Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

A global organization wants to manage all endpoint and user telemetry. The organization also needs to differentiate this data based on which office it is correlated to. Which of the following strategies best aligns with this goal?

Options:

A.

Sensor placement


B.

Data labeling


C.

Continuous monitoring


D.

Centralized logging


Expert Solution
Questions # 12:

An organization found a significant vulnerability associated with a commonly used package in a variety of operating systems. The organization develops a registry of software dependencies to facilitate incident response activities. As part of the registry, the organization creates hashes of packages that have been formally vetted. Which of the following attack vectors does this registry address?

Options:

A.

Supply chain attack B. Cipher substitution attack C. Side-channel analysis D. On-path attack E. Pass-the-hash attack


Expert Solution
Questions # 13:

A company updates itscloud-based services by saving infrastructure code in a remote repository. The code is automatically deployed into the development environment every time the code is saved lo the repository The developers express concern that the deployment often fails, citing minor code issues and occasional security control check failures in the development environment Which of the following should a security engineer recommend to reduce the deployment failures? (Select two).

Options:

A.

Software composition analysis


B.

Pre-commit code linting


C.

Repository branch protection


D.

Automated regression testing


E.

Code submit authorization workflow


F.

Pipeline compliance scanning


Expert Solution
Questions # 14:

A security analyst is reviewingsuspicious log-in activity and sees the following data in the SICM:

Question # 14

Which of the following is the most appropriate action for the analyst to take?

Options:

A.

Update the log configuration settings on the directory server that Is not being captured properly.


B.

Have the admin account owner change their password to avoid credential stuffing.


C.

Block employees from logging in to applications that are not part of their business area.


D.

implement automation to disable accounts that nave been associated with high-risk activity.


Expert Solution
Questions # 15:

An organization currently has IDS, firewall, and DLP systems in place. The systems administrator needs to integrate the tools in the environment to reduce response time. Which of the following should the administrator use?

Options:

A.

SOAR


B.

CWPP


C.

XCCDF


D.

CMDB


Expert Solution
Questions # 16:

During a forensic review of a cybersecurity incident, a security engineer collected a portion of the payload used by an attacker on a comprised web server Given the following portion of the code:

Question # 16

Which of the following best describes this incident?

Options:

A.

XSRF attack


B.

Command injection


C.

Stored XSS


D.

SQL injection


Expert Solution
Questions # 17:

A company wants to install a three-tier approach to separate the web. database, and application servers A security administrator must harden the environment which of the following is the best solution?

Options:

A.

Deploying a VPN to prevent remote locations from accessing server VLANs


B.

Configuring a SASb solution to restrict users to server communication


C.

Implementing microsegmentation on the server VLANs


D.

installing a firewall and making it the network core


Expert Solution
Questions # 18:

The identity and access management team is sending logs to the SIEM for continuous monitoring. The deployed log collector isforwarding logs to

the SIEM. However, only false positive alerts are being generated. Which of the following is the most likely reason for the inaccurate alerts?

Options:

A.

The compute resources are insufficient to support the SIEM


B.

The SIEM indexes are 100 large


C.

The data is not being properly parsed


D.

The retention policy is not property configured


Expert Solution
Questions # 19:

Which of the following security risks should be considered as an organization reduces cost and increases availability of services by adopting serverless computing?

Options:

A.

Level of control and influence governments have over cloud service providers


B.

Type of virtualization or emulation technology used in the provisioning of services


C.

Vertical scalability of the infrastructure underpinning the serverless offerings


D.

Use of third-party monitoring of service provisioning and configurations


Expert Solution
Questions # 20:

An organization recently implemented a policy that requires all passwords to be rotated every 90 days. An administrator observes a large volume of failed sign-on logs from multiple servers that are often accessed by users. The administrator determines users are disconnecting from the RDPsession but not logging off. Which of the following should the administrator do to prevent account lockouts?

Options:

A.

Increase the account lockout threshold.


B.

Enforce password complexity.


C.

Automate logout of inactive sessions.


D.

Extend the allowed session length.


Expert Solution
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions