Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions
Questions # 71:

An analyst reviews a SIEM and generates the following report:

Question # 71

OnlyHOST002is authorized for internet traffic. Which of the following statements is accurate?

Options:

A.

The VM002 host is misconfigured and needs to be revised by the network team.


B.

The HOST002 host is under attack, and a security incident should be declared.


C.

The SIEM platform is reporting multiple false positives on the alerts.


D.

The network connection activity is unusual, and a network infection is highly possible.


Expert Solution
Questions # 72:

During a security assessment using an CDR solution, a security engineer generates the following report about the assets in me system:

Question # 72

After five days, the EDR console reports an infection on the host 0WIN23 by a remote access Trojan Which of the following is the most probable cause of the infection?

Options:

A.

OW1N23 uses a legacy version of Windows that is not supported by the EDR


B.

LN002 was not supported by the EDR solution and propagates the RAT


C.

The EDR has an unknown vulnerability that was exploited by the attacker.


D.

0W1N29 spreads the malware through other hosts in the network


Expert Solution
Questions # 73:

After several companies in the financial industry were affected by a similar incident, they shared information about threat intelligence and the malware used for exploitation. Which of the following should the companies do to best indicate whether the attacks are being conducted by the same actor?

Options:

A.

Apply code stylometry.


B.

Look for common IOCs.


C.

Use IOC extractions.


D.

Leverage malware detonation.


Expert Solution
Questions # 74:

A security analyst is troubleshooting the reason a specific user is having difficulty accessing company resources The analyst reviews the following information:

Question # 74

Which of the following is most likely the cause of the issue?

Options:

A.

The local network access has been configured tobypass MFA requirements.


B.

A network geolocation is being misidentified by the authentication server


C.

Administrator access from an alternate location is blocked by company policy


D.

Several users have not configured their mobile devices toreceive OTP codes


Expert Solution
Questions # 75:

During a recent audit, a company's systems were assessed- Given the following information:

Question # 75

Which of the following is the best way to reduce the attack surface?

Options:

A.

Deploying an EDR solution to all impacted machines in manufacturing


B.

Segmenting the manufacturing network with a firewall and placing the rules in monitor mode


C.

Setting up an IDS inline to monitor and detect any threats to the software


D.

Implementing an application-aware firewall and writing strict rules for the application access


Expert Solution
Questions # 76:

An audit finding reveals that a legacy platform has not retained loos for more than 30 days The platform has been segmented due to its interoperability with newer technology. As a temporarysolution, the IT department changed the log retention to 120 days. Which of the following should the security engineer do to ensure the logs are being properly retained?

Options:

A.

Configure a scheduled task nightly to save the logs


B.

Configure event-based triggers to export the logs at a threshold.


C.

Configure the SIEM to aggregate the logs


D.

Configure a Python script to move the logs into a SQL database.


Expert Solution
Questions # 77:

A company SIEM collects information about the log sources. Given the following report information:

Question # 77

Which of the following actions should a security engineer take to enhance the security monitoring posture?

Options:

A.

Calibrate the timing on the log sources to enhance event correlation.


B.

Implement a centralized use case library to get alerts based on the type of log sources.


C.

Perform a non-reporting device assessment to collect missing log sources.


D.

Create a resiliency plan to prevent losing event logs from log sources.


Expert Solution
Questions # 78:

A global organization is reviewing potential vendors to outsource a critical payroll function. Each vendor's plan includes using local resources in multiple regions to ensure compliance with all regulations. The organization's Chief Information Security Officer is conducting a risk assessment on the potential outsourcing vendors' subprocessors. Which of the following best explains the need for this risk assessment?

Options:

A.

Risk mitigations must be more comprehensive than the existing payroll provider.


B.

Due care must be exercised during all procurement activities.


C.

The responsibility of protecting PII remains with the organization.


D.

Specific regulatory requirements must be met in each jurisdiction.


Expert Solution
Questions # 79:

A security administrator needs to automate alerting. The server generates structured log files that need to be parsed to determine whether an alarm has been triggered Given the following code function:

Question # 79

Which of the following is most likely the log input that the code will parse?

A)

Question # 79

B)

Question # 79

C)

Question # 79

D)

Question # 79

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 80:

A security officer received several complaints from usersabout excessive MPA push notifications at night The security team investigates and suspects malicious activities regarding user account authentication Which of the following is the best way for the security officer to restrict MI~A notifications''

Options:

A.

Provisioning FID02 devices


B.

Deploying a text message based on MFA


C.

Enabling OTP via email


D.

Configuring prompt-driven MFA


Expert Solution
Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions