View Mode
Q: 11
[Governance, Risk, and Compliance (GRC)] A systems administrator wants to introduce a newly released feature for an internal application. The administrate docs not want to test the feature in the production environment. Which of the following locations is the best place to test the new feature?
Options
Q: 12
[Security Architecture] Asecuntv administrator is performing a gap assessment against a specific OS benchmark The benchmark requires the following configurations be applied to endpomts: • Full disk encryption * Host-based firewall • Time synchronization * Password policies • Application allow listing * Zero Trust application access Which of the following solutions best addresses the requirements? (Select two).
Options
Q: 13
[Security Architecture] A company wants to invest in research capabilities with the goal to operationalize the research output. Which of the following is the best option for a security architect to recommend?
Options
Q: 14
[Identity and Access Management (IAM)] An external SaaS solution user reports a bug associated with the role-based access control module. This bug allows users to bypass system logic associated with client segmentation in the multitenant deployment model. When assessing the bug report, the developer finds that the same bug was previously identified and addressed in an earlier release. The developer then determines the bug was reintroduced when an existing software component was integrated from a prior version of the platform. Which of the following is the best way to prevent this scenario?
Options
Q: 15
[Security Architecture] A security architect must make sure that the least number of services as possible is exposed in order to limit an adversary's ability to access the systems. Which of the following should the architect do first?
Options
Q: 16
SIMULATION [Identity and Access Management (IAM)] A product development team has submitted code snippets for review prior to release. INSTRUCTIONS Analyze the code snippets, and then select one vulnerability, and one fix for each code snippet. Code Snippet 1 Security X CASP+ CAS-005 question Code Snippet 2 Security X CASP+ CAS-005 question Vulnerability 1: SQL injection Cross-site request forgery Server-side request forgery Indirect object reference Cross-site scripting Fix 1: Perform input sanitization of the userid field. Perform output encoding of queryResponse, Ensure usex:ia belongs to logged-in user. Inspect URLS and disallow arbitrary requests. Implementanti-forgery tokens. Vulnerability 2 1) Denial of service 2) Command injection 3) SQL injection 4) Authorization bypass 5) Credentials passed via GET Fix 2 A) Implement prepared statements and bind variables. B) Remove the serve_forever instruction. C) Prevent the "authenticated" value from being overridden by a GET parameter. D) HTTP POST should be used for sensitive parameters. E) Perform input sanitization of the userid field.
Your Answer
Q: 17
SIMULATION [Security Architecture] During the course of normal SOC operations, three anomalous events occurred and were flagged as potential IoCs. Evidence for each of these potential IoCs is provided. INSTRUCTIONS Review each of the events and select the appropriate analysis and remediation options for each IoC. Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question
Your Answer
Q: 18
SIMULATION [Security Architecture] You are a security analyst tasked with interpreting an Nmap scan output from company’s privileged network. The company’s hardening guidelines indicate the following: There should be one primary server or service per device. Only default ports should be used. Non-secure protocols should be disabled. INSTRUCTIONS Using the Nmap output, identify the devices on the network and their roles, and any open ports that should be closed. For each device found by Nmap, add a device entry to the Devices Discovered list, with the following information: The IP address of the device The primary server or service of the device (Note that each IP should by associated with one service/port only) The protocol(s) that should be disabled based on the hardening guidelines (Note that multiple ports may need to be closed to comply with the hardening guidelines) If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question
Your Answer
Q: 19
SIMULATION [Security Architecture] A security engineer needs to review the configurations of several devices on the network to meet the following requirements: • The PostgreSQL server must only allow connectivity in the 10.1.2.0/24 subnet. • The SSH daemon on the database server must be configured to listen to port 4022. • The SSH daemon must only accept connections from a Single workstation. • All host-based firewalls must be disabled on all workstations. • All devices must have the latest updates from within the past eight days. •All HDDs must be configured to secure data at rest. • Cleartext services are not allowed. • All devices must be hardened when possible. Instructions: Click on the various workstations and network devices to review the posture assessment results. Remediate any possible issues or indicate that no issue is found. Click on Server A to review output data. Select commands in the appropriate tab to remediate connectivity problems to the pOSTGREsql DATABASE VIA ssh Security X CASP+ CAS-005 question WAP A Security X CASP+ CAS-005 question PC A Security X CASP+ CAS-005 question Laptop A Security X CASP+ CAS-005 question Switch A Security X CASP+ CAS-005 question Switch B: Security X CASP+ CAS-005 question Laptop B Security X CASP+ CAS-005 question PC B Security X CASP+ CAS-005 question PC C Security X CASP+ CAS-005 question Server A Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question
Your Answer
Q: 20

SIMULATION [Security Architecture] An organization is planning for disaster recovery and continuity ofoperations, and has noted the following relevant findings: 1. A natural disaster may disrupt operations at Site A, which would then cause an evacuation. Users are unable to log into the domain from-their workstations after relocating to Site B. 2. A natural disaster may disrupt operations at Site A, which would then cause the pump room at Site B to become inoperable. 3. A natural disaster may disrupt operations at Site A, which would then cause unreliable internet connectivity at Site B due to route flapping. INSTRUCTIONS Match each relevant finding to the affected host by clicking on the host name and selecting the appropriate number. For findings 1 and 2, select the items that should be replicated to Site B. For finding 3, select the item requiring configuration changes, then select the appropriate corrective action from the drop-down menu. Security X CASP+ CAS-005 question Security X CASP+ CAS-005 question

Your Answer
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE