Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

SecurityX CAS-005 Updated Exam

Page: 20 / 26
Total 344 questions

CompTIA SecurityX Certification Exam Questions and Answers

Question 77

A security analyst is reviewing the following log:

Which of the following possible events should the security analyst investigate further?

Options:

A.

A macro that was prevented from running

B.

A text file containing passwords that were leaked

C.

A malicious file that was run in this environment

D.

A PDF that exposed sensitive information improperly

Question 78

Engineers are unable to control pumps at Site A from Site B when the SCADA controller at Site A experiences an outage. A security analyst must provide a secure solution that ensures Site A pumps can be controlled by a SCADA controller at Site B if a similar outage occurs again. Which of the following represents the most cost-effective solution?

Options:

A.

Procure direct fiber connectivity between Site A and Site B and limit its use to the critical SCADA controller traffic only

B.

Install backup SCADA controllers at each site, isolate them from the OT network, and assign these backup controllers as high-availability pairs.

C.

Isolate the OT environment by providing an air-gapped network segment. Place the SCADA controller for each site in this network segment to minimize outages.

D.

Configure VPN concentrators inside the OT network segments at Site A and Site B and allow the controllers to act as secondary devices for the other site ' s pumps across this encrypted tunnel.

Question 79

A building camera is remotely accessed and disabled from the remote console application during off-hours. A security analyst reviews the following logs:

Which of the following actions should the analyst take to best mitigate the threat?

Options:

A.

Implement WAF protection for the web application.

B.

Upgrade the firmware on the camera.

C.

Only allowconnections from approved IPs.

D.

Block IP 104.18.16.29 on the firewall.

Question 80

An organization is deploying a new data lake that will centralize records from several applications. During the design phase, the security architect identifies the following requirements:

• The sensitivity levels of the data is different.

• The data must be accessed through stateless API calls after authentication.

• Different users will have access to different data sets.

Which of the following should the architect implement to best meet these requirements?

Options:

A.

Directory services

B.

802.1X with EAP-TLS

C.

OpenID Connect

D.

CASB

Page: 20 / 26
Total 344 questions