than previous ciphers.

• Require customers to use TLS 1.3 while broadcasting video or audio.

Which of the following is the best choice for the social media company?

Options:

A.

IDEA-CBC


B.

AES-GCM


C.

ChaCha20-Poly1305


D.

Camellia-CBC


Expert Solution
Questions # 6:

A company is adopting microservice architecture in order to quickly remediate vulnerabilities and deploy to production. All of the microservices run on the same Linux platform. Significant time was spent updating the base OS before deploying code. Which of the following should the company do to make the process efficient?

Options:

A.

Use Terraform scripts while creating golden images


B.

Create a cron job to run apt-update every 30 days.


C.

Use snapshots to deploy code to existing compute instances.


D.

Deploy a centralized update server.


Expert Solution
Questions # 7:

A large organization deployed a generative AI platform for its global user population to use. Based on feedback received during beta testing, engineers have identified issues with user interface latency and page-loading performance for international users. The infrastructure is currently maintained within two separate data centers, which are connected using high-availability networking and load balancers. Which of the following is the best way to address the performance issues?

Options:

A.

Configuring the application to use a CDN


B.

Implementing RASP to enable large language models queuing


C.

Remote journaling within a third data center


D.

Traffic shaping through the use of a SASE


Expert Solution
Questions # 8:

A security architect wants to configure a mail server so it maintains an updated list of IoCs and blocks known-malicious incoming emails. Which of the following will the security architect most likely need for this task? (Select two)

Options:

A.

Log analyzer


B.

Threat feed API


C.

Scheduled task


D.

Webhooks


E.

Inbox deletion code


F.

Security runbook


Expert Solution
Questions # 9:

A company that uses several cloud applications wants to properly identify:

All the devices potentially affected by a given vulnerability.

All the internal servers utilizing the same physical switch.

The number of endpoints using a particular operating system.Which of the following is the best way to meet the requirements?

Options:

A.

SBoM


B.

CASB


C.

GRC


D.

CMDB


Expert Solution
Questions # 10:

A cybersecurity architect seeks to improve vulnerability management and orchestrate a large number of vulnerability checks. Key constraints include:

. There are 512 containerized microservices.

. Vulnerability data is sourced from multiple scanners.

. CIS baselines must be enforced.

. Scan activity must be scheduled.

Which of the following automation workflows best meets this objective?

Options:

A.

Employing an endpoint data collection system


B.

Deploying an XCCDF scanner


C.

Utilizing CVSS reports for SOC analysts


D.

Using a repository scanner to enforce laC security


Expert Solution
Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions