Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following best explains the business requirement a healthcare provider fulfills by encrypting patient data at rest?

Options:

A.

Securing data transfer between hospitals


B.

Providing for non-repudiation data


C.

Reducing liability from identity theft


D.

Protecting privacy while supporting portability.


Expert Solution
Questions # 32:

During a gap assessment, an organization notes that OYOD usage is asignificant risk. The organization implemented administrative policies prohibiting BYOD usage However, the organization has not implemented technical controls to prevent the unauthorized use of BYOD assets when accessing the organization's resources. Which of the following solutions should the organization implement to b»« reduce the risk of OYOD devices? (Select two).

Options:

A.

Cloud 1AM to enforce the use of token based MFA


B.

Conditional access, to enforce user-to-device binding


C.

NAC, to enforce device configuration requirements


D.

PAM. to enforce local password policies


E.

SD-WAN. to enforce web content filtering through external proxies


F.

DLP, to enforce data protection capabilities


Expert Solution
Questions # 33:

A company wants to improve and automate the compliance of its cloud environments to meet industry standards. Which of the following resources should the company use to best achieve this goal?

Options:

A.

Jenkins


B.

Python


C.

Ansible


D.

PowerShell


Expert Solution
Questions # 34:

All organization is concerned about insider threats from employees who have individual access to encrypted material. Which of the following techniques best addresses this issue?

Options:

A.

SSO with MFA


B.

Sating and hashing


C.

Account federation with hardware tokens


D.

SAE


E.

Key splitting


Expert Solution
Questions # 35:

Previously intercepted communications must remain secure even if a current encryption key is compromised in the future. Which of the following best supports this requirement?

Options:

A.

Tokenization


B.

Key stretching


C.

Forward secrecy


D.

Simultaneous authentication of equals


Expert Solution
Questions # 36:

A systems administrator wants to use existing resources to automate reporting from disparate security appliances that do not currently communicate. Which of the following is the best way to meet this objective?

Options:

A.

Configuring an API Integration to aggregate the different data sets


B.

Combining back-end application storage into a single, relational database


C.

Purchasing and deploying commercial off the shelf aggregation software


D.

Migrating application usage logs to on-premises storage


Expert Solution
Questions # 37:

A security analyst needs to ensure email domains that send phishing attempts without previous communications are not delivered to mailboxes The following email headers are being reviewed

Question # 37

Which of thefollowing is the best action for the security analyst to take?

Options:

A.

Block messages from hr-saas.com because it is not a recognized domain.


B.

Reroute all messages with unusual security warning notices to the IT administrator


C.

Quarantine all messages with sales-mail.com in the email header


D.

Block vendor com for repeated attempts to send suspicious messages


Expert Solution
Questions # 38:

A senior security engineer flags me following log file snippet as hawing likely facilitated an attacker's lateral movement in a recent breach:

Question # 38

Which of the following solutions, if implemented, would mitigate the nsk of this issue reoccurnnp?

Options:

A.

Disabling DNS zone transfers


B.

Restricting DNS traffic to UDP'W


C.

Implementing DNS masking on internal servers


D.

Permitting only clients from internal networks to query DNS


Expert Solution
Questions # 39:

An organization determines existing business continuity practices areinadequateto support critical internal process dependencies during a contingency event. Acompliance analystwants the Chief Information Officer (CIO) to identify the level ofresidual riskthat is acceptable to guide remediation activities. Which of the following does the CIO need to clarify?

Options:

A.

Mitigation


B.

Impact


C.

Likelihood


D.

Appetite


Expert Solution
Questions # 40:

A company's SICM Is continuously reporting false positives and false negatives The security operations team has Implemented configuration changes to troubleshoot possible reporting errorsWhich of the following sources of information best supports the required analysts process? (Select two).

Options:

A.

Third-party reports and logs


B.

Trends


C.

Dashboards


D.

Alert failures


E.

Network traffic summaries


F.

Manual review processes


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions