Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

A systems administrator wants to introduce a newly released feature for an internal application. The administrate docs not want to test the feature in the production environment. Which of the following locations is the best place to test the new feature?

Options:

A.

Staging environment


B.

Testing environment


C.

CI/CO pipeline


D.

Development environment


Expert Solution
Questions # 42:

Which of the following supports the process of collecting a large pool of behavioral observations to inform decision-making?

Options:

A.

Linear regression


B.

Distributed consensus


C.

Big Data


D.

Machine learning


Expert Solution
Questions # 43:

A Chief Information Security Officer (CISO) is concerned that a company's current data disposal procedures could result in data remanence. The company uses only SSDs. Which of the following would be the most secure way to dispose of the SSDs given the CISO's concern?

Options:

A.

Degaussing


B.

Overwriting


C.

Shredding


D.

Formatting


E.

Incinerating


Expert Solution
Questions # 44:

A security engineer is given the following requirements:

• An endpoint must only execute Internally signed applications

• Administrator accounts cannot install unauthorized software.

• Attempts to run unauthorized software must be logged

Which of the following best meets these requirements?

Options:

A.

Maintaining appropriate account access through directory management and controls


B.

Implementing a CSPM platform to monitor updates being pushed to applications


C.

Deploying an EDR solution to monitor and respond to software installation attempts


D.

Configuring application control with blocked hashes and enterprise-trusted root certificates


Expert Solution
Questions # 45:

An organization that performs real-time financial processing is implementing a new backup solution. Given the following business requirements:

The backup solution must reduce the risk of potential backup compromise.

The backup solution must be resilient to a ransomware attack.

The time to restore from backups is less important than backup data integrity.

Multiple copies of production data must be maintained.

Which of the following backup strategies best meets these requirements?

Options:

A.

Creating a secondary, immutable database and adding live data on a continuous basis


B.

Utilizing two connected storage arrays and ensuring the arrays constantly sync


C.

Enabling remote journaling on the databases to ensure real-time transactions are mirrored


D.

Setting up anti-tampering on the databases to ensure data cannot be changed unintentionally


Expert Solution
Questions # 46:

A company recently experienced an incident in which an advanced threat actor was able to shim malicious code against the hardware static of a domain controller The forensic team cryptographically validated that com the underlying firmware of the box and the operating system had not been compromised. However, the attacker was able to exfiltrate information from the server using a steganographic technique within LOAP Which of the following is me b»« way to reduce the risk oi reoccurrence?

Options:

A.

Enforcing allow lists for authorized network pons and protocols


B.

Measuring and attesting to the entire boot chum


C.

Rolling the cryptographic keys used for hardware security modules


D.

Using code signing to verify the source of OS updates


Expert Solution
Questions # 47:

A company wants to modify its process to comply with privacy requirements after an incident involving PII data in a development environment. In order to perform functionality tests, the QA team still needs to use valid data in the specified format. Which of the following best addresses the risk without impacting the development life cycle?

Options:

A.

Encrypting the data before moving into the QA environment


B.

Truncating the data to make it not personally identifiable


C.

Using a large language model to generate synthetic data


D.

Utilizing tokenization for sensitive fields


Expert Solution
Questions # 48:

A company’sSIEMis designed to associate the company’sasset inventorywith user events. Given the following report:

Question # 48

Which of thefollowing should asecurity engineer investigate firstas part of alog audit?

Options:

A.

Anendpointthat is not submitting any logs


B.

Potential activity indicating an attackermoving laterally in the network


C.

Amisconfigured syslog servercreating false negatives


D.

Unauthorized usage attempts of the administrator account


Expert Solution
Questions # 49:

A company is having issues with its vulnerability management program New devices/lPs are added and dropped regularly, making the vulnerability report inconsistent Which of the following actions should the company lake to most likely improve the vulnerability management process'

Options:

A.

Request a weekly report with all new assets deployed and decommissioned


B.

Extend the DHCP lease lime to allow the devices to remain with the same address for a longer period.


C.

Implement a shadow IT detection process to avoid rogue devices on the network


D.

Perform regular discovery scanning throughout the 11 landscape using the vulnerability management tool


Expert Solution
Questions # 50:

A security officer performs due diligence activities before implementing a third-party solution into the enterprise environment. The security officer needs evidence from the third party that a data subject access request handling process is in place. Which of the following is the security officer most likely seeking to maintain compliance?

Options:

A.

Information security standards


B.

E-discovery requirements


C.

Privacy regulations


D.

Certification requirements


E.

Reporting frameworks


Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions