Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions
Questions # 11:

A pharmaceutical lab hired a consultant to identify potential risks associated with Building 2, a new facility that is under construction. The consultant received the IT project plan, which includes the following VLAN design:

Question # 11

Which of the following TTPs should the consultant recommend be addressed first?

Options:

A.

Zone traversal


B.

Unauthorized execution


C.

Privilege escalation


D.

Lateral movement


Expert Solution
Questions # 12:

A security officer performs due diligence activities before implementing a third-party solution into the enterprise environment. The security officer needs evidence from the third party that a data subject access request handling process is in place. Which of the following is the security officer most likely seeking to maintain compliance?

Options:

A.

Information security standards


B.

E-discovery requirements


C.

Privacy regulations


D.

Certification requirements


E.

Reporting frameworks


Expert Solution
Questions # 13:

A security engineer reviews an after action report from a previous security breach and notes a long lag time between detection and containment of a compromised account. The engineer suggests using SOAR to address this concern. Which of the following best explains the engineer ' s goal?

Options:

A.

To prevent accounts from being compromised


B.

To enable log correlation using machine learning


C.

To orchestrate additional reporting for the security operations center


D.

To prepare runbooks to automate future incident response


Expert Solution
Questions # 14:

A security engineer is given the following requirements:

• An endpoint must only execute Internally signed applications

• Administrator accounts cannot install unauthorized software.

• Attempts to run unauthorized software must be logged

Which of the following best meets these requirements?

Options:

A.

Maintaining appropriate account access through directory management and controls


B.

Implementing a CSPM platform to monitor updates being pushed to applications


C.

Deploying an EDR solution to monitor and respond to software installation attempts


D.

Configuring application control with blocked hashes and enterprise-trusted root certificates


Expert Solution
Questions # 15:

A security engineer wants to stay up-to-date on new detections that are released on a regular basis. The engineer ' s organization uses multiple tools rather than one specific vendor security stack. Which of the following rule-based languages is the most appropriate to use as a baseline for detection rules with the multiple security tool setup?

Options:

A.

Sigma


B.

YARA


C.

Snort


D.

Rita


Expert Solution
Questions # 16:

A security engineer performed a code scan that resulted in many false positives. The security engineer must find asolution that improves the quality of scanning results before application deployment. Which of the following is the best solution?

Options:

A.

Limiting the tool to a specific coding language and tuning the rule set


B.

Configuring branch protection rules and dependency checks


C.

Using an application vulnerability scanner to identify coding flaws in production


D.

Performing updates on code libraries before code development


Expert Solution
Questions # 17:

A security engineer needs to create multiple servers in a company ' s private cloud. The servers should have a virtual network infrastructure that supports connectivity, as well as security configurations applied using predefined templates. Which of the following is the best option for the security engineer to consider for the deployment?

Options:

A.

Installing a container orchestration solution locally, configuring the infrastructure, and cloning the solution


B.

Creating templates on the cloud provider marketplace and modeling the solution using those templates


C.

Using Terraform to implement an infrastructure as code model with the existing private cloud solution


D.

Integrating the cloud provider API to the CI/CD pipeline model used by the company


Expert Solution
Questions # 18:

Developers have been creating and managing cryptographic material on their personal laptops fix use in production environment. A security engineer needs to initiate a more secure process. Which of thefollowing is the best strategy for the engineer to use?

Options:

A.

Disabling the BIOS and moving to UEFI


B.

Managing secrets on the vTPM hardware


C.

Employing shielding lo prevent LMI


D.

Managing key material on a HSM


Expert Solution
Questions # 19:

A systems administrator works with engineers to process and address vulnerabilities as a result of continuous scanning activities. The primary challenge faced by the administrator is differentiating between valid and invalid findings. Which of the following would the systems administrator most likely verify is properly configured?

Options:

A.

Report retention time


B.

Scanning credentials


C.

Exploit definitions


D.

Testing cadence


Expert Solution
Questions # 20:

A security analyst receives the following SIEM alert for review:

Time | Event

03/07/2025 UTC 13:54:06 | MACHINE: hr_talent_01.corp.local " cd " SUCCESS

03/07/2025 UTC 13:54:07 | MACHINE: hr_talent_01.corp.local " cd ../../ " SUCCESS

03/07/2025 UTC 13:54:08 | MACHINE: hr_talent_01.corp.local " sudo cat /etc/shadow " SUCCESS

Which of the following best describes the incident that occurred on the device?

Options:

A.

A file injection attack occurred on the device.


B.

An attacker viewed password hashes on the device.


C.

A sensitive file was exfiltrated from the device.


D.

A directory traversal attack occurred on the device.


Expert Solution
Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions