Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions
Questions # 21:

A penetration tester reviews the following router configuration:

set-system services ssh root login-allow

set-system services web-management https allow

set-system services syslog file interactive

set-system services log mode stream

set-interfaces 0 family inet address 10.12.14.1/8

Which of the following changes is the best way to enhance security?

Options:

A.

Setting specific ciphers for user-interactive sessions


B.

Disabling access to unencrypted terminal connections


C.

Enabling network segmentation controls


D.

Configuring automatic patching and rebooting of the device


Expert Solution
Questions # 22:

John Doe ' s email account was compromised. The attacker ' s access to John Doe ' s account was removed and MFA was implemented. The attacker convinced Joe Roe in the accounting department to pay a fraudulent invoice through email exchanges. A security analyst is reviewing the headers from the initial email that Joe Roe received:

Received: from 221.15.11.103 (221.15.11.103.mta.com [221.15.11.103])

by with esmtps (TLS 1.2)

Received-SPF: pass

Received: from 18.132.124.10 (18.132.124.10-internal.com [18.132.124.10])

by mx7sgwt-3S (Postfix) with ESMTPS id zRhQ22fmNnQCdys

DKIM-Signature: v=1; c=relaxed/relaxed; d=example.com;

s=default; t=1672873468;

h=To: Message-ID: Date: Content-Type: Subject: From: From: To: Cc: Subject;

To: jroe@example.com

Message-ID: _73/A4-32616-C36L8ZbYC4p

Date: Mon, 07 Apr 2025 +0000

Content-Type: multipart/alternative; boundary=

MIME-Version: 1.0

Reply-To: jdoe@exampl.com

Subject: FW: Invoice

From: jdoe@exampl.com

X-SpamProbability: 0.095349

Which of the following best explains how the attacker was able to get the invoice paid?

Options:

A.

The attacker guessed John Doe ' s password.


B.

The attacker registered a new domain.


C.

The attacker ' s emails did not use domain keys for verification.


D.

The email failed the sender policy framework check.


Expert Solution
Questions # 23:

A building camera is remotely accessed and disabled from the remote console application during off-hours. A security analyst reviews the following logs:

Question # 23

A security architect is onboarding a new EDR agent on servers that traditionally do not have internet access. In order for the agent to receive updates and report back to the management console, some changes must be made. Which of the following should the architect do to best accomplish this requirement? (Select two).

Options:

A.

Create a firewall rule to only allow traffic from the subnet to the internet via a proxy.


B.

Configure a proxy policy that blocks all traffic on port 443.


C.

Configure a proxy policy that allows only fully qualified domain names needed to communicate to a portal.


D.

Create a firewall rule to only allow traffic from the subnet to the internet via port 443.


E.

Create a firewall rule to only allow traffic from the subnet to the internet to fully qualified names that are not identified as malicious by the firewall vendor.


F.

Configure a proxy policy that blocks only lists of known-bad, fully qualified domain names.


Expert Solution
Questions # 24:

An analyst wants to conduct a risk assessment on a new application that is being deployed. Given the following information:

• Total budget allocation for the new application is unavailable.

• Recovery time objectives have not been set.

• Downtime loss calculations cannot be provided.

Which of the following statements describes the reason a qualitative assessment is the best option?

Options:

A.

The analyst has previous work experience in application development.


B.

Sufficient metrics are not available to conduct other risk assessment types.


C.

An organizational risk register tracks all risks and mitigations across business units.


D.

The organization wants to find the monetary value of any outages.


Expert Solution
Questions # 25:

In order to follow new regulations, the Chief Information Security Officer plans to use a defense-in-depth approach for a perimeter network. Which of the following protections would best achieve this goal?

Options:

A.

SAST, DAST, IAST


B.

NGFW, IPS, EDR


C.

SASE, IDS, SAST


D.

CASB, DLP, EDR


Expert Solution
Questions # 26:

A security engineer needs to remediate a SWEET32 vulnerability in an OpenSSH-based application and review existing configurations. Which of the following should the security engineer do? (Select two.)

Options:

A.

Disable Twofish algorithms


B.

cat /etc/ashd/ash_config | grep " HMAC "


C.

Disable RSA algorithms


D.

cat /etc/sshd/ssh_config | grep " PermitRootLogin "


E.

Disable 3DES algorithms


F.

cat /etc/sshd/ssh_config | grep " Ciphers "


Expert Solution
Questions # 27:

A company implemented a NIDS and a NIPS on the most critical environments. Since this implementation, the company has been experiencing network connectivity issues. Which of the following should the security architect recommend for a new NIDS/NIPS implementation?

Options:

A.

Implementing the NIDS with a port mirror in the core switch and the NIPS in the main firewall


B.

Implementing the NIDS and the NIPS together with the main firewall


C.

Implementing a NIDS without a NIPS to increase the detection capability


D.

Implementing the NIDS in the bastion host and the NIPS in the branch network router


Expert Solution
Questions # 28:

A company is preparing to move a new version of a web application to production. No issues were reported during security scanning or quality assurance in the CI/CD pipeline. Which of the following actions should thecompany take next?

Options:

A.

Merge the test branch to the main branch


B.

Perform threat modeling on the production application


C.

Conduct unit testing on the submitted code


D.

Perform a peer review on the test branch


Expert Solution
Questions # 29:

Engineers at a cloud service provider can now access newly deployed customer environments from their personal laptops. The engineers are concerned that unmanaged systems may present unknown vulnerabilities to customer environments, which might become a significant liability to the service provider. Which of the following deployments provides the most secure solution to prevent access through non-authorized endpoints?

Options:

A.

Modifying MDM policies to provide device attestation on all devices connecting to the cloud service ' s management console


B.

Requiring that a corporate-licensed and -managed EDR solution is installed on employee-owned laptops


C.

Configuring the device ' s certificate-based authentication on the corporate VPN and requiring that all activity in customer environments be performed using the VPN


D.

Implementing host checking on remote desktop sessions to jump boxes used for managing customer environments


Expert Solution
Questions # 30:

A company experienced a data breach, resulting in the disclosure of extremely sensitive data regarding a merger. As a regulated entity, the company must comply with reporting and disclosure requirements. The company is concerned about its public image and shareholder values. Which of the following best supports the organization in addressing its concerns?

Options:

A.

Data subject access request


B.

Business impact analysis


C.

Supply chain management program


D.

Crisis management plan


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions