ExamGecko
Home / CompTIA / CAS-005 / List of questions
Ask Question

CompTIA CAS-005 Practice Test - Questions Answers, Page 21

Add to Whishlist

List of questions

Question 201

Report Export Collapse

Which of the following security risks should be considered as an organization reduces cost and increases availability of services by adopting serverless computing?

Become a Premium Member for full access
  Unlock Premium Member

Question 202

Report Export Collapse

An attacker infiltrated the code base of a hardware manufacturer and inserted malware before the code was compiled. The malicious code is now running at the hardware level across a number of industries and sectors. Which of the following categories best describes this type of vendor risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 203

Report Export Collapse

An enterprise is deploying APIs that utilize a private key and a public key to ensure the connection string is protected. To connect to the API, customers must use the private key. Which of the following would best secure the REST API connection to the database while preventing the use of a hard-coded string in the request string?

Become a Premium Member for full access
  Unlock Premium Member

Question 204

Report Export Collapse

A recent security audit identified multiple endpoints have the following vulnerabilities:

* Various unsecured open ports

* Active accounts for terminated personnel

* Endpoint protection software with legacy versions

* Overly permissive access rules

Which of the following would best mitigate these risks? (Select three).

Become a Premium Member for full access
  Unlock Premium Member

Question 205

Report Export Collapse

After a vendor identified a recent vulnerability, a severity score was assigned to the vulnerability. A notification was also publicly distributed. Which of the following would most likely include information regarding the vulnerability and the recommended remediation steps?

Become a Premium Member for full access
  Unlock Premium Member

Question 206

Report Export Collapse

A security analyst notices a number of SIEM events that show the following activity:

10/30/2020 - 8:01 UTC - 192.168.1.1 - sc stop HinDctend

10/30/2020 - 8:05 UTC - 192.168.1.2 - c:\program files\games\comptidcasp.exe

10/30/2020 - 8:07 UTC - 192.168.1.1 - c:\windows\system32\cmd.exe /c powershell

10/30/2020 - 8:07 UTC - 192.168.1.1 - powershell ---> 40.90.23.154:443

Which of the following response actions should the analyst take first?

Become a Premium Member for full access
  Unlock Premium Member

Question 207

Report Export Collapse

A security team determines that the most significant risks within the pipeline are:

* Unauthorized code changes

* The current inability to perform independent verification of software modules

Which of the following best addresses these concerns?

Become a Premium Member for full access
  Unlock Premium Member

Question 208

Report Export Collapse

A security engineer is reviewing the following vulnerability scan report:

CompTIA CAS-005 image Question 10 63882237314879638049372

Which of the following should the engineer prioritize for remediation?

Become a Premium Member for full access
  Unlock Premium Member

Question 209

Report Export Collapse

A malware researcher has discovered a credential stealer is looking at a specific memory register to harvest passwords that will be used later for lateral movement in corporate networks. The malware is using TCP 4444 to communicate with other workstations. The lateral movement would be best mitigated by:

Become a Premium Member for full access
  Unlock Premium Member

Question 210

Report Export Collapse

While investigating a security event an analyst finds evidence that a user opened an email attachment from an unknown source. Shortly after the user opened the attachment, a group of servers experienced a large amount of network and resource activity. Upon investigating the servers, the analyst discovers the servers were encrypted by ransomware that is demanding payment within 48 hours or all data will be destroyed. The company has no response plans for ransomware. Which of the following is the next step the analyst should take after reporting the incident to the management team?

Become a Premium Member for full access
  Unlock Premium Member
Total 222 questions
Go to page: of 23
Search

Related questions