CompTIA CAS-005 Practice Test - Questions Answers, Page 20

List of questions
Question 191

An organization is prioritizing efforts to remediate or mitigate risks identified during the latest assessment. For one of the risks, a full remediation was not possible, but the organization was able to successfully apply mitigations to reduce the likelihood of the impact. Which of the following should the organization perform next?
Question 192

An external threat actor attacks public infrastructure providers. In response to the attack and during follow-up activities, various providers share information obtained during response efforts. After the attack, energy sector companies share their status and response data:
Company SIEM UEBA DLP ISAC Member TIP Integration Time to Detect Time to Respond
1 Yes No Yes Yes Yes 10 minutes 20 minutes
2 Yes Yes Yes Yes No 20 minutes 40 minutes
3 Yes Yes No No Yes 12 minutes 24 minutes
Which of the following is the most important issue to address to defend against future attacks?
Question 193

A cloud engineer wants to configure mail security protocols to support email authenticity and enable the flow of email security information to a third-party platform for further analysis. Which of the following must be configured to achieve these requirements? (Select two).
Question 194

A company is preparing to move a new version of a web application to production. No issues were reported during security scanning or quality assurance in the CI/CD pipeline. Which of the following actions should the company take next?
Question 195

Which of the following best describes the reason PQC preparation is important?
Question 196

Which of the following best describes the challenges associated with widespread adoption of homomorphic encryption techniques?
Question 197

A security engineer must ensure that sensitive corporate information is not exposed if a company laptop is stolen. Which of the following actions best addresses this requirement?
Question 198

A global company's Chief Financial Officer (CFO) receives a phone call from someone claiming to be the Chief Executive Officer (CEO). The caller claims to be stranded and in desperate need of money. The CFO is suspicious, but the caller's voice sounds similar to the CEO's. Which of the following best describes this type of attack?
Question