Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions
Questions # 11:

A security engineer needs to create multiple servers in a company's private cloud. The servers should have a virtual network infrastructure that supports connectivity, as well as security configurations applied using predefined templates. Which of the following is the best option for the security engineer to consider for the deployment?

Options:

A.

Installing a container orchestration solution locally, configuring the infrastructure, and cloning the solution


B.

Creating templates on the cloud provider marketplace and modeling the solution using those templates


C.

Using Terraform to implement an infrastructure as code model with the existing private cloud solution


D.

Integrating the cloud provider API to the CI/CD pipeline model used by the company


Expert Solution
Questions # 12:

A company is migrating from a Windows Server to Linux-based servers. A security engineer must deploy a configuration management solution that maintains security software across all the Linux servers. Which of the following configuration file snippets is the most appropriate to use?

Options:

A.

--- - name: deployment hosts: linux_servers remote_user: root tasks: - name: Install security software ansible.builtin.apt:


B.

linux_servers Linux 3.1 true com.canonical.io


C.

{"name":"deployment", "hosts":"linux_servers", "remote_user":"Administrator", "tasks":{"name":"Install security software", "com.microsoft.store.latest"} }


D.

{"task":"install", "hosts":"linux_servers", "remote_user":"root", "se_linux":"false", "application":"AppX"}


Expert Solution
Questions # 13:

A security engineer wants to reduce the attack surface of a public-facing containerized application Which of the following will best reduce the application's privilege escalation attack surface?

Options:

A.

Implementing the following commands in the Dockerfile:RUN echo user:x:1000:1000iuser:/home/user:/dew/null > /ete/passwd


B.

Installing an EDR on the container's host with reporting configured to log to a centralized SIFM and Implementing the followingalerting rules TF PBOCESS_USEB=rooC ALERT_TYPE=critical


C.

Designing a muiticontainer solution, with one set of containers that runs the mam application, and another set oi containers that perform automatic remediation by replacing compromised containers or disabling compromised accounts


D.

Running the container in an isolated network and placing a load balancer in a public-facing network. Adding the following ACL to the load balancer:PZRKZI HTTES from 0-0.0.0.0/0 pert 443


Expert Solution
Questions # 14:

A company must meet the following security requirements when implementing controls in order to be compliant with government policy:

• Access to the system document repository must be MFA enabled.

• Ongoing risk monitoring must be displayed on a system dashboard.

• Staff must receive email notifications about periodic tasks.

Which of the following best meets all of these requirements?

Options:

A.

Implementing a GRC tool


B.

Configuring a privileged access management system


C.

Launching a vulnerability management program


D.

Creating a risk register


Expert Solution
Questions # 15:

A web application server that provides services to hybrid modern and legacy financial applications recently underwent a scheduled upgrade to update common libraries, including OpenSSL. Multiple users are now reporting failed connection attempts to the server. The technician performing initial triage identified the following:

• Client applications more than five years old appear to be the most affected.

• Web server logs show initial connection attempts by affected hosts.

• For the failed connections, logs indicate "cipher unavailable."

Which of the following is most likely to safely remediate this situation?

Options:

A.

The server needs to be configured for backward compatibility to SSL 3.0 applications.


B.

The client applications need to be modified to support AES in Galois/Counter Mode or equivalent.


C.

The client TLS configuration must be set to enforce electronic codebook modes of operation.


D.

The server-side digital signature algorithm needs to be modified to support elliptic curve cryptography.


Expert Solution
Questions # 16:

A security analyst is using data provided from a recent penetration test to calculate CVSS scores to prioritize remediation. Which of the following metric groups would the analyst need to determine to get the overall scores? (Select three).

Options:

A.

Temporal


B.

Availability


C.

Integrity


D.

Confidentiality


E.

Base


F.

Environmental


G.

Impact


Expert Solution
Questions # 17:

A network security architect for an organization with a highly remote workforce implements an always-on VPN to meet business requirements. Which of the following best explains why the architect is using this approach?

Options:

A.

To facilitate device authentication using on-premises directory services


B.

To allow access to directly connected print and scan resources


C.

To enable usability of locally attached removable storage


D.

To authorize updates to change the PIN on a smart card


Expert Solution
Questions # 18:

A security engineer receives an alert from the SIEM platform indicating a possible malicious action on the internal network. The engineer generates a report that outputs the logs associated with the incident:

Question # 18

Which of the following actions best enables the engineer to investigate further?

Options:

A.

Consulting logs from the enterprise password manager


B.

Searching dark web monitoring resources for exposure


C.

Reviewing audit logs from privileged actions


D.

Querying user behavior analytics data


Expert Solution
Questions # 19:

A security engineer performed a code scan that resulted in many false positives. The security engineer must find asolution that improves the quality of scanning results before application deployment. Which of the following is the best solution?

Options:

A.

Limiting the tool to a specific coding language and tuning the rule set


B.

Configuring branch protection rules and dependency checks


C.

Using an application vulnerability scanner to identify coding flaws in production


D.

Performing updates on code libraries before code development


Expert Solution
Questions # 20:

An organization wants to create a threat model to identity vulnerabilities in its infrastructure. Which of the following, should be prioritized first?

Options:

A.

External-facing Infrastructure with known exploited vulnerabilities


B.

Internal infrastructure with high-seventy and Known exploited vulnerabilities


C.

External facing Infrastructure with a low risk score and no known exploited vulnerabilities


D.

External-facing infrastructure with a high risk score that can only be exploited with local access to the resource


Expert Solution
Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions