Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions
Questions # 91:

Company A and Company D ate merging Company A's compliance reports indicate branchprotections are not in place A security analyst needs to ensure that potential threats to the software development life cycle are addressed. Which of the following should me analyst cons

Options:

A.

If developers are unable to promote to production


B.

If DAST code is being stored to a single code repository


C.

If DAST scans are routinely scheduled


D.

If role-based training is deployed


Expert Solution
Questions # 92:

A company recentlyexperienced aransomware attack. Although the company performssystems and data backupon a schedule that aligns with itsRPO (Recovery Point Objective) requirements, thebackup administratorcould not recovercritical systems and datafrom its offline backups to meet the RPO. Eventually, the systems and data were restored with information that wassix months outside of RPO requirements.

Which of the following actions should the company take to reduce the risk of a similar attack?

Options:

A.

Encrypt and label the backup tapes with the appropriate retention schedule before they are sent to the off-site location.


B.

Implement a business continuity process that includes reverting manual business processes.


C.

Perform regular disaster recovery testing of IT and non-IT systems and processes.


D.

Carry out a tabletop exercise to update and verify the RACI matrix with IT and critical business functions.


Expert Solution
Questions # 93:

During a recent security event, access from the non-production environment to the production environment enabled unauthorized users to install unapproved software and make unplanned configuration changes. During an investigation, the following findings are identified:

• Several new users were added in bulk by the IAM team.

• Additional firewalls and routers were recently added to the network.

• Vulnerability assessments have been disabled for all devices for more than 30 days.

• The application allow list has not been modified in more than two weeks.

• Logs were unavailable for various types of traffic.

• Endpoints have not been patched in more than ten days.

Which of the following actions would most likely need to be taken to ensure proper monitoring is in place within the organization? (Select two)

Options:

A.

Disable bulk user creations by the IAM team.


B.

Extend log retention for all security and network devices for 180 days for all traffic.


C.

Review the application allow list on a daily basis to make sure it is properly configured.


D.

Routinely update all endpoints and network devices as soon as new patches/hot fixes are available.


E.

Ensure all network and security devices are sending relevant data to the SIEM.


F.

Configure rules on all firewalls to only allow traffic from the production environment to the non-production environment.


Expert Solution
Questions # 94:

A security engineer must resolve a vulnerability in a deprecated version of Python for a custom-developed flight simul-ation application that is monitored and controlled remotely. The source code is proprietary and built with Python functions running on the Ubuntu operating system. Version control is not enabled for the application in development or production. However, the application must remain online in the production environment using built-in features. Which of the following solutions best reduces theattack surface of these issues and meets the outlined requirements?

Options:

A.

Configure code-signing within the CI/CD pipeline, update Python with aptitude, and update modules with pip in a test environment. Deploy the solution to production.


B.

Enable branch protection in the GitHub repository. Update Python with aptitude, and update modules with pip in a test environment. Deploy the solution to production.


C.

Use an NFS network share. Update Python with aptitude, and update modules with pip in a test environment. Deploy the solution to production.


D.

Configure version designation within the Python interpreter. Update Python with aptitude, and update modules with pip in a test environment. Deploy the solution to production.


Expert Solution
Questions # 95:

Based on the results of a SAST report on a legacy application, a security engineer is reviewing the following snippet of code flagged as vulnerable:

Which of the following is the vulnerable line of code that must be changed?

Question # 95

Options:

A.

Line (02]


B.

Line [04]


C.

Line [07]


D.

Line 108]


E.

Line [10]


Expert Solution
Questions # 96:

A company wants to install a three-tier approach to separate the web. database, and application servers A security administrator must harden the environment which of the following is the best solution?

Options:

A.

Deploying a VPN to prevent remote locations from accessing server VLANs


B.

Configuring a SASb solution to restrict users to server communication


C.

Implementing microsegmentation on the server VLANs


D.

installing a firewall and making it the network core


Expert Solution
Questions # 97:

A company is adopting microservice architecture in order to quickly remediate vulnerabilities and deploy to production. All of the microservices run on the same Linux platform. Significant time was spent updating the base OS before deploying code. Which of the following should the company do to make the process efficient?

Options:

A.

Use Terraform scripts while creating golden images


B.

Create a cron job to run apt-update every 30 days.


C.

Use snapshots to deploy code to existing compute instances.


D.

Deploy a centralized update server.


Expert Solution
Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions