Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions
Questions # 21:

A company is preparing to move a new version of a web application to production. No issues were reported during security scanning or quality assurance in the CI/CD pipeline. Which of the following actions should thecompany take next?

Options:

A.

Merge the test branch to the main branch


B.

Perform threat modeling on the production application


C.

Conduct unit testing on the submitted code


D.

Perform a peer review on the test branch


Expert Solution
Questions # 22:

A developer receives feedback about code quality and efficiency. The developer needs to identify and resolve the following coding issues before submitting the code changes for peer review:

    Indexing beyond arrays

    Dereferencing null pointers

    Potentially dangerous data type combinations

    Unreachable code

    Non-portable constructs

Which of the following would be most appropriate for the developer to use in this situation?

Options:

A.

Linting


B.

SBoM


C.

DAST


D.

Branch protection


E.

Software composition analysis


Expert Solution
Questions # 23:

A company's Chief Information Security Officer learns that the senior leadership team is traveling to a country accused of attempting to steal intellectual property saved on laptops. Which of the following is the best method to protect against this attack?

Options:

A.

Configure Measured Boot to report any firmware changes.


B.

Use sanitized devices with remote connections to VDI.


C.

Deploy self-encrypting drives to protect company data.


D.

Install tamper-evident stickers over any laptop screws.


Expert Solution
Questions # 24:

A company plans to implement a research facility with Intellectual property data that should be protected The following is the security diagram proposed by the security architect

Question # 24

Which of the following security architect models is illustrated by the diagram?

Options:

A.

Identity and access management model


B.

Agent based security model


C.

Perimeter protection security model


D.

Zero Trust security model


Expert Solution
Questions # 25:

A security analyst is developing a threat model that focuses on attacks associated with the organization's storage products. The products:

• Are used in commercial and government user environments

• Are required to comply with crypto-export requirements

• Include both hardware and software components that are developed by external vendors in Europe and Asia

Which of the following are the most important for the analyst to consider when developing the model? (Select two).

Options:

A.

Contractual obligations


B.

Legal hold obligations


C.

Trust boundaries


D.

Cloud services enumeration


E.

Supply chain access


F.

Homomorphic encryption usage


Expert Solution
Questions # 26:

As part of a security audit in the software development life cycle, a product manager must demonstrate and provide evidence of a complete representation of the code and modules used within the production-deployed application prior to the build. Which of the following best provides the required evidence?

Options:

A.

Software composition analysis


B.

Runtime application inspection


C.

Static application security testing


D.

Interactive application security testing


Expert Solution
Questions # 27:

A Chief Information Security Officer (CISO) is concerned that a company's current data disposal procedures could result in data remanence. The company uses only SSDs. Which of the following would be the most secure way to dispose of the SSDs given the CISO's concern?

Options:

A.

Degaussing


B.

Overwriting


C.

Shredding


D.

Formatting


E.

Incinerating


Expert Solution
Questions # 28:

During a forensic review of a cybersecurity incident, a security engineer collected a portion of the payload used by an attacker on a comprised web server Given the following portion of the code:

Question # 28

Which of the following best describes this incident?

Options:

A.

XSRF attack


B.

Command injection


C.

Stored XSS


D.

SQL injection


Expert Solution
Questions # 29:

A cloud engineer wants to configure mail security protocols to support email authenticity and enable the flow of email security information to a third-party platform for further analysis. Which of the following must be configured to achieve these requirements? (Select two).

Options:

A.

DMARC


B.

DKIM


C.

TLS


D.

SPF


E.

DNSSEC


F.

MX


Expert Solution
Questions # 30:

After a vendor identified a recent vulnerability, a severity score was assigned to the vulnerability. A notification was also publicly distributed. Which of the following would most likely include information regarding the vulnerability and the recommended remediation steps?

Options:

A.

CVE


B.

CVSS


C.

CCE


D.

CPE


Expert Solution
Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions