ExamGecko
Home / CompTIA / CAS-005 / List of questions
Ask Question

CompTIA CAS-005 Practice Test - Questions Answers, Page 22

Add to Whishlist

List of questions

Question 211

Report Export Collapse

The device event logs sourced from MDM software are as follows:

Device | Date/Time | Location | Event | Description

ANDROID_102 | 01JAN21 0255 | 38.9072N, 77.0369W | PUSH | APPLICATION 1220 INSTALL QUEUED

ANDROID_102 | 01JAN21 0301 | 38.9072N, 77.0369W | INVENTORY | APPLICATION 1220 ADDED

ANDROID_1022 | 01JAN21 0701 | 39.0067N, 77.4291W | CHECK-IN | NORMAL

ANDROID_1022 | 01JAN21 0701 | 25.2854N, 51.5310E | CHECK-IN | NORMAL

ANDROID_1022 | 01JAN21 0900 | 39.0067N, 77.4291W | CHECK-IN | NORMAL

ANDROID_1022 | 01JAN21 1030 | 39.0067N, 77.4291W | STATUS | LOCAL STORAGE REPORTING 85% FULL

Which of the following security concerns and response actions would best address the risks posed by the device in the logs?

Become a Premium Member for full access
  Unlock Premium Member

Question 212

Report Export Collapse

Which of the following best describes a common use case for homomorphic encryption?

Become a Premium Member for full access
  Unlock Premium Member

Question 213

Report Export Collapse

A security architect is investigating instances of employees who had their phones stolen in public places through seemingly targeted attacks. Devices are able to access company resources such as email and internal documentation, some of which can persist in application storage. Which of the following would best protect the company from information exposure? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 214

Report Export Collapse

A social media company wants to change encryption ciphers after identifying weaknesses in the implementation of the existing ciphers. The company needs the new ciphers to meet the following requirements:

* Utilize less RAM than competing ciphers.

* Be more CPU-efficient than previous ciphers.

* Require customers to use TLS 1.3 while broadcasting video or audio.

Which of the following is the best choice for the social media company?

Become a Premium Member for full access
  Unlock Premium Member

Question 215

Report Export Collapse

A Chief Information Security Officer (CISO) is concerned that a company's current data disposal procedures could result in data remanence. The company uses only SSDs. Which of the following would be the most secure way to dispose of the SSDs given the CISO's concern?

Become a Premium Member for full access
  Unlock Premium Member

Question 216

Report Export Collapse

A healthcare system recently suffered from a ransomware incident. As a result, the board of directors decided to hire a security consultant to improve existing network security. The security consultant found that the healthcare network was completely flat, had no privileged access limits, and had open RDP access to servers with personal health information. As the consultant builds the remediation plan, which of the following solutions would best solve these challenges? (Select three).

Become a Premium Member for full access
  Unlock Premium Member

Question 217

Report Export Collapse

Company A acquired Company B. During an audit, a security engineer found Company B's environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B's infrastructure could be integrated into Company A's security program. Which of the following risk-handling techniques was used?

Become a Premium Member for full access
  Unlock Premium Member

Question 218

Report Export Collapse

An organization recently implemented a purchasing freeze that has impacted endpoint life-cycle management efforts. Which of the following should a security manager do to reduce risk without replacing the endpoints?

Become a Premium Member for full access
  Unlock Premium Member

Question 219

Report Export Collapse

A local government that is investigating a data exfiltration claim was asked to review the fingerprint of the malicious user's actions. An investigator took a forensic image of the VM and downloaded the image to a secured USB drive to share with the government. Which of the following should be taken into consideration during the process of releasing the drive to the government?

Become a Premium Member for full access
  Unlock Premium Member

Question 220

Report Export Collapse

A pharmaceutical lab hired a consultant to identify potential risks associated with Building 2, a new facility that is under construction. The consultant received the IT project plan, which includes the following VLAN design:

CompTIA CAS-005 image Question 22 63882237314895262713492

Which of the following TTPs should the consultant recommend be addressed first?

Become a Premium Member for full access
  Unlock Premium Member
Total 222 questions
Go to page: of 23
Search

Related questions