Big Black Friday Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

SecurityX Changed CAS-005 Questions

Page: 11 / 24
Total 326 questions

CompTIA SecurityX Certification Exam Questions and Answers

Question 41

An organization recently migrated data to a new file management system. The architect decides to use a discretionary authorization model on the new system. Which of the following best explains the architect's choice?

Options:

A.

The responsibility of migrating data to the new file management system was outsourced to the vendor providing the platform.

B.

The permissions were not able to be migrated to the new system, and several stakeholders were made responsible for granting appropriate access.

C.

The legacy file management system did not support modern authentication techniques despite the business requirements.

D.

The data custodians were selected by business stakeholders to ensure backups of the file management system are maintained off site.

Question 42

Which of the following are risks associated with vendor lock-in? (Select two).

Options:

A.

The client can seamlessly move data.

B.

The vendor canchange product offerings.

C.

The client receives a sufficient level of service.

D.

The client experiences decreased quality of service.

E.

The client can leverage a multicloud approach.

F.

The client experiences increased interoperability.

Question 43

An organization wants to implement a secure cloud architecture across all instances. Given the following requirements:

· Establish a standard network template.

· Deployments must be consistent.

· Security policies must be able to be changed at scale.

Which of the following technologies meets these requirements?

Options:

A.

Serverless deployment model

B.

Container orchestration

C.

Infrastructure as code

D.

CLI cloud administration

E.

API gateway

Question 44

A security engineer must resolve a vulnerability in a deprecated version of Python for a custom-developed flight simul-ation application that is monitored and controlled remotely. The source code is proprietary and built with Python functions running on the Ubuntu operating system. Version control is not enabled for the application in development or production. However, the application must remain online in the production environment using built-in features. Which of the following solutions best reduces theattack surface of these issues and meets the outlined requirements?

Options:

A.

Configure code-signing within the CI/CD pipeline, update Python with aptitude, and update modules with pip in a test environment. Deploy the solution to production.

B.

Enable branch protection in the GitHub repository. Update Python with aptitude, and update modules with pip in a test environment. Deploy the solution to production.

C.

Use an NFS network share. Update Python with aptitude, and update modules with pip in a test environment. Deploy the solution to production.

D.

Configure version designation within the Python interpreter. Update Python with aptitude, and update modules with pip in a test environment. Deploy the solution to production.

Page: 11 / 24
Total 326 questions