Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions
Questions # 61:

The identity and access management team is sending logs to the SIEM for continuous monitoring. The deployed log collector isforwarding logs to

the SIEM. However, only false positive alerts are being generated. Which of the following is the most likely reason for the inaccurate alerts?

Options:

A.

The compute resources are insufficient to support the SIEM


B.

The SIEM indexes are 100 large


C.

The data is not being properly parsed


D.

The retention policy is not property configured


Expert Solution
Questions # 62:

An IPSec solution is being deployed. The configuration files for both the VPN

concentrator and the AAA server are shown in the diagram.

Complete the configuration files to meet the following requirements:

• The EAP method must use mutual certificate-based authentication (With

issued client certificates).

• The IKEv2 Cipher suite must be configured to the MOST secure

authenticated mode of operation,

• The secret must contain at least one uppercase character, one lowercase

character, one numeric character, and one special character, and it must

meet a minimumlength requirement of eight characters,

INSTRUCTIONS

Click on the AAA server and VPN concentrator to complete the configuration.

Fill in the appropriate fields and make selections from the drop-down menus.

Question # 62

VPN Concentrator:

Question # 62

AAA Server:

Question # 62


Expert Solution
Questions # 63:

An organization wants to manage specialized endpoints and needs a solution that provides the ability to

* Centrally manage configurations

* Push policies.

• Remotely wipe devices

• Maintain asset inventory

Which of the following should the organization do to best meet these requirements?

Options:

A.

Use a configuration management database


B.

Implement a mobile device management solution.


C.

Configure contextual policy management


D.

Deploy a software asset manager


Expert Solution
Questions # 64:

Previously intercepted communications must remain secure even if a current encryption key is compromised in the future. Which of the following best supports this requirement?

Options:

A.

Tokenization


B.

Key stretching


C.

Forward secrecy


D.

Simultaneous authentication of equals


Expert Solution
Questions # 65:

A company's security policy states that any publicly available server must be patched within 12 hours after a patch is released A recent llS zero-day vulnerability was discovered that affects all versions of the Windows Server OS:

Question # 65

Which of the following hosts should a security analyst patch first once a patch is available?

Options:

A.

1


B.

2


C.

3


D.

4


E.

5


F.

6


Expert Solution
Questions # 66:

Acompany must build and deploy security standards for all servers in its on-premises and cloud environments based on hardening guidelines. Which of the following solutions most likely meets the requirements?

Options:

A.

Develop a security baseline to integrate with the vulnerability scanning platform to alert about any server not aligned with the new security standards.


B.

Create baseline images for each OS in use, following security standards, and integrate the images into the patching and deployment solution.


C.

Build all new images from scratch, installing only needed applications and modules in accordance with the new security standards.


D.

Run a script during server deployment to remove all the unnecessary applications as part of provisioning.


Expert Solution
Questions # 67:

Audit findings indicate several user endpoints are not utilizing full disk encryption During me remediation process, a compliance analyst reviews the testing details for the endpoints and notes the endpoint device configuration does not support full disk encryption Which of the following is the most likely reason me device must be replaced'

Options:

A.

The HSM is outdated and no longer supported by the manufacturer


B.

The vTPM was not properly initialized and is corrupt.


C.

The HSM is vulnerable to common exploits and a firmware upgrade is needed


D.

The motherboard was not configured with a TPM from the OEM supplier.


E.

The HSM does not support sealing storage


Expert Solution
Questions # 68:

Protected company data was recently exfiltrated. The SOC did not find any indication of a network or outside physical intrusion, and the DLP systems reported no unusual activity. The incident response team determined a text file was encrypted and reviews the following log excerpt:

Question # 68

Which of the following is the most appropriate action for the team to take?

Options:

A.

Review the email security settings for proper configurations.


B.

Investigate whether the employee had access to the data that was leaked.


C.

Scan attachments with a third-party virus scan to independently confirm the results.


D.

Analyze the hardware for undetected supply chain vulnerabilities that may have been exploited.


Expert Solution
Questions # 69:

A user tried to access a web page at http://10.1.1.1. Previously the web page did not require authentication, and now the browser is prompting for credentials. Which of the following actions would best prevent the issue from reoccurring and reduce the likelihood of credential exposure?

Options:

A.

Implementing 802.1x EAP-TTLS on access points to reduce the risk of evil twins


B.

Transitioning internal services to use DNS security


C.

Modifying web server configuration and utilizing X509 certificates for authentication


D.

Installing new rules for the IDS to detect impersonation attacks


Expert Solution
Questions # 70:

Emails that the marketing department is sending to customers are going to the customers' spam folders. The security team is investigating the issue and discovers that the certificates used by the email server were reissued, but DNS records had not been updated. Which of the following should the security team update in order to fix this issue? (Select three).

Options:

A.

DMARC


B.

SPF


C.

DKIM


D.

DNSSEC


E.

SASE


F.

SAN


G.

SOA


Expert Solution
Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions