Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
Questions # 81:

A security engineer wants to improve the security of an application as part of the development pipeline. The engineer reviews the following component of an internally developed web application that allows employees to manipulate documents from a number of internal servers:

response = requests.get(url)

Users can specify the document to be parsed by passing the document URL to the application as a parameter. Which of the following is the best solution?

Options:

A.

Indexing


B.

Output encoding


C.

Code scanner


D.

Penetration testing


Expert Solution
Questions # 82:

An organization decides to move to a distributed workforce model. Several legacy systems exist on premises and cannot be migrated because of existing compliance requirements. However, all new systems are required to be cloud-based. Which of the following would best ensure network access security?

Options:

A.

Utilizing a VPN for all users who require legacy system access


B.

Shifting all legacy systems to the existing public cloud infrastructure


C.

Configuring an SDN to block malicious traffic to on-premises networks


D.

Deploying microsegmentation with a firewall acting as the core router


Expert Solution
Questions # 83:

After remote desktop capabilities were deployed in the environment, various vulnerabilities were noticed.

• Exfiltration of intellectual property

• Unencrypted files

• Weak user passwords

Which of the following is the best way to mitigate these vulnerabilities? (Select two).

Options:

A.

Implementing data loss prevention


B.

Deploying file integrity monitoring


C.

Restricting access to critical file services only


D.

Deployingdirectory-based group policies


E.

Enabling modem authentication that supports MFA


F.

Implementing a version control system


G.

Implementing a CMDB platform


Expert Solution
Questions # 84:

An organization found a significant vulnerability associated with a commonly used package in a variety of operating systems. The organization develops a registry of software dependencies to facilitate incident response activities. As part of the registry, the organization creates hashes of packages that have been formally vetted. Which of the following attack vectors does this registry address?

Options:

A.

Supply chain attack B. Cipher substitution attack C. Side-channel analysis D. On-path attack E. Pass-the-hash attack


Expert Solution
Questions # 85:

A company experienced a data breach, resulting in the disclosure of extremely sensitive data regarding a merger. As a regulated entity, the company must comply with reporting and disclosure requirements. The company is concerned about its public image and shareholder values. Which of the following best supports the organization in addressing its concerns?

Options:

A.

Data subject access request


B.

Business impact analysis


C.

Supply chain management program


D.

Crisis management plan


Expert Solution
Questions # 86:

After an incident occurred, a team reported during the lessons-learned review that the team.

* Lost important Information for further analysis.

* Did not utilize the chain of communication

* Did not follow the right steps for a proper response

Which of the following solutions is the best way to address these findinds?

Options:

A.

Requestingbudget for better forensic tools to Improve technical capabilities for Incident response operations


B.

Building playbooks for different scenarios and performing regular table-top exercises


C.

Requiring professional incident response certifications tor each new team member


D.

Publishing the incident response policy and enforcing it as part of the security awareness program


Expert Solution
Questions # 87:

A security analyst discovered requests associated with IP addresses known for born legitimate 3nd bot-related traffic. Which ofthe following should the analyst use to determine whether the requests are malicious?

Options:

A.

User-agent string


B.

Byte length of the request


C.

Web application headers


D.

HTML encoding field


Expert Solution
Questions # 88:

A security architect must make sure that the least number of services as possible is exposed in order to limit an adversary's ability to access the systems. Which of the following should the architect do first?

Options:

A.

Enforce Secure Boot.


B.

Performattack surface reduction.


C.

Disable third-party integrations.


D.

Limit access to the systems.


Expert Solution
Questions # 89:

A company isolated its OT systems from other areas of the corporate network These systems are required to report usage information over the internet to the vendor Which oi the following b*st reduces the risk of compromise or sabotage' (Select two).

Options:

A.

Implementing allow lists


B.

Monitoring network behavior


C.

Encrypting data at rest


D.

Performing boot Integrity checks


E.

Executing daily health checks


F.

Implementing a site-to-site IPSec VPN


Expert Solution
Questions # 90:

Due to an infrastructure optimization plan, a company has moved from a unified architecture to a federated architecture divided by region. Long-term employees now have a better experience, but new employees are experiencing major performance issues when traveling between regions. The company is reviewing the following information:

Question # 90

Question # 90

Which of the following is the most effective action to remediate the issue?

Options:

A.

Creating a new user entry in the affected region for the affected employee


B.

Synchronizing all regions* user identities and ensuring ongoing synchronization


C.

Restarting European region physical access control systems


D.

Resyncing single sign-on application with connected security appliances


Expert Solution
Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions