Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions
Questions # 41:

An organization is increasing its focus on training that addresses new social engineering and phishing attacks. Which of the following is the organization most concerned about?

Options:

A.

Meeting existing regulatory compliance


B.

Overreliance on AI support bots


C.

Generative AI tools increasing the quality of exploits


D.

Differential analysis using AI models


Expert Solution
Questions # 42:

During a security assessment using an EDR solution, a security engineer generates the following report about the assets in the system:

Initial report:

Device | Type | EDR status | Infection Status

LN002 | Linux SE | Enabled (unmanaged) | Unknown

OWIN23 | Windows 7 | Enabled | Clean

OWIN29 | Windows 10 | Enabled (bypass) | Clean

MAC005 | Mac OS | Enabled | Clean

After five days:

Device | Type | EDR status | Infection Status

LN002 | Linux SE | Enabled (unmanaged) | Unknown

OWIN23 | Windows 7 | Enabled | Clean

OWIN29 | Windows 10 | Enabled (bypass) | Infected

MAC005 | Mac OS | Disabled | Clean

Which of the following most likely enabled the infection?

Options:

A.

OWIN23 uses a legacy version of Windows that is not supported by the EDR.


B.

LN002 was not supported by the EDR solution and propagates the RAT.


C.

OWIN29 ' s EDR has an unknown vulnerability that was exploited by the attacker.


D.

MAC005 spreads the malware through other hosts in the network.


Expert Solution
Questions # 43:

An organization hires a security consultant to establish a SOC that includes athreat-modeling function. During initial activities, the consultant works with system engineers to identify antipatterns within the environment. Which of the following is most critical for the engineers to disclose to the consultant during this phase?

Options:

A.

Results from the most recent infrastructure access review


B.

A listing of unpatchable IoT devices in use in the data center


C.

Network and data flow diagrams covering the production environment


D.

Results from the most recent software composition analysis


E.

A current inventory of cloud resources and SaaS products in use


Expert Solution
Questions # 44:

A security architect is designing Zero Trust enforcement policies for all end users. The majority of users work remotely and travel frequently for work. Which of the following controls should the security architect do first?

Options:

A.

Switch user MFA from software-based tokens to hardware time-based OTPs.


B.

Implement TLS decryption and inspect inbound and outbound network traffic.


C.

Enforce daily posture compliance checks against the endpoint security controls.


D.

Deploy context-aware reauthentication with UBA baseline deviations.


Expert Solution
Questions # 45:

A vulnerability can on a web server identified the following:

Question # 45

Which of the following actions would most likely eliminate on path decryption attacks? (Select two).

Options:

A.

Disallowing cipher suites that use ephemeral modes of operation for key agreement


B.

Removing support for CBC-based key exchange and signing algorithms


C.

Adding TLS_ECDHE_ECDSA_WITH_AE3_256_GCMS_HA256


D.

Implementing HIPS rules to identify and block BEAST attack attempts


E.

Restricting cipher suites to only allow TLS_RSA_WITH_AES_128_CBC_SHA


F.

Increasing the key length to 256 for TLS_RSA_WITH_AES_128_CBC_SHA


Expert Solution
Questions # 46:

A healthcare system recently suffered from a ransomware incident. As a result, the board of directors decided to hire a security consultant to improve existing network security. The security consultant found that the healthcare network was completely flat, had no privileged access limits, and had open RDP access to servers with personal health information. As the consultant builds the remediation plan, which of the following solutions would best solve these challenges? (Select three).

Options:

A.

SD-WAN


B.

PAM


C.

Remote access VPN


D.

MFA


E.

Network segmentation


F.

BGP


G.

NAC


Expert Solution
Questions # 47:

A company that relies on an COL system must keep it operating until a new solution is available Which of the following is the most secure way to meet this goal?

Options:

A.

Isolating the system and enforcing firewall rules to allow access to only required endpoints


B.

Enforcing strong credentials and improving monitoring capabilities


C.

Restricting system access to perform necessary maintenance by the IT team


D.

Placing the system in a screened subnet and blocking access from internal resources


Expert Solution
Questions # 48:

A company has the following requirements for a cloud-based web application:

• Must authenticate customers

• Must prevent data exposure

• Must allow customer access to data throughout the cloud environment

• Must restrict access by specific regions

Which of the following solutions best addresses these security requirements?

Options:

A.

Applying role-based access controls and configuring geolocation policies


B.

Replicating the data in each customer environment


C.

Hosting the data regionally and providing each customer with a unique link


D.

Moving to a cloud provider that operates only in one specific region


Expert Solution
Questions # 49:

All organization is concerned about insider threats from employees who have individual access to encrypted material. Which of the following techniques best addresses this issue?

Options:

A.

SSO with MFA


B.

Sating and hashing


C.

Account federation with hardware tokens


D.

SAE


E.

Key splitting


Expert Solution
Questions # 50:

PKI can be used to support security requirements in the change management process. Which of the following capabilities does PKI provide for messages?

Options:

A.

Non-repudiation


B.

Confidentiality


C.

Delivery receipts


D.

Attestation


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions