Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions
Questions # 51:

A security engineer is developing a solution to meet the following requirements?

• All endpoints should be able to establish telemetry with a SIEM.

• All endpoints should be able to be integrated into the XDR platform.

• SOC services should be able to monitor the XDR platform

Which of the following should the security engineer implement to meet the requirements?

Options:

A.

CDR and central logging


B.

HIDS and vTPM


C.

WAF and syslog


D.

HIPS and host-based firewall


Expert Solution
Questions # 52:

A security engineer receives an alert from the threat intelligence platform with the following information:

Question # 52

Which of the following actions should the security engineer do first?

Options:

A.

Reset John's and Joe's access.


B.

Contact John. Ann. and Joe to inform them about the incident and schedule a password reset.


C.

Reset John's, Ann's, and Joe's passwords and disconnect all users* active sessions


D.

Reset John's and Joe's passwords and inform authorities about the leakage.


Expert Solution
Questions # 53:

A software engineer is creating a CI/CD pipeline to support the development of a web application The DevSecOps team is required to identify syntax errors Which of the following is the most relevant to the DevSecOps team's task'

Options:

A.

Static application security testing


B.

Software composition analysis


C.

Runtime application self-protection


D.

Web application vulnerability scanning


Expert Solution
Questions # 54:

A threat intelligence company's business objective is to allow customers to integrate data directly to different TIPs through an API. The company would like to address as many of the following objectives as possible:

• Reduce compute spend as much as possible.

• Ensure availability for all users.

• Reduce the potential attack surface.

• Ensure the integrity of the data provided.

Which of the following should the company consider to best meet the objectives?

Options:

A.

Configuring a unique API secret key for accounts


B.

Publishing a list of IoCs on a public directory


C.

Implementing rate limiting for each registered user


D.

Providing a hash of all data that is made available


Expert Solution
Questions # 55:

A company hosts a platform-as-a-service solution with a web-based front end, through which customer interact with data sets. A security administrator needs to deploy controls to prevent application-focused attacks. Which of the following most directly supports the administrator's objective'

Options:

A.

improving security dashboard visualization on SIEM


B.

Rotating API access and authorization keys every two months


C.

Implementing application toad balancing and cross-region availability


D.

Creating WAF policies for relevant programming languages


Expert Solution
Questions # 56:

A vulnerability scan was performed on a website, and the following encryption suites were found:

Question # 56

Which of the following actions will remediate the vulnerability?

Options:

A.

Removing any ciphers utilizing cipher block chaining


B.

Rearranging the order of the ciphers from strongest to weakest


C.

Deploying a WAF to monitor web traffic


D.

Reissuing new SSL certificates for the website


Expert Solution
Questions # 57:

A security architect is investigating instances of employees who had their phones stolen in public places through seemingly targeted attacks. Devices are able to access company resources such as email and internal documentation, some of which can persist in application storage. Which of the following would best protect the company from information exposure? (Select two).

Options:

A.

Implement a remote wipe procedure if the phone does not check in for a period of time


B.

Enforce biometric access control with configured timeouts


C.

Set up geofencing for corporate applications where the phone must be near an office


D.

Use application control to restrict the applications that can be installed


E.

Leverage an MDM solution to prevent the side loading of mobile applications


F.

Enable device certificates that will be used for access to company resources


Expert Solution
Questions # 58:

An organization is researching the automation capabilities for systems within an OT network. A security analyst wants to assist with creating secure coding practices and would like to learn about the programming languages used on the PLCs. Which of the following programming languages is the most relevant for PLCs?

Options:

A.

Ladder logic


B.

Rust


C.

C


D.

Python


E.

Java


Expert Solution
Questions # 59:

An enterprise is deploying APIs that utilize a private key and a public key to ensure the connection string is protected. To connect to the API, customers must use the private key. Which of the following would best secure the REST API connection to the database while preventing the use of a hard-coded string in the request string?

Options:

A.

Implement a VPN for all APIs


B.

Sign the key with DSA


C.

Deploy MFA for the service accounts


D.

Utilize HMAC for the keys


Expert Solution
Questions # 60:

A company is having issues with its vulnerability management program New devices/lPs are added and dropped regularly, making the vulnerability report inconsistent Which of the following actions should the company lake to most likely improve the vulnerability management process'

Options:

A.

Request a weekly report with all new assets deployed and decommissioned


B.

Extend the DHCP lease lime to allow the devices to remain with the same address for a longer period.


C.

Implement a shadow IT detection process to avoid rogue devices on the network


D.

Perform regular discovery scanning throughout the 11 landscape using the vulnerability management tool


Expert Solution
Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions