Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

Users must accept the terms presented in a captive petal when connecting to a guest network. Recently, users have reported that they are unable to access the Internet after joining the network A network engineer observes the following:

• Users should be redirected to the captive portal.

• The Motive portal runs Tl. S 1 2

• Newer browser versions encounter security errors that cannot be bypassed

• Certain websites cause unexpected re directs

Which of the following mow likely explains this behavior?

Options:

A.

The TLS ciphers supported by the captive portal ate deprecated


B.

Employment of the HSTS setting is proliferating rapidly.


C.

Allowed traffic rules are causing the NIPS to drop legitimate traffic


D.

An attacker is redirecting supplicants to an evil twin WLAN.


Expert Solution
Questions # 52:

A company hosts a platform-as-a-service solution with a web-based front end, through which customer interact with data sets. A security administrator needs to deploy controls to prevent application-focused attacks. Which of the following most directly supports the administrator's objective'

Options:

A.

improving security dashboard visualization on SIEM


B.

Rotating API access and authorization keys every two months


C.

Implementing application toad balancing and cross-region availability


D.

Creating WAF policies for relevant programming languages


Expert Solution
Questions # 53:

A hospital provides tablets to its medical staff to enable them to more quickly access and edit patients' charts. The hospital wants to ensure that if a tablet is identified as lost or stolen and a remote command is issued, the risk of data loss can be mitigated within seconds. The tablets are configured as follows:

• Full disk encryption is enabled.

• "Always On" corporate VPN is enabled.

• eFuse-backed keystore is enabled.

• Wi-Fi 6 is configured with SAE.

• Location services is disabled.

• Application allow list is unconfigured.

Assuming the hospital policy cannot be changed, which of the following is the best way to meet the hospital's objective?

Options:

A.

Revoke the user VPN and Wi-Fi certificates


B.

Cryptographically erase FDE volumes


C.

Issue new MFA credentials to all users


D.

Configure the application allow list


Expert Solution
Questions # 54:

A cloud engineer wants to configure mail security protocols to support email authenticity and enable the flow of email security information to a third-party platform for further analysis. Which of the following must be configured to achieve these requirements? (Select two).

Options:

A.

DMARC


B.

DKIM


C.

TLS


D.

SPF


E.

DNSSEC


F.

MX


Expert Solution
Questions # 55:

Employees use their badges to track the number of hours they work. The badge readers cannot be upgraded due to facility constraints. The software for the badge readers uses a legacy platform and requires connectivity to the enterprise resource planning solution. Which of the following is the best to ensure the security of the badge readers?

Options:

A.

Segmentation


B.

Vulnerability scans


C.

Anti-malware


Expert Solution
Questions # 56:

Developers have been creating and managing cryptographic material on their personal laptops fix use in production environment. A security engineer needs to initiate a more secure process. Which of thefollowing is the best strategy for the engineer to use?

Options:

A.

Disabling the BIOS and moving to UEFI


B.

Managing secrets on the vTPM hardware


C.

Employing shielding lo prevent LMI


D.

Managing key material on a HSM


Expert Solution
Questions # 57:

Which of the following best describes the reason PQC preparation is important?

Options:

A.

To protect data against decryption due to increases in computational resource availability


B.

To have larger key lengths available through key stretching


C.

To improve encryption performance and speed using lightweight cryptography


D.

To leverage asymmetric encryption for large amounts of data


Expert Solution
Questions # 58:

An organization is planning for disaster recovery and continuity ofoperations, and has noted the following relevant findings:

1. A natural disaster may disrupt operations at Site A, which would then cause an evacuation. Users are

unable to log into the domain from-their workstations after relocating to Site B.

2. A natural disaster may disrupt operations at Site A, which would then cause the pump room at Site B

to become inoperable.

3. A natural disaster may disrupt operations at Site A, which would then cause unreliable internet

connectivity at Site B due to route flapping.

INSTRUCTIONS

Match each relevant finding to the affected host by clicking on the host name and selecting the appropriate number.

For findings 1 and 2, select the items that should be replicated to Site B. For finding 3, select the item requiring configuration changes, then select the appropriate corrective action from the drop-down menu.

Question # 58

Question # 58


Expert Solution
Questions # 59:

A security engineer must ensure that sensitive corporate information is not exposed if a company laptop is stolen. Which of the following actions best addresses this requirement?

Options:

A.

Utilizing desktop as a service for all company data and multifactor authentication


B.

Using explicit allow lists of specific IP addresses and deploying single sign-on


C.

Deploying mobile device management and requiring stronger passwords


D.

Updating security mobile reporting policies and monitoring data breaches


Expert Solution
Questions # 60:

A vulnerability can on a web server identified the following:

Question # 60

Which of the following actions would most likely eliminate on path decryption attacks? (Select two).

Options:

A.

Disallowing cipher suites that use ephemeral modes of operation for key agreement


B.

Removing support for CBC-based key exchange and signing algorithms


C.

Adding TLS_ECDHE_ECDSA_WITH_AE3_256_GCMS_HA256


D.

Implementing HIPS rules to identify and block BEAST attack attempts


E.

Restricting cipher suites to only allow TLS_RSA_WITH_AES_128_CBC_SHA


F.

Increasing the key length to 256 for TLS_RSA_WITH_AES_128_CBC_SHA


Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions