Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CAS-005 Exam Results

Page: 4 / 19
Total 249 questions

CompTIA SecurityX Certification Exam Questions and Answers

Question 13

A company migrated a critical workload from its data center to the cloud. The workload uses a very large data set that requires computational-intensive data processing. The business unit that uses the workload is projecting the following growth pattern:

• Storage requirements will double every six months.

• Computational requirements will fluctuate throughout the year.

• Average computational requirements will double every year.

Which of the following should the company do to address the business unit's requirements?

Options:

A.

Deploy a cloud-based CDN for storage and a load balancer for compute.

B.

Combine compute and storage in vertically autoscaling mode.

C.

Implement a load balancer for computing and storage resources.

D.

Plan for a horizontally scaling computing and storage infrastructure.

Question 14

A global manufacturing company has an internal application mat is critical to making products This application cannot be updated and must Beavailable in the production area A security architect is implementing security for the application. Which of the following best describes the action the architect should take-?

Options:

A.

Disallow wireless access to the application.

B.

Deploy Intrusion detection capabilities using a network tap

C.

Create an acceptable use policy for the use of the application

D.

Create a separate network for users who need access to the application

Question 15

A systems administrator is working with clients to verify email-based services are performing properly. The administrator wants to have the email server digitally sign outbound emails using the organization's private key. Which of the following should the systems administrator configure?

Options:

A.

SPF

B.

DKIM

C.

DMARC

D.

TLS

Question 16

Which of the following best describes the reason a network architect would enable forward secrecy on all VPN tunnels?

Options:

A.

This process is a requirement to enable hardware-accelerated cryptography.

B.

This process reduces the success of attackers performing cryptanalysis.

C.

The business requirements state that confidentiality is a critical success factor.

D.

Modern cryptographic protocols list this process as a prerequisite for use.

Page: 4 / 19
Total 249 questions