Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 8 out of 8 pages
Viewing questions 71-80 out of questions
Questions # 71:

Company A and Company D ate merging Company A's compliance reports indicate branchprotections are not in place A security analyst needs to ensure that potential threats to the software development life cycle are addressed. Which of the following should me analyst cons

Options:

A.

If developers are unable to promote to production


B.

If DAST code is being stored to a single code repository


C.

If DAST scans are routinely scheduled


D.

If role-based training is deployed


Expert Solution
Questions # 72:

A security engineer discovers that some legacy systems are still in use or were not properly decommissioned. After further investigation, the engineer identifies that an unknown and potentially malicious server is also sending emails on behalf of the company. The security engineer extracts the following data for review:

Question # 72

Which of the following actions should the security engineer take next? (Select two).

Options:

A.

Rotate the DKIM selector to use another key.


B.

Change the DMARC policy to reject and remove references to the server.


C.

Remove the unnecessary servers from the SPF record.


D.

Change the SPF record to enforce the hard fail parameter.


E.

Update the MX record to contain only the primary email server.


F.

Change the DMARC policy to none and monitor email flow to establish a new baseline.


Expert Solution
Questions # 73:

A company updates itscloud-based services by saving infrastructure code in a remote repository. The code is automatically deployed into the development environment every time the code is saved lo the repository The developers express concern that the deployment often fails, citing minor code issues and occasional security control check failures in the development environment Which of the following should a security engineer recommend to reduce the deployment failures? (Select two).

Options:

A.

Software composition analysis


B.

Pre-commit code linting


C.

Repository branch protection


D.

Automated regression testing


E.

Code submit authorization workflow


F.

Pipeline compliance scanning


Expert Solution
Questions # 74:

A company recently experienced an incident in which an advanced threat actor was able to shim malicious code against the hardware static of a domain controller The forensic team cryptographically validated that com the underlying firmware of the box and the operating system had not been compromised. However, the attacker was able to exfiltrate information from the server using a steganographic technique within LOAP Which of the following is me b»« way to reduce the risk oi reoccurrence?

Options:

A.

Enforcing allow lists for authorized network pons and protocols


B.

Measuring and attesting to the entire boot chum


C.

Rolling the cryptographic keys used for hardware security modules


D.

Using code signing to verify the source of OS updates


Expert Solution
Viewing page 8 out of 8 pages
Viewing questions 71-80 out of questions