A company is decommissioning old servers and hard drives that contain sensitive data. Which of the following best protects against data leakage?
Answer(s): A
Purging is the best option for protecting against data leakage when decommissioning old servers and hard drives that contain sensitive data. Purging involves the removal of data in such a way that it cannot be recovered by any known means, even by advanced forensic techniques. This typically involves overwriting the data multiple times or using specialized software to ensure it is completely erased.
An engineer has had scaling issues with a web application hosted on premises and would like to move to a serverless architecture. Which of the following cloud benefits would be best to utilize for this project?
Answer(s): B
The best cloud benefit for moving to a serverless architecture in this case is Automation of resource provisioning. Serverless computing automatically scales resources based on demand without requiring manual intervention. This helps to address the scaling issues the engineer is facing by dynamically adjusting resource allocation as needed, improving performance and efficiency without manual effort.
An organization needs to classify its systems and data in accordance with external requirements. Which of the following roles is best qualified to perform this task?
The Data owner is the role best qualified to classify systems and data according to external requirements. The data owner is responsible for the oversight of data assets within the organization, including determining how data is classified and ensuring that it meets relevant regulatory or compliance standards. This role involves setting policies and guidelines for data usage, classification, and security.
A company is developing an application that will be used to perform e-commerce transactions for a subscription-based service. The application must be able to use previously saved payment methods to perform recurring transactions. Which of the following is the most appropriate?
Tokenization through an HSM (Hardware Security Module) is the most appropriate solution for securely storing and using previously saved payment methods for recurring transactions. Tokenization replaces sensitive data (like credit card numbers) with a token, which is a non-sensitive equivalent that cannot be reversed without the corresponding HSM. This ensures that sensitive payment information is never stored in an accessible format and protects customer data from breaches while still enabling the application to perform transactions.
A security technician is trying to connect a remote site to the central office over a site-to-site VPN. The technician has verified the source and destination IP addresses are correct, but the technician is unable to get the remote site to connect. The following error message keeps repeating:An error has occurred during Phase 1 handshake. Deleting keys and retrying...Which of the following is most likely the reason the connection is failing?
The error message "An error has occurred during Phase 1 handshake. Deleting keys and retrying..." indicates an issue during the IKE (Internet Key Exchange) Phase 1 handshake. One common cause for failure at this stage is a mismatch in the hashing algorithm or key length used on both devices. If the IKE hashing algorithm or key lengths differ between the two devices, they will not be able to establish a secure connection.
A security analyst received the following finding from a cloud security assessment tool:Virtual Machine Data Disk is encrypted with the default encryption key.Because the organization hosts highly sensitive data files, regulations dictate it must be encrypted so It is unreadable to the CSP. Which of the following should be implemented to remediate the finding and meet the regulatory requirement? (Choose two.)
Answer(s): A,E
To meet the regulatory requirement of ensuring that the data is unreadable to the cloud service provider (CSP), the best approach is to use customer-provided keys for encryption. This ensures that only the customer (organization) holds the keys to access the encrypted data, not the CSP.Disk encryption with customer-provided keys: This ensures the encryption key for the virtual machine's data disk is managed by the customer, preventing the CSP from having access to the data.File-level encryption with customer-provided keys: If data needs to be encrypted at the file level, customer- provided keys can be used to ensure that the organization retains control over the encryption and decryption process.
A security analyst discovers a new device on the company's dedicated IoT subnet during the most recent vulnerability scan. The scan results show numerous open ports and insecure protocols in addition to default usernames and passwords. A camera needs to transmit video to the security server in the IoT subnet. Which of the following should the security analyst recommend to securely operate the camera?
Harden the camera configuration by changing default usernames and passwords, disabling unnecessary open ports, and ensuring that secure protocols (such as HTTPS, SSH, or others) are used instead of insecure ones (like HTTP or Telnet). This is a critical step in securing IoT devices and protecting them from being exploited.Since the camera is part of the IoT subnet and has been identified with vulnerabilities such as default credentials and open ports, hardening the configuration is the most direct and effective solution to secure its operation.
The Chief Information Security Officer of a large multinational organization has asked the security risk manager to use risk scenarios during a risk analysis. Which of the following is the most likely reason for this approach?
Answer(s): D
Using risk scenarios helps to provide context to the relevancy of risk by illustrating how specific risks could affect the organization. This approach helps stakeholders understand the potential impact of risks in real-world terms, making it easier to prioritize actions based on the likelihood and consequences of each scenario. It also helps decision-makers better assess the practical implications of different risks on business operations.
Share your comments for CompTIA CAS-005 exam with other users:
very nice question
i have learning disability and this exam dumps allowed me to focus on the actual questions and not worry about notes and the those other study materials.
165 should be apt
please upload the dumps, real need of them
any recent feeedback?
question number 2 is indicating you are giving proper questions. observe and change properly.
passed today.40% questions were new.litwere case study,lots of new questions on afd,ratelimit,tm,lb,app gatway.got 2 set series of questions which are not present here.questions on azure cyclecloud, no.of vnet/vms required for implimentation,blueprints assignment/management group etc
practice test
want the dumps for emc content management server programming(cmsp)
brilliant and helpful
q75. azure files is pass
very helpful
thank you for these questions. it helped a lot.
how do i get the h12-724 dumps
nice data dumps
answers are correct
good explanation
hi team just want to know if there is any update version of the exam 350-401
helpful on 2017 scrum guide
planning to attempt for the exam.
pleaseee upload
thanks ly so i have information cia
hello team, i need sap qm dumps for practice
it’s good but not senatios based
q.119 - the correct answer is b - they are not captured in an update set as theyre data.
good matter
please upload c_sacp_2308
please upload the dump. thanks very much !!
good questions
hi, could you please update the latest dump version
this question is keep repeat : you are developing a sales application that will contain several azure cloud services and handle different components of a transaction. different cloud services will process customer orders, billing, payment, inventory, and shipping. you need to recommend a solution to enable the cloud services to asynchronously communicate transaction information by using xml messages. what should you include in the recommendation?
great questions
its realy good
oracle 1z0-1059-22 dumps