CompTIA Related Exams
CAS-005 Exam
A company wants to implement hardware security key authentication for accessing sensitive information systems The goal is to prevent unauthorized users from gaining access with a stolen password Which of the following models should the company implement to b«st solve this issue?
A security analyst is reviewing a SIEM and generates the following report:
Later, the incident response team notices an attack was executed on the VM001 host. Which of the following should the security analyst do to enhance the alerting process on the SIEM platform?
An administrator reviews the following log and determines the root cause of a site-to-site tunnel failure:
Which of the following actions should the administrator take to most effectively correct the failure?