Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Selected CAS-004 CompTIA CASP Questions Answers

Page: 44 / 46
Total 619 questions

CompTIA SecurityX Certification Exam Questions and Answers

Question 173

An IT department is currently working to implement an enterprise DLP solution. Due diligence and best practices must be followed in regard to mitigating risk. Which of the following ensures that authorized modifications are well planned and executed?

Options:

A.

Risk management

B.

Network management

C.

Configuration management

D.

Change management

Question 174

An accounting team member received a voicemail message from someone who sounded like the Chief Financial Officer (CFO). In the voicemail message, the caller requested a wire transfer to a bank account the organization had not used before. Which of the following best describes this type of attack?

Options:

A.

The attacker used deepfake technology to simulate the CFO's voice.

B.

The CFO tried to commit a form of embezzlement.

C.

The attacker used caller ID spoofing to imitate the CFO's internal phone extension.

D.

The attacker successfully phished someone in the accounts payable department.

Question 175

A company has integrated source code from a subcontractor into its security product. The subcontractor is located in an adversarial country and has informed the company of a requirement to escrow the source code with the subcontractor’s government. Which of the following is a potential security risk arising from this situation?

Options:

A.

Development of zero-day exploits based on the source code

B.

Legal action to force disclosure of the source code

C.

Sale of source code to competitors during a buyout

D.

Publication of the source code on the internet

Question 176

A company is developing an application that will be used to perform e-commerce transactions for a subscription-based service. The application must be able to use previously saved payment methods to perform recurring transactions. Which of the following is the most appropriate?

Options:

A.

Tokenization through an HSM

B.

Self-encrypting disks with field-level encryption

C.

NX/XN implementation to minimize data retention

D.

Token-based access for application users

E.

Address space layout randomization

Page: 44 / 46
Total 619 questions