Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions
Questions # 71:

A senior security engineer flags the following log file snippet as having likely facilitated an attacker’s lateral movement in a recent breach:

qry_source: 19.27.214.22 TCP/53

qry_dest: 199.105.22.13 TCP/53

qry_type: AXFR

| in comptia.org

------------ directoryserver1 A 10.80.8.10

------------directoryserver2 A 10.80.8.11

------------ directoryserver3 A 10.80.8.12

------------ internal-dns A 10.80.9.1

----------- www-int A 10.80.9.3

------------ fshare A 10.80.9.4

------------ sip A 10.80.9.5

------------ msn-crit-apcs A 10.81.22.33

Which of the following solutions, if implemented, would mitigate the risk of this issue reoccurring?

Options:

A.

Disabling DNS zone transfers


B.

Restricting DNS traffic to UDP/53


C.

Implementing DNS masking on internal servers


D.

Permitting only clients from internal networks to query DNS


Expert Solution
Questions # 72:

An organization wants to implement a secure cloud architecture across all instances. Given the following requirements:

· Establish a standard network template.

· Deployments must be consistent.

· Security policies must be able to be changed at scale.

Which of the following technologies meets these requirements?

Options:

A.

Serverless deployment model


B.

Container orchestration


C.

Infrastructure as code


D.

CLI cloud administration


E.

API gateway


Expert Solution
Questions # 73:

A water power generation plant fails a security inspection. The controllers are distributed across a river that is 0.5mi (0.8km) wide. The controllers are connected via HTTP to the shoreside master controller. The distributed controllers and the shoreside controller communicate over the internet using a cellular network. The company cannot encrypt control traffic because the systems will not tolerate the additional overhead. Which of the following strategies is the best way to reduce the risk of compromise?

Options:

A.

Monitoring control traffic for command sequences with out-of-range or unexpected values


B.

Disconnecting cellular radios in favor of shielded Cat 5e cables to each of the controllers


C.

Reviewing the ladder logic on the controllers to determine whether unauthorized changes have been introduced


D.

Deploying a dedicated base station and reducing the footprint with highly directional antennas


Expert Solution
Questions # 74:

An organization is required to

* Respond to internal andexternal inquiries in a timely manner

* Provide transparency.

* Comply with regulatory requirements

The organization has not experienced any reportable breaches but wants to be prepared if a breach occurs in the future. Which of the following is the best way for the organization to prepare?

Options:

A.

Outsourcing the handling of necessary regulatory filing to an external consultant


B.

Integrating automated response mechanisms into the data subject access request process


C.

Developing communication templates that have been vetted by internal and external counsel


D.

Conducting lessons-learned activities and integrating observations into the crisis management plan


Expert Solution
Questions # 75:

Which of the following best explains the business requirement a healthcare provider fulfills by encrypting patient data at rest?

Options:

A.

Securing data transfer between hospitals


B.

Providing for non-repudiation of data


C.

Reducing liability from identity theft


D.

Protecting privacy while supporting portability


Expert Solution
Questions # 76:

Due to locality and budget constraints, an organization’s satellite office has a lower bandwidth allocation than other offices. As a result, the local securityinfrastructure staff is assessing architectural options that will help preserve network bandwidth and increase speed to both internal and external resources while not sacrificing threat visibility. Which of the following would be the best option to implement?

Options:

A.

Distributed connection allocation


B.

Local caching


C.

Content delivery network


D.

SD-WAN vertical heterogeneity


Expert Solution
Questions # 77:

Users must accept the terms presented in a captive petal when connecting to a guest network. Recently, users have reported that they are unable to access the Internet after joining the network A network engineer observes the following:

• Users should be redirected to the captive portal.

• The Motive portal runs Tl. S 1 2

• Newer browser versions encounter security errors that cannot be bypassed

• Certain websites cause unexpected re directs

Which of the following mow likely explains this behavior?

Options:

A.

The TLS ciphers supported by the captive portal ate deprecated


B.

Employment of the HSTS setting is proliferating rapidly.


C.

Allowed traffic rules are causing the NIPS to drop legitimate traffic


D.

An attacker is redirecting supplicants to an evil twin WLAN.


Expert Solution
Questions # 78:

A SOC analyst is investigating an event in which a penetration tester was able to successfully create and execute a payload. The analyst pulls the following command history from the affected server-

Question # 78

Which of the following should the analyst implement lo improve the security of the server?

Options:

A.

Kernel-supported ASLR controls


B.

Application controls with allow lists


C.

OS restrictions of globally writable folders


D.

EDR signatures that terminate specific processes


Expert Solution
Questions # 79:

A subcontractor develops safety critical avionics software for a major aircraft manufacturer. After an incident, a third-party investigator recommends the company begin to employ formal methods in the development life cycle. Which of the following findings from the investigation most directly supports the investigator ' s recommendation?

Options:

A.

The system ' s bill of materials failed to include commercial and open-source libraries.


B.

The company lacks dynamic and Interactive application security testing standards.


C.

The codebase lacks traceability to functional and non-functional requirements.


D.

The implemented software inefficiently manages compute and memory resources.


Expert Solution
Questions # 80:

A company recently experienced an incident in which an advanced threat actor was able to shim malicious code against the hardware static of a domain controller The forensic team cryptographically validated that com the underlying firmware of the box and the operating system had not been compromised. However, the attacker was able to exfiltrate information from the server using a steganographic technique within LOAP Which of the following is me b»« way to reduce the risk oi reoccurrence?

Options:

A.

Enforcing allow lists for authorized network pons and protocols


B.

Measuring and attesting to the entire boot chum


C.

Rolling the cryptographic keys used for hardware security modules


D.

Using code signing to verify the source of OS updates


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions