ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











An engineering team is developing and deploying a fleet of mobile devices to be used for specialized inventory management purposes. These devices should:

* Be based on open-source Android for user familiarity and ease.

* Provide a single application for inventory management of physical assets.

* Permit use of the camera be only the inventory application for the purposes of scanning

* Disallow any and all configuration baseline modifications.

* Restrict all access to any device resource other than those requirement ?

A.
Set an application wrapping policy, wrap the application, distributes the inventory APK via the MAM tool, and test the application restrictions.
A.
Set an application wrapping policy, wrap the application, distributes the inventory APK via the MAM tool, and test the application restrictions.
Answers
B.
Write a MAC sepolicy that defines domains with rules, label the inventory application, build the policy, and set to enforcing mode.
B.
Write a MAC sepolicy that defines domains with rules, label the inventory application, build the policy, and set to enforcing mode.
Answers
C.
Swap out Android Linux kernel version for >2,4,0, but the internet build Android, remove unnecessary functions via MDL, configure to block network access, and perform integration testing
C.
Swap out Android Linux kernel version for >2,4,0, but the internet build Android, remove unnecessary functions via MDL, configure to block network access, and perform integration testing
Answers
D.
Build and install an Android middleware policy with requirements added, copy the file into/ user/init, and then built the inventory application.
D.
Build and install an Android middleware policy with requirements added, copy the file into/ user/init, and then built the inventory application.
Answers
Suggested answer: A

A company's employees are not permitted to access company systems while traveling internationally. The company email system is configured to block logins based on geographic location, but some employees report their mobile phones continue to sync email traveling . Which of the following is the MOST likely explanation? (Select TWO.)

A.
Outdated escalation attack
A.
Outdated escalation attack
Answers
B.
Privilege escalation attack
B.
Privilege escalation attack
Answers
C.
VPN on the mobile device
C.
VPN on the mobile device
Answers
D.
Unrestricted email administrator accounts
D.
Unrestricted email administrator accounts
Answers
E.
Chief use of UDP protocols
E.
Chief use of UDP protocols
Answers
F.
Disabled GPS on mobile devices
F.
Disabled GPS on mobile devices
Answers
Suggested answer: C, F

Explanation:


A Chief information Security Officer (CISO) has launched to create a rebuts BCP/DR plan for the entire company. As part of the initiative , the security team must gather data supporting s operational importance for the applications used by the business and determine the order in which the application must be back online. Which of the following be the FIRST step taken by the team?

A.
Perform a review of all policies an procedures related to BGP a and DR and created an educated educational module that can be assigned to at employees to provide training on BCP/DR events.
A.
Perform a review of all policies an procedures related to BGP a and DR and created an educated educational module that can be assigned to at employees to provide training on BCP/DR events.
Answers
B.
Create an SLA for each application that states when the application will come back online and distribute this information to the business units.
B.
Create an SLA for each application that states when the application will come back online and distribute this information to the business units.
Answers
C.
Have each business unit conduct a BIA and categories the application according to the cumulative data gathered.
C.
Have each business unit conduct a BIA and categories the application according to the cumulative data gathered.
Answers
D.
Implement replication of all servers and application data to back up detacenters that are geographically from the central datacenter and release an upload BPA to all clients.
D.
Implement replication of all servers and application data to back up detacenters that are geographically from the central datacenter and release an upload BPA to all clients.
Answers
Suggested answer: C

An organization developed a social media application that is used by customers in multiple remote geographic locations around the world. The organization's headquarters and only datacenter are located in New York City. The Chief Information Security Officer wants to ensure the following requirements are met for the social media application:

Low latency for all mobile users to improve the users' experience

SSL offloading to improve web server performance

Protection against DoS and DDoS attacks

High availability

Which of the following should the organization implement to BEST ensure all requirements are met?

A.
A cache server farm in its datacenter
A.
A cache server farm in its datacenter
Answers
B.
A load-balanced group of reverse proxy servers with SSL acceleration
B.
A load-balanced group of reverse proxy servers with SSL acceleration
Answers
C.
A CDN with the origin set to its datacenter
C.
A CDN with the origin set to its datacenter
Answers
D.
Dual gigabit-speed Internet connections with managed DDoS prevention
D.
Dual gigabit-speed Internet connections with managed DDoS prevention
Answers
Suggested answer: B

A security architect is reviewing the following proposed corporate firewall architecture and configuration:

Both firewalls are stateful and provide Layer 7 filtering and routing. The company has the following requirements:

Web servers must receive all updates via HTTP/S from the corporate network.

Web servers should not initiate communication with the Internet.

Web servers should only connect to preapproved corporate database servers.

Employees' computing devices should only connect to web services over ports 80 and 443.

Which of the following should the architect recommend to ensure all requirements are met in the MOST secure manner? (Choose two.)

A.
Add the following to Firewall_A: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0/0 TCP 80,443
A.
Add the following to Firewall_A: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0/0 TCP 80,443
Answers
B.
Add the following to Firewall_A: 15 PERMIT FROM 192.168.1.0/24 TO 0.0.0.0 TCP 80,443
B.
Add the following to Firewall_A: 15 PERMIT FROM 192.168.1.0/24 TO 0.0.0.0 TCP 80,443
Answers
C.
Add the following to Firewall_A: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0/0 TCP/UDP 0-65535
C.
Add the following to Firewall_A: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0/0 TCP/UDP 0-65535
Answers
D.
Add the following to Firewall_B: 15 PERMIT FROM 0.0.0.0/0 TO 10.0.0.0/16 TCP/UDP 0-65535
D.
Add the following to Firewall_B: 15 PERMIT FROM 0.0.0.0/0 TO 10.0.0.0/16 TCP/UDP 0-65535
Answers
E.
Add the following to Firewall_B: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0 TCP/UDP 0-65535
E.
Add the following to Firewall_B: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0 TCP/UDP 0-65535
Answers
F.
Add the following to Firewall_B: 15 PERMIT FROM 192.168.1.0/24 TO 10.0.2.10/32 TCP 80,443
F.
Add the following to Firewall_B: 15 PERMIT FROM 192.168.1.0/24 TO 10.0.2.10/32 TCP 80,443
Answers
Suggested answer: A, D

As part of the customer registration process to access a new bank account, customers are required to upload a number of documents, including their passports and driver's licenses. The process also requires customers to take a current photo of themselves to be compared against provided documentation.

Which of the following BEST describes this process?

A.
Deepfake
A.
Deepfake
Answers
B.
Know your customer
B.
Know your customer
Answers
C.
Identity proofing
C.
Identity proofing
Answers
D.
Passwordless
D.
Passwordless
Answers
Suggested answer: C

A user from the sales department opened a suspicious file attachment. The sales department then contacted the SOC to investigate a number of unresponsive systems, and the team successfully identified the file and the origin of the attack.

Which of the following is t he NEXT step of the incident response plan?

A.
Remediation
A.
Remediation
Answers
B.
Containment
B.
Containment
Answers
C.
Response
C.
Response
Answers
D.
Recovery
D.
Recovery
Answers
Suggested answer: B

A recent data breach stemmed from unauthorized access to an employee's company account with a cloud-based productivity suite. The attacker exploited excessive permissions granted to a third-party OAuth application to collect sensitive information.

Which of the following BEST mitigates inappropriate access and permissions issues?

A.
SIEM
A.
SIEM
Answers
B.
CASB
B.
CASB
Answers
C.
WAF
C.
WAF
Answers
D.
SOAR
D.
SOAR
Answers
Suggested answer: C

A security engineer is hardening a company's multihomed SFTP server. When scanning a public-facing network interface, the engineer finds the following ports are open:

22

25

110

137

138

139

445

Internal Windows clients are used to transferring files to the server to stage them for customer download as part of the company's distribution process.

Which of the following would be the BEST solution to harden the system?

A.
Close ports 110, 138, and 139. Bind ports 22, 25, and 137 to only the internal interface.
A.
Close ports 110, 138, and 139. Bind ports 22, 25, and 137 to only the internal interface.
Answers
B.
Close ports 25 and 110. Bind ports 137, 138, 139, and 445 to only the internal interface.
B.
Close ports 25 and 110. Bind ports 137, 138, 139, and 445 to only the internal interface.
Answers
C.
Close ports 22 and 139. Bind ports 137, 138, and 445 to only the internal interface.
C.
Close ports 22 and 139. Bind ports 137, 138, and 445 to only the internal interface.
Answers
D.
Close ports 22, 137, and 138. Bind ports 110 and 445 to only the internal interface.
D.
Close ports 22, 137, and 138. Bind ports 110 and 445 to only the internal interface.
Answers
Suggested answer: A

A recent data breach revealed that a company has a number of files containing customer data across its storage environment. These files are individualized for each employee and are used in tracking various customer orders, inquiries, and issues. The files are not encrypted and can be accessed by anyone. The senior management team would like to address these issues without interrupting existing processes.

Which of the following should a security architect recommend?

A.
A DLP program to identify which files have customer data and delete them
A.
A DLP program to identify which files have customer data and delete them
Answers
B.
An ERP program to identify which processes need to be tracked
B.
An ERP program to identify which processes need to be tracked
Answers
C.
A CMDB to report on systems that are not configured to security baselines
C.
A CMDB to report on systems that are not configured to security baselines
Answers
D.
A CRM application to consolidate the data and provision access based on the process and need
D.
A CRM application to consolidate the data and provision access based on the process and need
Answers
Suggested answer: D
Total 510 questions
Go to page: of 51