Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions
Questions # 31:

A security analyst wants to use lessons learned from a poor incident response to reduce dwell lime in the future The analyst is using the following data points

Question # 31

Which of the following would the analyst most likely recommend?

Options:

A.

Adjusting the SIEM to alert on attempts to visit phishing sites


B.

Allowing TRACE method traffic to enable better log correlation


C.

Enabling alerting on all suspicious administrator behavior


D.

utilizing allow lists on the WAF for all users using GFT methods


Expert Solution
Questions # 32:

A company migrated a critical workload from its data center to the cloud. The workload uses a very large data set that requires computational-intensive data processing. The business unit that uses the workload is projecting the following growth pattern:

• Storage requirements will double every six months.

• Computational requirements will fluctuate throughout the year.

• Average computational requirements will double every year.

Which of the following should the company do to address the business unit's requirements?

Options:

A.

Deploy a cloud-based CDN for storage and a load balancer for compute.


B.

Combine compute and storage in vertically autoscaling mode.


C.

Implement a load balancer for computing and storage resources.


D.

Plan for a horizontally scaling computing and storage infrastructure.


Expert Solution
Questions # 33:

During a periodic internal audit, a company identifies a few new, critical security controls that are missing. The company has a mature risk management program in place, and the following requirements must be met:

The stakeholders should be able to see all the risks.

The risks need to have someone accountable for them.

Which of the following actions should the GRC analyst take next?

Options:

A.

Add the risk to the risk register and assign the owner and severity.


B.

Change the risk appetite and assign an owner to it.


C.

Mitigate the risk and change the status to accepted.


D.

Review the risk to decide whether to accept or reject it.


Expert Solution
Questions # 34:

A user submits a help desk ticket stating then account does not authenticatesometimes. An analyst reviews the following logs for the user:

Which of the following best explains the reason the user's access is being denied?

Options:

A.

incorrectly typed password


B.

Time-based access restrictions


C.

Account compromise


D.

Invalid user-to-device bindings


Expert Solution
Questions # 35:

An engineering team determines the cost to mitigate certain risks is higher than the asset values The team must ensure the risks are prioritized appropriately. Which of the following is the best way to address the issue?

Options:

A.

Data labeling


B.

Branch protection


C.

Vulnerability assessments


D.

Purchasing insurance


Expert Solution
Questions # 36:

A developer needs toimprove the cryptographic strength of a password-storage component in a web application without completely replacing the crypto-module. Which of the following is the most appropriate technique?

Options:

A.

Key splitting


B.

Key escrow


C.

Key rotation


D.

Key encryption


E.

Key stretching


Expert Solution
Questions # 37:

A company detects suspicious activity associated with external connections Security detection tools are unable tocategorize this activity. Which of the following is the best solution to help the company overcome this challenge?

Options:

A.

Implement an Interactive honeypot


B.

Map network traffic to known loCs.


C.

Monitor the dark web


D.

implement UEBA


Expert Solution
Questions # 38:

An organization recently implemented a policy that requires all passwords to be rotated every 90 days. An administrator observes a large volume of failed sign-on logs from multiple servers that are often accessed by users. The administrator determines users are disconnecting from the RDP session but not logging off. Which of the following should the administrator do to prevent account lockouts?

Options:

A.

Increase the account lockout threshold.


B.

Enforce password complexity.


C.

Automate logout of inactive sessions.


D.

Extend the allowed session length.


Expert Solution
Questions # 39:

A security administrator is performing a gap assessment against a specific OS benchmark The benchmark requires the following configurations be applied to endpoints:

• Full disk encryption

* Host-based firewall

• Time synchronization

* Password policies

• Application allow listing

* Zero Trust application access

Which of the following solutions best addresses the requirements? (Select two).

Options:

A.

CASB


B.

SBoM


C.

SCAP


D.

SASE


E.

HIDS


Expert Solution
Questions # 40:

Operational technology often relies upon aging command, control, and telemetry subsystems that were created with the design assumption of:

Options:

A.

operating in an isolated/disconnected system.


B.

communicating over distributed environments


C.

untrustworthy users and systems being present.


D.

an available EtherneVIP network stack for flexibility.


E.

anticipated eavesdropping from malicious actors.


Expert Solution
Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions