Printable PDF
Want to pass your CompTIA SecurityX Exam CAS-005 exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
A security analyst is reviewing the following log:
Which of the following possible events should the security analyst investigate further?
A. A macro that was prevented from running
B. A text file containing passwords that were leaked
C. A malicious file that was run in this environment
D. A PDF that exposed sensitive information improperly
An application engineer is using the Swagger framework to leverage REST APIs to authenticate endpoints. The engineer is receiving HTTP 403 responses. Which of the following should the engineer do to correct this issue? (Choose two.)
A. Obtain a security token.
B. Obtain a public key.
C. Leverage Kerberos for authentication
D. Leverage OAuth for authentication.
E. Leverage LDAP for authentication.
F. Obtain a hash value.
A common industrial protocol has the following characteristics:
1.
Provides for no authentication/security
2.
Is often implemented in a client/server relationship
3.
Is implemented as either RTU or TCP/IP
Which of the following is being described?
A. Profinet
B. Modbus
C. Zigbee
D. Z-Wave