Ready to Pass Your Certification Test

Ready to guarantee a pass on the certification that will elevate your career? Visit this page to explore our catalog and get the questions and answers you need to ace the test.

comptia CA1_005

Custom view settings

Exam contains 99 questions

Page 10 of 17
Question 55 🔥

A nation-state actor is exposed for attacking large corporations by establishing persistence in smaller companies that are likely to be acquired by these large corporations. The actor then provisions user accounts in the companies for use post-acquisition. Before an upcoming acquisition, a security officer conducts threat modeling with this attack vector. Which of the following practices is the best way to investigate this threat?

Which database solution meets these requirements?
Discussion of the question
Question 56 🔥

A company updates its cloud-based services by saving infrastructure code in a remote repository. The code is automatically deployed into the development environment every time the code is saved to the repository. The developers express concern that the deployment often fails, citing minor code issues and occasional security control check failures in the development environment. Which of the following should a security engineer recommend to reduce the deployment failures? (Choose two.)

Which database solution meets these requirements?
Discussion of the question
Question 57 🔥

An organization has several systems deployed in a public cloud and wants to confirm that when data retention periods are reached, the data is properly disposed of. Which of the following best meets the organization's needs?

Which database solution meets these requirements?
Discussion of the question
Question 58 🔥

A company is preparing to move a new version of a web application to production. No major issues were reported during security scanning or quality assurance in the CI/CD pipeline. Which of the following actions should the company take next?

Which database solution meets these requirements?
Discussion of the question
Question 59 🔥

A security researcher tells a company that one of its solutions is vulnerable to buffer overflow, leading to a malicious coding execution. Which of the following is the best way to avoid this vulnerability in future versions?

Which database solution meets these requirements?
Discussion of the question
Question 60 🔥

A pharmaceutical company acquired a growing startup. The pharmaceutical company has a comprehensive OT stack, while the startup allows employees to install IoT devices without oversight. Both companies will continue to operate independently with some systems shared and others separated. Which of the following considerations are the most important when designing the new combined systems? (Choose two.)

Which database solution meets these requirements?
Discussion of the question

Lorem ipsum dolor sit amet consectetur. Eget sed turpis aenean sit aenean. Integer at nam ullamcorper a.

© 2024 Exam Prepare, Inc. All Rights Reserved.
CA1_005 questions • Exam prepare