Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions
Questions # 31:

An organization recently implemented a policy that requires all passwords to be rotated every 90 days. An administrator observes a large volume of failed sign-on logs from multiple servers that are often accessed by users. The administrator determines users are disconnecting from the RDP session but not logging off. Which of the following should the administrator do to prevent account lockouts?

Options:

A.

Increase the account lockout threshold.


B.

Enforce password complexity.


C.

Automate logout of inactive sessions.


D.

Extend the allowed session length.


Expert Solution
Questions # 32:

To prevent data breaches, security leaders at a company decide to expand user education to:

• Create a healthy security culture.

• Comply with regulatory requirements.

• Improve incident reporting.

Which of the following would best meet their objective?

Options:

A.

Performing a DoS attack


B.

Scheduling regular penetration tests


C.

Simulating a phishing campaign


D.

Deploying fake ransomware


Expert Solution
Questions # 33:

An organization is developing an in-house software platform to support capital planning and reporting functions. In addition to role-based access controls and auditing/logging capabilities, the product manager must include requirements associated with archiving data and immutable backups. Which of the following organizational considerations are most likely associated with this requirement? (Select two)

Options:

A.

Crypto-export management controls


B.

Supply chain weaknesses


C.

Device attestation


D.

Quality assurance


E.

Legal hold compliance


F.

Ransomware resilience


Expert Solution
Questions # 34:

A financial services organization is using Al lo fully automate the process of deciding client loan rates Which of the following should the organization be most concerned about from a privacy perspective?

Options:

A.

Model explainability


B.

Credential Theft


C.

Possible prompt Injections


D.

Exposure to social engineering


Expert Solution
Questions # 35:

A security analyst is reviewing the following log:

Question # 35

Which of the following possible events should the security analyst investigate further?

Options:

A.

A macro that was prevented from running


B.

A text file containing passwords that were leaked


C.

A malicious file that was run in this environment


D.

A PDF that exposed sensitive information improperly


Expert Solution
Questions # 36:

A user reports application access issues to the help desk. The help desk reviews the logs for the user

Question # 36

Which of the following is most likely The reason for the issue?

Options:

A.

The userinadvertently tripped the impossible travel security rule in the SSO system.


B.

A threat actor has compromised the user ' s account and attempted to lop, m


C.

The user is not allowed to access the human resources system outside of business hours


D.

The user did not attempt to connect from an approved subnet


Expert Solution
Questions # 37:

A threat intelligence company ' s business objective is to allow customers to integrate data directly to different TIPs through an API. The company would like to address as many of the following objectives as possible:

• Reduce compute spend as much as possible.

• Ensure availability for all users.

• Reduce the potential attack surface.

• Ensure the integrity of the data provided.

Which of the following should the company consider to best meet the objectives?

Options:

A.

Configuring a unique API secret key for accounts


B.

Publishing a list of IoCs on a public directory


C.

Implementing rate limiting for each registered user


D.

Providing a hash of all data that is made available


Expert Solution
Questions # 38:

A company must meet the following security requirements when implementing controls in order to be compliant with government policy:

• Access to the system document repository must be MFA enabled.

• Ongoing risk monitoring must be displayed on a system dashboard.

• Staff must receive email notifications about periodic tasks.

Which of the following best meets all of these requirements?

Options:

A.

Implementing a GRC tool


B.

Configuring a privileged access management system


C.

Launching a vulnerability management program


D.

Creating a risk register


Expert Solution
Questions # 39:

A company wants to improve and automate the compliance of its cloud environments to meet industry standards. Which of the following resources should the company use to best achieve this goal?

Options:

A.

Jenkins


B.

Python


C.

Ansible


D.

PowerShell


Expert Solution
Questions # 40:

A systems administrator wants to introduce a newly released feature for an internal application. The administrate docs not want to test the feature in the production environment. Which of the following locations is the best place to test the new feature?

Options:

A.

Staging environment


B.

Testing environment


C.

CI/CO pipeline


D.

Development environment


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions