Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views18 pages

Cas 005.part2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views18 pages

Cas 005.part2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

1.

A software engineer is creating a CI/CD pipeline to support the


development of a web application The DevSecOps team is required
to identify syntax errors.

Which of the following is the most relevant to the DevSecOps team's


task'

A. Static application security testing

B. Software composition analysis

C. Runtime application self-protection

D. Web application vulnerability scanning

2. An organization is looking for gaps in its detection capabilities


based on the APTs that may target the industry.

Which of the following should the security analyst use to perform


threat modeling?

ATT&CK

OWASP

CAPEC

STRIDE

3. Recent repents indicate that a software tool is being exploited


Attackers were able to bypass user access controls and load a
database. A security analyst needs to find the vulnerability and
recommend a mitigation.

The analyst generates the following output:


Which of the following would the analyst most likely recommend?

Installing appropriate EDR tools to block pass-the-hash attempts

Adding additional time to software development to perform fuzz testing

Removing hard coded credentials from the source code

Not allowing users to change their local passwords

4. A company wants to install a three-tier approach to separate the


web. database, and application servers.

A security administrator must harden the environment which of the


following is the best solution?

Deploying a VPN to prevent remote locations from accessing server VLANs

Configuring a SASb solution to restrict users to server communication

Implementing micro segmentation on the server VLANs

installing a firewall and making it the network core

5. A security architect wants to develop abase line of security


configurations These configurations automatically will be utilized
machine is created.

Which of the following technologies should the security architect


deploy to accomplish this goal?

Short

GASB

Ansible

CMDB

6. A company updates its cloud-based services by saving


infrastructure code in a remote repository. The code is automatically
deployed into the development environment every time the code is
saved lo the repository The developers express concern that the
deployment often fails, citing minor code issues and occasional
security control check failures in the development environment.

Which of the following should a security engineer recommend to


reduce the deployment failures? (Select two).

A. Software composition analysis

B. Pre-commit code linting

C. Repository branch protection

D. Automated regression testing

E. Code submit authorization workflow

F. Pipeline compliance scanning

7. A financial technology firm works collaboratively with business


partners in the industry to share threat intelligence within a central
platform This collaboration gives partner organizations the ability to
obtain and share data associated with emerging threats from a
variety of adversaries.

Which of the following should the organization most likely leverage


to facilitate this activity? (Select two).

A. CWPP

B. YAKA

C. ATTACK

D. STIX

E. TAXII

F. JTAG

8. An organization mat performs real-time financial processing is


implementing a new backup solution.

Given the following business requirements?

* The backup solution must reduce the risk for potential backup
compromise

* The backup solution must be resilient to a ransomware attack.

* The time to restore from backups is less important than the


backup data integrity

* Multiple copies of production data must be maintained

Which of the following backup strategies best meets these


requirement?

A. Creating a secondary, immutable storage array and updating it


with live data on a continuous basis

B. Utilizing two connected storage arrays and ensuring the arrays


constantly sync

C. Enabling remote journaling on the databases to ensure real-time


transactions are mirrored

D. Setting up antitempering on the databases to ensure data cannot


be changed unintentionally

9. During a forensic review of a cybersecurity incident, a security


engineer collected a portion of the payload used by an attacker on a
comprised web server.

Given the following portion of the code:

Which of the following best describes this incident?

A. XSRF attack

B. Command injection

C. Stored XSS

D. SQL injection
10. A security architect for a global organization with a distributed
workforce recently received funding lo deploy a CASB solution.

Which of the following most likely explains the choice to use a


proxy-based CASB?

The capability to block unapproved applications and services is possible

Privacy compliance obligations are bypassed when using a user-based


deployment.

Protecting and regularly rotating API secret keys requires a significant time
commitment

Corporate devices cannot receive certificates when not connected to on-


premises devices

11. A company's security policy states that any publicly available


server must be patched within 12 hours after a patch is released.

A recent llS zero-day vulnerability was discovered that affects all


versions of the Windows Server OS:

Which of the following hosts should a security analyst patch first


once a patch is available?

12. A security review revealed that not all of the client proxy traffic
is being captured.
Which of the following architectural changes best enables the
capture of traffic for analysis?

Adding an additional proxy server to each segmented VLAN

Setting up a reverse proxy for client logging at the gateway

Configuring a span port on the perimeter firewall to ingest logs

Enabling client device logging and system event auditing

13. A company is having issues with its vulnerability management


program New devices/lPs are added

and dropped regularly, making the vulnerability report inconsistent.

Which of the following actions should the company lake to most


likely improve the vulnerability management process'

Request a weekly report with all new assets deployed and decommissioned

Extend the DHCP lease lime to allow the devices to remain with the same
address for a longer period.

Implement a shadow IT detection process to avoid rogue devices on the


network

Perform regular discovery scanning throughout the 11 landscape using the


vulnerability management tool

14. A security analyst Detected unusual network traffic related to


program updating processes The analyst collected artifacts from
compromised user workstations. The discovered artifacts were
binary files with the same name as existing, valid binaries but. with
different hashes which of the following solutions would most likely
prevent this situation from reoccurring?

A. Improving patching processes

B. Implementing digital signature

C. Performing manual updates via USB ports

D. Allowing only dies from internal sources


15. A company isolated its OT systems from other areas of the
corporate network These systems are required to report usage
information over the internet to the vendor.

Which oi the following best reduces the risk of compromise or


sabotage' (Select two).

A. Implementing allow lists

B. Monitoring network behavior

C. Encrypting data at rest

D. Performing boot Integrity checks

E. Executing daily health checks

F. Implementing a site-to-site IPSec VPN

16. A security engineer wants to reduce the attack surface of a


public-facing containerized application.

Which of the following will best reduce the application's privilege


escalation attack surface?

A. Implementing the following commands in the Dockerfile: RUN


echo user: x: 1000: 1000iuser: /home/user: /dew/null > /ete/passwd

B. Installing an EDR on the container's host with reporting


configured to log to a centralized SIFM and Implementing the
following alerting rules TF PBOCESS_USEB=rooC
ALERT_TYPE=critical

C. Designing a muiticontainer solution, with one set of containers


that runs the mam application, and another set oi containers that
perform automatic remediation by replacing compromised
containers or disabling compromised accounts

D. Running the container in an isolated network and placing a load


balancer in a public-facing network. Adding the following ACL to the
load balancer: PZRKZI HTTES from 0-0.0.0.0/0 pert 443

17. A compliance officer is reviewing the data sovereignty laws in


several countries where the organization has no presence.

Which of the following is the most likely reason for reviewing these
laws?

A. The organization is performing due diligence of potential tax


issues.

B. The organization has been subject to legal proceedings in


countries where it has a presence.

C. The organization is concerned with new regulatory enforcement


in other countries

D. The organization has suffered brand reputation damage from


incorrect media coverage

18. A security analyst wants to use lessons learned from a poor


incident response to reduce dwell lime in the future The analyst is
using the following data points

Which of the following would the analyst most likely recommend?

A. Adjusting the SIEM to alert on attempts to visit phishing sites

B. Allowing TRACE method traffic to enable better log correlation

C. Enabling alerting on all suspicious administrator behavior

D. utilizing allow lists on the WAF for all users using GFT methods
19. A security analyst received a notification from a cloud service
provider regarding an attack detected on a web server.

The cloud service provider shared the following information about


the attack:

• The attack came from inside the network.

• The attacking source IP was from the internal vulnerability


scanners.

• The scanner is not configured to target the cloud servers.

Which of the following actions should the security analyst take first?

A. Create an allow list for the vulnerability scanner IPs m order to


avoid false positives

B. Configure the scan policy to avoid targeting an out-of-scope host

C. Set network behavior analysis rules

D. Quarantine the scanner sensor to perform a forensic analysis

20. A company's SICM Is continuously reporting false positives and


false negatives The security operations team has Implemented
configuration changes to troubleshoot possible reporting errors.

Which of the following sources of information best supports the


required analysts process? (Select two).

A. Third-party reports and logs

B. Trends

C. Dashboards

D. Alert failures

E. Network traffic summaries


F. Manual review processes

21. A security analyst needs to ensure email domains that send


phishing attempts without previous communications are not
delivered to mailboxes.

The following email headers are being reviewed

Which of the following is the best action for the security analyst to
take?

A. Block messages from hr-saas.com because it is not a recognized


domain.

B. Reroute all messages with unusual security warning notices to


the IT administrator

C. Quarantine all messages with sales-mail.com in the email header

D. Block vendor com for repeated attempts to send suspicious


messages

22. A company recently experienced an incident in which an


advanced threat actor was able to shim malicious code against the
hardware static of a domain controller The forensic team
cryptographically validated that com the underlying firmware of the
box and the operating system had not been compromised. However,
the attacker was able to exfiltrate information from the server using
a steganographic technique within LOAP.

Which of the following is me b»« way to reduce the risk oi


reoccurrence?

Enforcing allow lists for authorized network pons and protocols

Measuring and attesting to the entire boot chum


Rolling the cryptographic keys used for hardware security modules

Using code signing to verify the source of OS updates

23. A company receives reports about misconfigurations and


vulnerabilities in a third-party hardware device that is part of its
released products.

Which of the following solutions is the best way for the company to
identify possible issues at an earlier stage?

A. Performing vulnerability tests on each device delivered by the


providers

B. Performing regular red-team exercises on the vendor production


line

C. Implementing a monitoring process for the integration between


the application and the vendor appliance

D. Implementing a proper supply chain risk management program

24. Which of the following best explains the business requirement a


healthcare provider fulfills by encrypting patient data at rest?

Securing data transfer between hospitals

Providing for non-repudiation data

Reducing liability from identity theft

Protecting privacy while supporting portability.

25. A user submits a help desk ticket stating then account does not
authenticate sometimes. An analyst reviews the following logs for
the user:

Which of the following best explains the reason the user's access is
being denied?

incorrectly typed password

Time-based access restrictions

Account compromise
Invalid user-to-device bindings

26. A systems administrator works with engineers to process and


address vulnerabilities as a result of continuous scanning activities.
The primary challenge faced by the administrator is differentiating
between valid and invalid findings.

Which of the following would the systems administrator most likely


verify is properly configured?

Report retention time

Scanning credentials

Exploit definitions

Testing cadence

27. A company that relies on an COL system must keep it operating


until a new solution is available.

Which of the following is the most secure way to meet this goal?

Isolating the system and enforcing firewall rules to allow access to only
required endpoints

Enforcing strong credentials and improving monitoring capabilities

Restricting system access to perform necessary maintenance by the IT team

Placing the system in a screened subnet and blocking access from internal
resources

28. A user reports application access issues to the help desk.

The help desk reviews the logs for the user

Which of the following is most likely The reason for the issue?
The user inadvertently tripped the impossible travel security rule in the SSO
system.

A threat actor has compromised the user's account and attempted to lop, m

The user is not allowed to access the human resources system outside of
business hours

The user did not attempt to connect from an approved subnet

29. An organization wants to manage specialized endpoints and


needs a solution that provides the ability to

* Centrally manage configurations

* Push policies.

• Remotely wipe devices

• Maintain asset inventory

Which of the following should the organization do to best meet


these requirements?

Use a configuration management database

Implement a mobile device management solution.

Configure contextual policy management

Deploy a software asset manager

30. A company plans to implement a research facility with


Intellectual property data that should be protected

The following is the security diagram proposed by the security


architect
Which of the following security architect models is illustrated by the
diagram?

Identity and access management model

Agent based security model

Perimeter protection security model

Zero Trust security model

31. A financial services organization is using Al lo fully automate the


process of deciding client loan rates.

Which of the following should the organization be most concerned


about from a privacy perspective?

Model explainability

Credential Theft

Possible prompt Injections

Exposure to social engineering

32. A company wants to use loT devices to manage and monitor


thermostats at all facilities The thermostats must receive vendor
security updates and limit access to other devices within the
organization.

Which of the following best addresses the company's requirements''

Only allowing Internet access to a set of specific domains


Operating lot devices on a separate network with no access to other devices
internally

Only allowing operation for loT devices during a specified time window

Configuring IoT devices to always allow automatic updates

33. An engineering team determines the cost to mitigate certain


risks is higher than the asset values. The team must ensure the
risks are prioritized appropriately.

Which of the following is the best way to address the issue?

Data labeling

Branch protection

Vulnerability assessments

Purchasing insurance

34. Company A acquired Company B and needs to determine how


the acquisition will impact the attack surface of the organization as
a whole.

Which of the following is the best way to achieve this goal? (Select
two).

Implementing DLP controls preventing sensitive data from leaving


Company B's network

A. Documenting third-party connections used by Company B

B. Reviewing the privacy policies currently adopted by Company B

C. Requiring data sensitivity labeling tor all files shared with


Company B

D. Forcing a password reset requiring more stringent passwords for


users on Company B's network

E. Performing an architectural review of Company B's network


35. A secuntv administrator is performing a gap assessment against
a specific OS benchmark.

The benchmark requires the following configurations be applied to


endpomts:

• Full disk encryption * Host-based firewall

• Time synchronization * Password policies

• Application allow listing * Zero Trust application access

Which of the following solutions best addresses the requirements?


(Select two).

CASB

SBoM

SCAP

SASE

HIDS

36. After an incident response exercise, a security administrator


reviews the following table:

Which of the following should the administrator do to beat support


rapid incident response in the future?

A. Automate alerting to IT support for phone system outages.

B. Enable dashboards for service status monitoring

C. Send emails for failed log-In attempts on the public website

D. Configure automated Isolation of human resources systems


37. Company A and Company D ate merging Company A's
compliance reports indicate branch protections are not in place A
security analyst needs to ensure that potential threats to the
software development life cycle are addressed.

Which of the following should me analyst cons<der when


completing this basic?

A. If developers are unable to promote to production

B. If DAST code is being stored to a single code repository

C. If DAST scans are routinely scheduled

D. If role-based training is deployed

38. A security analyst discovered requests associated with IP


addresses known for born legitimate 3nd bot-related traffic.

Which of the following should the analyst use to determine whether


the requests are malicious?

User-agent string

Byte length of the request

Web application headers

HTML encoding field

39. An organization is required to

* Respond to internal and external inquiries in a timely manner

* Provide transparency.

* Comply with regulatory requirements

The organization has not experienced any reportable breaches but


wants to be prepared if a breach occurs in the future.

Which of the following is the best way for the organization to


prepare?
A. Outsourcing the handling of necessary regulatory filing to an
external consultant

B. Integrating automated response mechanisms into the data


subject access request process

C. Developing communication templates that have been vetted by


internal and external counsel

D. Conducting lessons-learned activities and integrating


observations into the crisis management plan

40. A security analyst is reviewing the following event timeline from


an COR solution:

Which of the following most likely has occurred and needs to be


fixed?

The Dl P has failed to block malicious exfiltration and data tagging is not
being utilized property

An EDRbypass was utilized by a threat actor and updates must be installed


by the administrator.

A logic law has introduced a TOCTOU vulnerability and must be addressed by


the COR vendor

A potential insider threat is being investigated and will be addressed by the


senior management team.

You might also like