Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions
Questions # 41:

Question # 41

An administrator needs to craft a single certificate-signing request for a web-server certificate. The server should be able to use the following identities to mutually authenticate other resources over TLS:

• wwwJnt.comptia.org

• webserver01.int.comptia.org

•10.5.100.10

Which of the following certificate fields must be set properly to support this objective?

Options:

A.

Subject alternative name


B.

Organizational unit


C.

Extended key usage


D.

Certificate extension


Expert Solution
Questions # 42:

A company finds logs with modified time stamps when compared to other systems. The security team decides to improve logging and auditing for incident response. Which of the following should the team do to best accomplish this goal?

Options:

A.

Integrate a file-monitoring tool with the SIEM.


B.

Change the log solution and integrate it with the existing SIEM.


C.

Implement a central logging server, allowing only log ingestion.


D.

Rotate and back up logs every 24 hours, encrypting the backups.


Expert Solution
Questions # 43:

A cybersecurity architect seeks to improve vulnerability management and orchestrate a large number of vulnerability checks. Key constraints include:

. There are 512 containerized microservices.

. Vulnerability data is sourced from multiple scanners.

. CIS baselines must be enforced.

. Scan activity must be scheduled.

Which of the following automation workflows best meets this objective?

Options:

A.

Employing an endpoint data collection system


B.

Deploying an XCCDF scanner


C.

Utilizing CVSS reports for SOC analysts


D.

Using a repository scanner to enforce laC security


Expert Solution
Questions # 44:

A financial technology firm works collaboratively with business partners in the industry to share threat intelligence within a central platform This collaboration gives partner organizations the ability to obtain and share data associated with emerging threats from a variety of adversaries Which of the following should the organization most likely leverage to facilitate this activity? (Select two).

Options:

A.

CWPP


B.

YAKA


C.

ATTACK


D.

STIX


E.

TAXII


F.

JTAG


Expert Solution
Questions # 45:

Which of the following best explains the business requirement a healthcare provider fulfills by encrypting patient data at rest?

Options:

A.

Securing data transfer between hospitals


B.

Providing for non-repudiation data


C.

Reducing liability from identity theft


D.

Protecting privacy while supporting portability.


Expert Solution
Questions # 46:

A central bank implements strict risk mitigations for the hardware supply chain, including an allow list for specific countries of origin. Which of the following best describes the cyberthreat to the bank?

Options:

A.

Ability to obtain components during wartime


B.

Fragility and other availability attacks


C.

Physical Implants and tampering


D.

Non-conformance to accepted manufacturing standards


Expert Solution
Questions # 47:

A security engineer wants to propose an MDM solution to mitigate certain risks. The MDM solution should meet the following requirements:

• Mobile devices should be disabled if they leave the trusted zone.

• If the mobile device is lost, data is not accessible.

Which of the following options should the security engineer enable on the MDM solution? (Select two).

Options:

A.

Geofencing


B.

Patch management


C.

Containerization


D.

Full disk encryption


E.

Allow/blocklist


F.

Geotagging


Expert Solution
Questions # 48:

Which of the following best explains the business requirement a healthcare provider fulfills by encrypting patient data at rest?

Options:

A.

Securing data transfer between hospitals


B.

Providing for non-repudiation of data


C.

Reducing liability from identity theft


D.

Protecting privacy while supporting portability


Expert Solution
Questions # 49:

Which of the following best explains the importance of determining organization risk appetite when operating with a constrained budget?

Options:

A.

Risk appetite directly impacts acceptance of high-impact low-likelihood events.


B.

Organizational risk appetite varies from organization to organization


C.

Budgetary pressure drives risk mitigation planning in all companies


D.

Risk appetite directly influences which breaches are disclosed publicly


Expert Solution
Questions # 50:

A systems engineer is configuring SSO for a business that will be using SaaS applications for its remote-only workforce. Privileged actions in SaaS applications must be allowed only from corporate mobile devices that meet minimum security requirements, but BYOD must also be permitted for other activity. Which of the following would best meet this objective?

Options:

A.

Block any connections from outside the business's network security boundary.


B.

Install machine certificates on corporate devices and perform checks against the clients.


C.

Configure device attestations and continuous authorization controls.


D.

Deploy application protection policies using a corporate, cloud-based MDM solution.


Expert Solution
Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions