ExamGecko
Home / CompTIA / CAS-005 / List of questions
Ask Question

CompTIA CAS-005 Practice Test - Questions Answers, Page 13

Add to Whishlist

List of questions

Question 121

Report Export Collapse

Operational technology often relies upon aging command, control, and telemetry subsystems that were created with the design assumption of:

Become a Premium Member for full access
  Unlock Premium Member

Question 122

Report Export Collapse

Which of the following key management practices ensures that an encryption key is maintained within the organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 123

Report Export Collapse

An organization has been using self-managed encryption keys rather than the free keys managed by the cloud provider. The Chief Information Security Officer (CISO) reviews the monthly bill and realizes the self-managed keys are more costly than anticipated. Which of the following should the CISO recommend to reduce costs while maintaining a strong security posture?

Become a Premium Member for full access
  Unlock Premium Member

Question 124

Report Export Collapse

A company wants to protect against the most common attacks and rapidly integrate with different programming languages. Which of the following technologies is most likely to meet this need?

Become a Premium Member for full access
  Unlock Premium Member

Question 125

Report Export Collapse

A security officer performs due diligence activities before implementing a third-party solution into the enterprise environment. The security officer needs evidence from the third party that a data subject access request handling process is in place. Which of the following is the security officer most likely seeking to maintain compliance?

Become a Premium Member for full access
  Unlock Premium Member

Question 126

Report Export Collapse

Source code snippets for two separate malware samples are shown below:

Sample 1:

knockEmDown(String e) {

if(target.isAccessed()) {

target.toShell(e);

System.out.printIn(e.toString());

c2.sendTelemetry(target.hostname.toString + ' is ' + e.toString());

} else {

target.close();

}

}

Sample 2:

targetSys(address a) {

if(address.islpv4()) {

address.connect(1337);

address.keepAlive('paranoid');

String status = knockEmDown(address.current);

remote.sendC2(address.current + ' is ' + status);

} else {

throw Exception e;

}

}

Which of the following describes the most important observation about the two samples?

Become a Premium Member for full access
  Unlock Premium Member

Question 127

Report Export Collapse

A security engineer wants to stay up-to-date on new detections that are released on a regular basis. The engineer's organization uses multiple tools rather than one specific vendor security stack. Which of the following rule-based languages is the most appropriate to use as a baseline for detection rules with the multiple security tool setup?

Become a Premium Member for full access
  Unlock Premium Member

Question 128

Report Export Collapse

A company reduced its staff 60 days ago, and applications are now starting to fail. The security analyst is investigating to determine if there is malicious intent for the application failures. The security analyst reviews the following logs:

Mar 5 22:09:50 akj3 sshd[21502]: Success login for userOl from 192.168.2.5

Mar 5 22:10:00 akj3 sshd[21502]: Failed login for userID from 192.168.2.5

Which of the following is the most likely reason for the application failures?

Become a Premium Member for full access
  Unlock Premium Member

Question 129

Report Export Collapse

A developer makes a small change to a resource allocation module on a popular social media website and causes a memory leak. During a peak utilization period, several web servers crash, causing the website to go offline. Which of the following testing techniques is the most efficient way to prevent this from reoccurring?

Become a Premium Member for full access
  Unlock Premium Member

Question 130

Report Export Collapse

A company receives reports about misconfigurations and vulnerabilities in a third-party hardware device that is part of its released products. Which of the following solutions is the best way for the company to identify possible issues at an earlier stage?

Become a Premium Member for full access
  Unlock Premium Member
Total 198 questions
Go to page: of 20
Search

Related questions