Free CompTIA CAS-005 Exam Questions (page: 13)

An analyst is working to address a potential compromise of a corporate endpoint and discovers the attacker accessed a user's credentials. However, it is unclear if the system baseline was modified to achieve persistence.
Which of the following would most likely support forensic activities in this scenario?

  1. Side-channel analysis
  2. Bit-level disk duplication
  3. Software composition analysis
  4. SCAP scanner

Answer(s): B

Explanation:

Bit-level disk duplication is the best option in this scenario for supporting forensic activities. It involves creating an exact, sector-by-sector copy of the hard drive, which allows forensic analysts to examine the entire disk, including deleted files, hidden data, or modifications that may have been made by the attacker to achieve persistence. This approach provides the most comprehensive data for investigating the potential compromise and determining if the system baseline was modified.



A company is decommissioning old servers and hard drives that contain sensitive data.
Which of the following best protects against data leakage?

  1. Purging
  2. Clearing
  3. Shredding
  4. Degaussing

Answer(s): A

Explanation:

Purging is the best option for protecting against data leakage when decommissioning old servers and hard drives that contain sensitive data. Purging involves the removal of data in such a way that it cannot be recovered by any known means, even by advanced forensic techniques. This typically involves overwriting the data multiple times or using specialized software to ensure it is completely erased.



An engineer has had scaling issues with a web application hosted on premises and would like to move to a serverless architecture.
Which of the following cloud benefits would be best to utilize for this project?

  1. Cost savings for hosting
  2. Automation of resource provisioning
  3. Providing geo-redundant hosting
  4. Eliminating need to patch

Answer(s): B

Explanation:

The best cloud benefit for moving to a serverless architecture in this case is Automation of resource provisioning. Serverless computing automatically scales resources based on demand without requiring manual intervention. This helps to address the scaling issues the engineer is facing by dynamically adjusting resource allocation as needed, improving performance and efficiency without manual effort.



An organization needs to classify its systems and data in accordance with external requirements.
Which of the following roles is best qualified to perform this task?

  1. Systems administrator
  2. Data owner
  3. Data processor
  4. Data custodian
  5. Data steward

Answer(s): B

Explanation:

The Data owner is the role best qualified to classify systems and data according to external requirements. The data owner is responsible for the oversight of data assets within the organization, including determining how data is classified and ensuring that it meets relevant regulatory or compliance standards. This role involves setting policies and guidelines for data usage, classification, and security.



A company is developing an application that will be used to perform e-commerce transactions for a subscription-based service. The application must be able to use previously saved payment methods to perform recurring transactions.
Which of the following is the most appropriate?

  1. Tokenization through an HSM
  2. Self-encrypting disks with field-level encryption
  3. NX/XN Implementation to minimize data retention
  4. Token-based access for application users
  5. Address space layout randomization

Answer(s): A

Explanation:

Tokenization through an HSM (Hardware Security Module) is the most appropriate solution for securely storing and using previously saved payment methods for recurring transactions. Tokenization replaces sensitive data (like credit card numbers) with a token, which is a non-sensitive equivalent that cannot be reversed without the corresponding HSM. This ensures that sensitive payment information is never stored in an accessible format and protects customer data from breaches while still enabling the application to perform transactions.



Viewing page 13 of 72



Post your Comments and Discuss CompTIA CAS-005 exam prep with other Community members:

CAS-005 Exam Discussions & Posts