PKI can be used to support security requirements in the change management process. Which of the following capabilities does PKI provide for messages?
Answer(s): A
PKI (Public Key Infrastructure) uses digital signatures to provide non-repudiation, which ensures that the sender of a message cannot deny having sent it. In the context of the change management process, PKI ensures that actions or approvals are traceable to the responsible individual, which is critical for maintaining accountability and the integrity of the process.
Several unlabeled documents in a cloud document repository contain cardholder information. Which of the following configuration changes should be made to the DLP system to correctly label these documents in the future?
Answer(s): C
Data Loss Prevention (DLP) systems can use regular expressions to identify and classify sensitive information, such as cardholder data, based on patterns (e.g., patterns for credit card numbers). By configuring the DLP system with appropriate regular expressions, the system can correctly identify and label documents containing such information in the future, ensuring compliance and enhancing security.
A systems administrator at a web-hosting provider has been tasked with renewing the public certificates of all customer sites. Which of the following would best support multiple domain names while minimizing the amount of certificates needed?
SAN (Subject Alternative Name) is an extension to SSL/TLS certificates that allows a single certificate to secure multiple domain names. This method is ideal for situations where you want to secure several domains or subdomains with one certificate, reducing the complexity and number of certificates needed. SAN certificates are commonly used to support multiple domain names under a single SSL certificate, making them the best choice for the given scenario.
Which of the following best explain why organizations prefer to utilize code that is digitally signed? (Choose two.)
Answer(s): A,B
It provides origin assurance: Digital signatures ensure that the code comes from a verified and trusted source. By signing the code, the organization guarantees the origin of the software, assuring the recipient that it has been delivered by a legitimate party.It verifies integrity: A digital signature also ensures that the code has not been altered or tampered with since it was signed. Any changes to the code after it has been signed would invalidate the signature, confirming that the integrity of the code has been preserved.
Post your Comments and Discuss CompTIA CAS-005 exam with other Community members:
Kruel Commented on June 21, 2025 How is the exam? Anonymous