Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions
Questions # 61:

A financial technology firm works collaboratively with business partners in the industry to share threat intelligence within a central platform This collaboration gives partner organizations the ability to obtain and share data associated with emerging threats from a variety of adversaries Which of the following should the organization most likely leverage to facilitate this activity? (Select two).

Options:

A.

CWPP


B.

YAKA


C.

ATTACK


D.

STIX


E.

TAXII


F.

JTAG


Expert Solution
Questions # 62:

Protected company data was recently exfiltrated. The SOC did not find any indication of a network or outside physical intrusion, and the DLP systems reported no unusual activity. The incident response team determined a text file was encrypted and reviews the following log excerpt:

Question # 62

Which of the following is the most appropriate action for the team to take?

Options:

A.

Review the email security settings for proper configurations.


B.

Investigate whether the employee had access to the data that was leaked.


C.

Scan attachments with a third-party virus scan to independently confirm the results.


D.

Analyze the hardware for undetected supply chain vulnerabilities that may have been exploited.


Expert Solution
Questions # 63:

Audit findings indicate several user endpoints are not utilizing full disk encryption During me remediation process, a compliance analyst reviews the testing details for the endpoints and notes the endpoint device configuration does not support full disk encryption Which of the following is the most likely reason me device must be replaced '

Options:

A.

The HSM is outdated and no longer supported by the manufacturer


B.

The vTPM was not properly initialized and is corrupt.


C.

The HSM is vulnerable to common exploits and a firmware upgrade is needed


D.

The motherboard was not configured with a TPM from the OEM supplier.


E.

The HSM does not support sealing storage


Expert Solution
Questions # 64:

An organization decides to move to a distributed workforce model. Several legacy systems exist on premises and cannot be migrated because of existing compliance requirements. However, all new systems are required to be cloud-based. Which of the following would best ensure network access security?

Options:

A.

Utilizing a VPN for all users who require legacy system access


B.

Shifting all legacy systems to the existing public cloud infrastructure


C.

Configuring an SDN to block malicious traffic to on-premises networks


D.

Deploying microsegmentation with a firewall acting as the core router


Expert Solution
Questions # 65:

A systems engineer is configuring SSO for a business that will be using SaaS applications for its remote-only workforce. Privileged actions in SaaS applications must be allowed only from corporate mobile devices that meet minimum security requirements, but BYOD must also be permitted for other activity. Which of the following would best meet this objective?

Options:

A.

Block any connections from outside the business ' s network security boundary.


B.

Install machine certificates on corporate devices and perform checks against the clients.


C.

Configure device attestations and continuous authorization controls.


D.

Deploy application protection policies using a corporate, cloud-based MDM solution.


Expert Solution
Questions # 66:

A company lined an email service provider called my-email.com to deliver company emails. The company stalled having several issues during the migration. A security engineer is troubleshooting and observes the following configuration snippet:

Question # 66

Which of the following should the security engineer modify to fix the issue? (Select two).

Options:

A.

The email CNAME record must be changed to a type A record pointing to 192.168.111


B.

The TXT record must be Changed to " v=dmarc ip4:192.168.1.10 include:my-email.com -all "


C.

The srvo1 A record must be changed to a type CNAME record pointing to the email server


D.

The email CNAMErecord must be changed to a type A record pointing to 192.168.1.10


E.

The TXT record must be changed to " v=dkim ip4:l92.168.1.11 include my-email.com -ell "


F.

The TXT record must be Changed to " v=dkim ip4:192.168.1.10 include:email-all "


G.

The srv01 A record must be changed to a type CNAME record pointing to the web01 server


Expert Solution
Questions # 67:

A security engineer is developing a solution to meet the following requirements:

• All endpoints should be able to establish telemetry with a SIEM.

• All endpoints should be able to be integrated into the XDR platform.

• SOC services should be able to monitor the XDR platform.

Which of the following should the security engineer implement to meet the requirements? (Select Two.)

Options:

A.

EDR


B.

HIDS


C.

Web application firewall


D.

Central logging


E.

Host-based firewall


F.

TPM


Expert Solution
Questions # 68:

Embedded malware has been discovered in a popular PDF reader application and is currently being exploited in the wild. Because the supply chain was compromised, this malware is present in versions 10.0 through 10.3 of the software ' s official versions. The malware is not present in version 10.4.

Since the details around this malware are still emerging, the Chief Information Security Officer has asked the senior security analyst to collaborate with the IT asset inventory manager to find instances of the installed software in order to begin response activities. The asset inventory manager has asked an analyst to provide a regular expression that will identify the affected versions. The software installation entries are formatted as follows:

Reader 10.0

Reader 10.1

Reader 10.2

Reader 10.3

Reader 10.4

Which of the following regular expression entries will accuratelyidentify all the affected versions?

Options:

A.

Reader(*)[1][0] .[0-4:


B.

Reader[11[01X.f0-3 '


C.

Reader( )[1][0] .[0-3:


D.

Reader( )[1][0] X.[1-3:


Expert Solution
Questions # 69:

A security configure isbuilding a solution to disable weak CBC configuration for remote access connections lo Linux systems. Which of the following should the security engineer modify?

Options:

A.

The /etc/openssl.conf file, updating the virtual site parameter


B.

The /etc/nsswith.conf file, updating the name server


C.

The /etc/hosts file, updating the IP parameter


D.

The /etc/etc/sshd, configure file updating the ciphers


Expert Solution
Questions # 70:

An external SaaS solution user reports a bug associated with the role-based access control module. This bug allows users to bypass system logic associated with client segmentation in the multitenant deployment model. When assessing the bug report, the developer finds that the same bug was previously identified and addressed in an earlier release. The developer then determines the bug was reintroduced when an existing software component was integrated from a prior version of the platform. Which of the following is the best way to prevent this scenario?

Options:

A.

Regression testing


B.

Code signing


C.

Automated test and retest


D.

User acceptance testing


E.

Software composition analysis


Expert Solution
Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions