All Posts

ComptiA CASP+ 2023 Questions and answer - Part 28

Mary Mary Smith
03 Mar 2023
4 min
0

1. A business unit of a large company's hosting and developing a new external website, which will be opened by outsourced premium customers, with a view to accelerating the time to market timeline. Which of the following is most appropriate?

A) Outsourcing transfers all risks to the third party. An SLA must be taken to solve newly identified vulnerability and penetration testing / vulnerability should be performed regularly.
B) The use of external organizations to provide hosting and web development services is not recommended if the costs are usually higher than what can be achieved internally. Moreover, compliance with privacy regulations is becoming increasingly complex and guaranteed uptime are difficult to detect and measure.
C) The external party to provide hosting and website development should be required on behalf of a secure service that is regularly tested (vulnerability and penetration). SLAs should be in place to solve newly identified vulnerabilities and guaranteed uptime.
D) None
E) Outsourcing will take the risk to third parties, thus reducing the cost and possible to minimize regulatory obligations. An MOU should be taken to solve newly identified vulnerability and penetration testing / vulnerability should be performed regularly.


2. A company with 2,000 workstations considering the purchase of a HIPS to minimize the impact of malware on a system compromise. Currently, the company projects a total cost of $ 50,000 for the next three years to respond to and eradicate malware workstation. The Information Security Officer (ISO) has received three bids from different companies that offer HIPS. The first citation requires a $ 10,000 one-time costs, annual cost of $ 6 per workstation, and a 10% annual support fee based on the number of workstations. The second quote is a $ 15,000 one-time fee, an annual fee of $ 5 per workstation, and a 12% annual fee based on the number of workstations. The third quote is no setup fee, an annual fee of $ 8 per workstation, and a 15% annual fee based on the number of workstations. Which solution should select the company as the contract is valid for three years?

A) None
B) first citation
C) third citation
D) Accept the risk
E) second quote


3. A security administrator has noticed an increase in the number of staff workstations are becoming infected with malware. The company is an enterprise antivirus system and a web content filter that blocks access to malicious websites where malware files can be downloaded. The company provides technical implementing measures to enable external storage. Which of the following is a technical control who should implement to reduce malware infection security manager?

A) Implement a network access control system with a persistent agent.
B) Implement an Acceptable Use Policy that addresses malware downloads.
C) None
D) Block cloud-based storage software in the enterprise.
E) Enforce mandatory security awareness training for all employees and contractors.


4. During an incident with the company's main database, a team of forensic experts hired to respond to the breach. The team is responsible for gathering forensic evidence of the company's database server. Which of the following is the correct order in which the forensic team must involve?

A) Take inventory, set the scene, capture RAM, capture had to drive, to carry out chain of custody, document and analyze the data.
B) None
C) Implement chain of custody, take inventory, set the scene, capture volatile and non-volatile memory, and documenting the findings.
D) Set the scene, take inventory, capture fleeting memories, capture non-volatile memories, documenting and implementing chain of custody.
E) Keep senior management, sets the scene, capturing fleeting memories, capture non-volatile memories, implement chain of custody and analyze original media.


5. A bank has decided to outsource a number of existing systems and IT functions to a third party service provider. The third party service provider will the outsourced systems on their own land management and, through special encrypted connections remain directly interface with other systems Banka Β¬ Ys. Which of the following is crucial for the successful management of the system concerns about ensuring the safety between the two organizations?

A) None
B) STD
C) BIA
D) MOU
E) IS A


1. Right Answer: C
Explanation:

2. Right Answer: E
Explanation:

3. Right Answer: D
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: E
Explanation:

0 Comments
Leave a comment