CompTIA CAS-005 Practice Test - Questions Answers, Page 21

List of questions
Question 201

Which of the following security risks should be considered as an organization reduces cost and increases availability of services by adopting serverless computing?
Question 202

An attacker infiltrated the code base of a hardware manufacturer and inserted malware before the code was compiled. The malicious code is now running at the hardware level across a number of industries and sectors. Which of the following categories best describes this type of vendor risk?
Question 203

An enterprise is deploying APIs that utilize a private key and a public key to ensure the connection string is protected. To connect to the API, customers must use the private key. Which of the following would best secure the REST API connection to the database while preventing the use of a hard-coded string in the request string?
Question 204

A recent security audit identified multiple endpoints have the following vulnerabilities:
* Various unsecured open ports
* Active accounts for terminated personnel
* Endpoint protection software with legacy versions
* Overly permissive access rules
Which of the following would best mitigate these risks? (Select three).
Question 205

After a vendor identified a recent vulnerability, a severity score was assigned to the vulnerability. A notification was also publicly distributed. Which of the following would most likely include information regarding the vulnerability and the recommended remediation steps?
Question 206

A security analyst notices a number of SIEM events that show the following activity:
10/30/2020 - 8:01 UTC - 192.168.1.1 - sc stop HinDctend
10/30/2020 - 8:05 UTC - 192.168.1.2 - c:\program files\games\comptidcasp.exe
10/30/2020 - 8:07 UTC - 192.168.1.1 - c:\windows\system32\cmd.exe /c powershell
10/30/2020 - 8:07 UTC - 192.168.1.1 - powershell ---> 40.90.23.154:443
Which of the following response actions should the analyst take first?
Question 207

A security team determines that the most significant risks within the pipeline are:
* Unauthorized code changes
* The current inability to perform independent verification of software modules
Which of the following best addresses these concerns?
Question 208

A security engineer is reviewing the following vulnerability scan report:
Which of the following should the engineer prioritize for remediation?
Question 209

A malware researcher has discovered a credential stealer is looking at a specific memory register to harvest passwords that will be used later for lateral movement in corporate networks. The malware is using TCP 4444 to communicate with other workstations. The lateral movement would be best mitigated by:
Question 210

While investigating a security event an analyst finds evidence that a user opened an email attachment from an unknown source. Shortly after the user opened the attachment, a group of servers experienced a large amount of network and resource activity. Upon investigating the servers, the analyst discovers the servers were encrypted by ransomware that is demanding payment within 48 hours or all data will be destroyed. The company has no response plans for ransomware. Which of the following is the next step the analyst should take after reporting the incident to the management team?
Question