Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA CASP CAS-005 Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions
Questions # 81:

A company developed a new solution that needs to track any changes to the data, and the changes need to be quickly identified. If any changes are attempted without prior approval, multiple events must be triggered, such as:

    Raising alerts

    Blocking the unapproved changes

    Quickly removing access to the data

Which of the following solutions best meets these requirements?

Options:

A.

Tracking all application logs, integrating them to the existing SIEM, flagging any changes, and making them visible on security dashboards


B.

Implementing a file integrity monitoring tool and integrating it via orchestration and automation with other security tools


C.

Introducing more granular access controls and allowing read-only access for non-privileged users


D.

Configuring CASB rules, making access to the data available only to authorized personnel


Expert Solution
Questions # 82:

A global organization is reviewing potential vendors to outsource a critical payroll function. Each vendor ' s plan includes using local resources in multiple regions to ensure compliance with all regulations. The organization ' s Chief Information Security Officer is conducting a risk assessment on the potential outsourcing vendors ' subprocessors. Which of the following best explains the need for this risk assessment?

Options:

A.

Risk mitigations must be more comprehensive than the existing payroll provider.


B.

Due care must be exercised during all procurement activities.


C.

The responsibility of protecting PII remains with the organization.


D.

Specific regulatory requirements must be met in each jurisdiction.


Expert Solution
Questions # 83:

After an incident response exercise, a security administrator reviews the following table:

Question # 83

Which of the following should the administrator do to beat support rapid incident response in the future?

Options:

A.

Automate alerting to IT support for phone system outages.


B.

Enable dashboards for service status monitoring


C.

Send emails for failed log-In attempts on the public website


D.

Configure automated Isolation of human resources systems


Expert Solution
Questions # 84:

A company implements an Al model that handles sensitive and personally identifiable information. Which of the following threats is most likely the company ' s primary concern?

Options:

A.

Unsecured output handling


B.

Model theft


C.

Model poisoning


D.

Prompt injection


Expert Solution
Questions # 85:

A company migrating to aremote work model requires that company-owned devices connect to a VPN before logging in to the device itself. The VPN gateway requires that a specific key extension is deployed to the machine certificates in the internal PKI. Which of the following best explains this requirement?

Options:

A.

The certificate is an additional factor to meet regulatory MFA requirements for VPN access.


B.

The VPN client selected the certificate with the correct key usage without user interaction.


C.

The internal PKI certificate deployment allows for Wi-Fi connectivity before logging in to other systems.


D.

The server connection uses SSL VPN, which uses certificates for secure communication.


Expert Solution
Questions # 86:

A security architect is performing threat-modeling activities related to an acquired overseas software company that will be integrated with existing products and systems Once its software is integrated, the software company will process customer data for the acqumng company Given the following:

Question # 86

Which of the following mitigations would reduce the risk of the most significant threats?

Options:

A.

Privileged access management system with conditional access capabilities to prevent unauthorized access


B.

Rate-limiting capabilities on all authentication systems and leveraging single sign-on through federation


C.

Secure development process with gate checks and appropriate code scanning


D.

Zero Trust architecture for all assets from the acquired company using microsegmentation against sensitive applications


Expert Solution
Questions # 87:

A company ' s security policy states that any publicly available server must be patched within 12 hours after a patch is released A recent llS zero-day vulnerability was discovered that affects all versions of the Windows Server OS:

Question # 87

Which of the following hosts should a security analyst patch first once a patch is available?

Options:

A.

1


B.

2


C.

3


D.

4


E.

5


F.

6


Expert Solution
Questions # 88:

A security administrator needs to review the efficacy of the detection rules configured on the SIEM by employing real-world attacker TTPs. Which of the following actions should the security administrator take to accomplish this objective?

Options:

A.

Perform an internal penetration test.


B.

Use adversary emulation.


C.

Execute an internal vulnerability assessment.


D.

Perform a threat hunt exercise.


E.

Ingest new threat intelligence feeds.


Expert Solution
Questions # 89:

A global organization wants to manage all endpoint and user telemetry. The organization also needs to differentiate this data based on which office it is correlated to. Which of the following strategies best aligns with this goal?

Options:

A.

Sensor placement


B.

Data labeling


C.

Continuous monitoring


D.

Centralized logging


Expert Solution
Questions # 90:

An organization is implementing Zero Trust architecture A systems administrator must increase the effectiveness of the organization ' s context-aware access system. Which of the following is the best way to improve the effectiveness of the system?

Options:

A.

Secure zone architecture


B.

Always-on VPN


C.

Accurate asset inventory


D.

Microsegmentation


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions