A security analyst is reviewing the following log:

Which of the following possible events should the security analyst investigate further?
Based on the log provided, the most concerning event that should be investigated further is the presence of a text file containing passwords that were leaked. Here's why:
Sensitive Information Exposure: A text file containing passwords represents a significant security risk, as it indicates that sensitive credentials have been exposed in plain text, potentially leading to unauthorized access.
Immediate Threat: Password leaks can lead to immediate exploitation by attackers, compromising user accounts and sensitive data. This requires urgent investi
A company discovers intellectual property data on commonly known collaboration web applications that allow the use of slide templates. The systems administrator is reviewing the configurations of each tool to determine how to prevent this issue. The following security solutions are deployed:
CASB
SASE
WAF
EDR
Firewall
IDS
SIEM
DLP endpoints
Which of the following should the administrator do to address the issue?
A global company with a remote workforce implemented a new VPN solution. After deploying the VPN solution to several hundred users, the help desk starts receiving reports of slow access to both internally and externally available applications. A security analyst reviews the following:
VPN client routing: 0.0.0.0/0 eth1
Which of the following solutions should the analyst use to fix this issue?
The routing entry 0.0.0.0/0 forces all traffic from remote clients---including traffic destined for the public internet---through the VPN tunnel. This is called full-tunnel VPN routing. While it ensures strong security by forcing all traffic to pass through corporate controls, it can also overload VPN gateways and cause slow access to both internal and external applications, as seen in this scenario.
The correct fix is to enable split tunneling (B). Split tunneling allows only corporate traffic (e.g., private IP ranges or internal applications) to flow through the VPN, while internet-bound traffic routes directly to the internet. This reduces congestion on VPN concentrators, improves performance for remote users, and ensures efficient use of bandwidth.
Moving servers to a screened subnet (A) relates to internal segmentation but does not fix the VPN bottleneck. NAC (C) enforces device compliance but does not address routing inefficiencies. DNS over HTTPS (D) secures name resolution but is unrelated to network congestion.
Thus, enabling split tunneling balances security and performance for remote workers.
A company is migrating from a Windows Server to Linux-based servers. A security engineer must deploy a configuration management solution that maintains security software across all the Linux servers. Which of the following configuration file snippets is the most appropriate to use?
The correct snippet is Option A, which shows an Ansible YAML playbook designed to deploy and maintain security software on Linux servers. Ansible is a configuration management tool widely used in enterprise environments, and the ansible.builtin.apt module specifically manages package installation on Debian/Ubuntu-based Linux distributions. This ensures consistent security software deployment across multiple servers.
Option B is XML-based and does not represent a valid configuration management script. Option C incorrectly uses JSON format and Reference Microsoft's store (com.microsoft.store.latest), which is irrelevant for Linux. Option D also uses JSON syntax with ''AppX,'' which applies to Windows applications, not Linux.
CAS-005 emphasizes infrastructure as code (IaC) and automation as best practices for secure system configuration. YAML-based playbooks in Ansible provide repeatability, auditability, and scalability, making Option A the most secure and appropriate solution.
[Security Architecture]
A security analyst is using data provided from a recent penetration test to calculate CVSS scores to prioritize remediation. Which of the following metric groups would the analyst need to determine to get the overall scores? (Select three).
The Common Vulnerability Scoring System (CVSS) v3.1 uses three metric groups to calculate overall scores:Base,Temporal, andEnvironmental.
Base (E):Mandatory metrics assessing exploitability (e.g., attack vector) and impact (confidentiality, integrity, availability).
Temporal (A):Optional metrics reflecting the current state of the vulnerability (e.g., exploit availability, remediation level).
Environmental (F):Optional metrics tailoring the score to the organization's context (e.g., security requirements).
B, C, D (Availability, Integrity, Confidentiality):These are subcomponents of the Base Impact metrics, not standalone groups.
G (Impact):A categorywithin Base, not a group.
H (Attack vector):A single Base metric, not a group.
Lashaunda
9 hours agoOlga
9 days agoMichal
22 days agoPok
29 days agoVanda
1 month agoShawnta
1 month agoLeatha
2 months agoAn
2 months agoDesirae
2 months agoGayla
2 months agoCecil
3 months agoLino
3 months agoHildred
3 months agoArthur
3 months agoJose
4 months agoIzetta
4 months agoCassie
4 months agoSol
5 months agoBeatriz
5 months agoLeigha
5 months agoLarae
5 months agoJesus
5 months agoTu
6 months agoGilma
6 months agoPhillip
6 months agoRolf
6 months agoMargart
8 months agoStanford
9 months agoRessie
10 months agoMillie
11 months agoLouis
1 year agoJacqueline
1 year agoMaryann
1 year agoNobuko
1 year agoOzell
1 year agoSanda
1 year agoViola
1 year agoPortia
1 year agoKristel
1 year agoBrandon
1 year agoLouvenia
1 year ago