Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the CompTIA CASP CAS-005 Questions and answers with Dumpstech

Exam CAS-005 Premium Access

View all detail and faqs for the CAS-005 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following AI concerns is most adequately addressed by input sanitation?

Options:

A.

Model inversion

B.

Prompt Injection

C.

Data poisoning

D.

Non-explainable model

Questions # 82:

A developer receives feedback about code quality and efficiency. The developer needs to identify and resolve the following coding issues before submitting the code changes for peer review:

    Indexing beyond arrays

    Dereferencing null pointers

    Potentially dangerous data type combinations

    Unreachable code

    Non-portable constructs

Which of the following would be most appropriate for the developer to use in this situation?

Options:

A.

Linting

B.

SBoM

C.

DAST

D.

Branch protection

E.

Software composition analysis

Questions # 83:

An IPSec solution is being deployed. The configuration files for both the VPN

concentrator and the AAA server are shown in the diagram.

Complete the configuration files to meet the following requirements:

• The EAP method must use mutual certificate-based authentication (With

issued client certificates).

• The IKEv2 Cipher suite must be configured to the MOST secure

authenticated mode of operation,

• The secret must contain at least one uppercase character, one lowercase

character, one numeric character, and one special character, and it must

meet a minimumlength requirement of eight characters,

INSTRUCTIONS

Click on the AAA server and VPN concentrator to complete the configuration.

Fill in the appropriate fields and make selections from the drop-down menus.

Question # 83

VPN Concentrator:

Question # 83

AAA Server:

Question # 83

Options:

Questions # 84:

An organization is increasing its focus on training that addresses new social engineering and phishing attacks. Which of the following is the organization most concerned about?

Options:

A.

Meeting existing regulatory compliance

B.

Overreliance on AI support bots

C.

Generative AI tools increasing the quality of exploits

D.

Differential analysis using AI models

Questions # 85:

Which of the following supports the process of collecting a large pool of behavioral observations to inform decision-making?

Options:

A.

Linear regression

B.

Distributed consensus

C.

Big Data

D.

Machine learning

Questions # 86:

An external threat actor attacks public infrastructure providers. In response to the attack and during follow-up activities, various providers share information obtained during response efforts. After the attack, energy sector companies share their status and response data:

Company

SIEM

UEBA

DLP

ISAC Member

TIP Integration

Time to Detect

Time to Respond

1

Yes

No

Yes

Yes

Yes

10 minutes

20 minutes

2

Yes

Yes

Yes

Yes

No

20 minutes

40 minutes

3

Yes

Yes

No

No

Yes

12 minutes

24 minutes

Which of thefollowing is the most important issue to address to defend against future attacks?

Options:

A.

Failure to implement a UEBA system

B.

Failure to implement a DLP system

C.

Failure to join the industry ISAC

D.

Failure to integrate with the TIP

Questions # 87:

A security administrator is reviewing the following code snippet from a website component:

Question # 87

A review of the inc.tmp file shows the following:

Question # 87

Which of the following is most likely the reason for inaccuracies?

Options:

A.

A content management solution plug-in has been exploited.

B.

A search engine's bots are being blocked at the firewall.

C.

The relevant stylesheet has become corrupted.

D.

The WAF is configured to be in transparent mode.

Questions # 88:

A security analyst is developing a threat model that focuses on attacks associated with the organization's storage products. The products:

• Are used in commercial and government user environments

• Are required to comply with crypto-export requirements

• Include both hardware and software components that are developed by external vendors in Europe and Asia

Which of the following are the most important for the analyst to consider when developing the model? (Select two).

Options:

A.

Contractual obligations

B.

Legal hold obligations

C.

Trust boundaries

D.

Cloud services enumeration

E.

Supply chain access

F.

Homomorphic encryption usage

Questions # 89:

Question # 89

An administrator needs to craft a single certificate-signing request for a web-server certificate. The server should be able to use the following identities to mutually authenticate other resources over TLS:

• wwwJnt.comptia.org

• webserver01.int.comptia.org

•10.5.100.10

Which of the following certificate fields must be set properly to support this objective?

Options:

A.

Subject alternative name

B.

Organizational unit

C.

Extended key usage

D.

Certificate extension

Questions # 90:

Which of the following best describes the reason PQC preparation is important?

Options:

A.

To protect data against decryption due to increases in computational resource availability

B.

To have larger key lengths available through key stretching

C.

To improve encryption performance and speed using lightweight cryptography

D.

To leverage asymmetric encryption for large amounts of data

Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions