Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Ace Your CAS-004 CompTIA CASP Exam

Page: 14 / 43
Total 571 questions

CompTIA SecurityX Certification Exam Questions and Answers

Question 53

During a vendor assessment, an analyst reviews a listing of the complementary user entity controls included in the audit report. Which of the following is the most important aspect to consider when reviewing this list with the security team?

Options:

A.

How the organization will implement and monitor the user entity controls

B.

How the CSP performs the controls on behalf of the user entity

C.

How the organization should monitor the CSP's execution of the user entity controls

D.

How the user entity will audit the CSP's implementation of the user entity controls

Question 54

A financial institution generates a list of newly created accounts and sensitive information on a daily basis. The financial institution then sends out a file containing thousands of lines of data. Which of the following would be the best way to reduce the risk of a malicious insider making changes to the file that could go undetected?

Options:

A.

Write a SIEM rule that generates a critical alert when files are created on the application server.

B.

Implement a FIM that automatically generates alerts when the file is accessed by IP addresses that are not associated with the application.

C.

Create a script that compares the size of the file on an hourly basis and generates alerts when changes are identified.

D.

Tune the rules on the host-based IDS for the application server to trigger automated alerts when the application server is accessed from the internet.

Question 55

Which of the following ensures that certain inbound traffic from third-party vendors is restricted from being sourced from high-risk countries?

Options:

A.

Microsegmentation

B.

Supply chain visibility

C.

Geocoded firewall rules

D.

Source code reviews

Question 56

A security analyst has been tasked with assessing a new API The analyst needs to be able to test for a variety of different inputs, both malicious and benign, in order to close any vulnerabilities Which of the following should the analyst use to achieve this goal?

Options:

A.

Static analysis

B.

Input validation

C.

Fuzz testing

D.

Post-exploitation

Page: 14 / 43
Total 571 questions