Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

A security engineer needs 10 secure the OT environment based on me following requirements

• Isolate the OT network segment

• Restrict Internet access.

• Apply security updates two workstations

• Provide remote access to third-party vendors

Which of the following design strategies should the engineer implement to best meetthese requirements?

Options:

A.

Deploy a jump box on the third party network to access the OT environment and provide updates using a physical delivery method on the workstations


B.

Implement a bastion host in the OT network with security tools in place to monitor access and use a dedicated update server for the workstations.


C.

Enable outbound internet access on the OT firewall to any destination IP address and use the centralized update server for the workstations


D.

Create a staging environment on the OT network for the third-party vendor to access and enable automatic updates on the workstations.


Expert Solution
Questions # 2:

A security review revealed that not all of the client proxy traffic is being captured. Which of the following architectural changes best enables the capture of traffic for analysis?

Options:

A.

Adding an additional proxy server to each segmented VLAN


B.

Setting up a reverse proxy for client logging at the gateway


C.

Configuring a span port on the perimeter firewall to ingest logs


D.

Enabling client device logging and system event auditing


Expert Solution
Questions # 3:

A security officer received several complaints from usersabout excessive MPA push notifications at night The security team investigates and suspects malicious activities regarding user account authentication Which of the following is the best way for the security officer to restrict MI~A notifications''

Options:

A.

Provisioning FID02 devices


B.

Deploying a text message based on MFA


C.

Enabling OTP via email


D.

Configuring prompt-driven MFA


Expert Solution
Questions # 4:

A company undergoing digital transformation is reviewing the resiliency of a CSP and is concerned about meeting SLA requirements in the event of a CSP incident. Which of the following would be best to proceed with the transformation?

Options:

A.

An on-premises solution as a backup


B.

A load balancer with a round-robin configuration


C.

A multicloud provider solution


D.

An active-active solution within the same tenant


Expert Solution
Questions # 5:

Asoftware company deployed a new application based on its internal code repository Several customers are reporting anti-malware alerts on workstations used to test the application Which of the following is the most likely cause of the alerts?

Options:

A.

Misconfigured code commit


B.

Unsecure bundled libraries


C.

Invalid code signing certificate


D.

Data leakage


Expert Solution
Questions # 6:

A pharmaceutical lab hired a consultant to identify potential risks associated with Building 2, a new facility that is under construction. The consultant received the IT project plan, which includes the following VLAN design:

Question # 6

Which of the following TTPs should the consultant recommend be addressed first?

Options:

A.

Zone traversal


B.

Unauthorized execution


C.

Privilege escalation


D.

Lateral movement


Expert Solution
Questions # 7:

A company's help desk is experiencing a large number of calls from the finance department slating access issues to www bank com The security operations center reviewed the following security logs:

Question # 7

Which of the following is most likely the cause of the issue?

Options:

A.

Recursive DNS resolution is failing


B.

The DNS record has been poisoned.


C.

DNS traffic is being sinkholed.


D.

The DNS was set up incorrectly.


Expert Solution
Questions # 8:

A security analyst is using data provided from a recent penetration test to calculate CVSS scores to prioritize remediation. Which of the following metric groups would the analyst need to determine to get the overall scores? (Select three).

Options:

A.

Temporal


B.

Availability


C.

Integrity


D.

Confidentiality


E.

Base


F.

Environmental


G.

Impact


Expert Solution
Questions # 9:

A company that uses containers to run its applications is required to identify vulnerabilities on every container image in a private repository The security team needs to be able to quickly evaluate whether to respond to a given vulnerability Which of the following, will allow the security team to achieve the objective with the last effort?

Options:

A.

SAST scan reports


B.

Centralized SBoM


C.

CIS benchmark compliance reports


D.

Credentialed vulnerability scan


Expert Solution
Questions # 10:

During a security assessment using an CDR solution, a security engineer generates the following report about the assets in me system:

Question # 10

After five days, the EDR console reports an infection on the host 0WIN23 by a remote access Trojan Which of the following is the most probable cause of the infection?

Options:

A.

OW1N23 uses a legacy version of Windows that is not supported by the EDR


B.

LN002 was not supported by the EDR solution and propagates the RAT


C.

The EDR has an unknown vulnerability that was exploited by the attacker.


D.

0W1N29 spreads the malware through other hosts in the network


Expert Solution
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions