ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











A security analyst observes the following while looking through network traffic in a company's cloud log:

Which of the following steps should the security analyst take FIRST?

A.
Quarantine 10.0.5.52 and run a malware scan against the host.
A.
Quarantine 10.0.5.52 and run a malware scan against the host.
Answers
B.
Access 10.0.5.52 via EDR and identify processes that have network connections.
B.
Access 10.0.5.52 via EDR and identify processes that have network connections.
Answers
C.
Isolate 10.0.50.6 via security groups.
C.
Isolate 10.0.50.6 via security groups.
Answers
D.
Investigate web logs on 10.0.50.6 to determine if this is normal traffic.
D.
Investigate web logs on 10.0.50.6 to determine if this is normal traffic.
Answers
Suggested answer: D

Which of the following is the MOST important cloud-specific risk from the CSP's viewpoint?

A.
Isolation control failure
A.
Isolation control failure
Answers
B.
Management plane breach
B.
Management plane breach
Answers
C.
Insecure data deletion
C.
Insecure data deletion
Answers
D.
Resource exhaustion
D.
Resource exhaustion
Answers
Suggested answer: B

An organization is developing a disaster recovery plan that requires data to be backed up and available at a moment's notice.

Which of the following should the organization consider FIRST to address this requirement?

A.
Implement a change management plan to ensure systems are using the appropriate versions.
A.
Implement a change management plan to ensure systems are using the appropriate versions.
Answers
B.
Hire additional on-call staff to be deployed if an event occurs.
B.
Hire additional on-call staff to be deployed if an event occurs.
Answers
C.
Design an appropriate warm site for business continuity.
C.
Design an appropriate warm site for business continuity.
Answers
D.
Identify critical business processes and determine associated software and hardware requirements.
D.
Identify critical business processes and determine associated software and hardware requirements.
Answers
Suggested answer: D

Leveraging cryptographic solutions to protect data that is in use ensures the data is encrypted:

A.
when it is passed across a local network.
A.
when it is passed across a local network.
Answers
B.
in memory during processing
B.
in memory during processing
Answers
C.
when it is written to a system's solid-state drive.
C.
when it is written to a system's solid-state drive.
Answers
D.
by an enterprise hardware security module.
D.
by an enterprise hardware security module.
Answers
Suggested answer: B

A Chief Information Officer (CIO) wants to implement a cloud solution that will satisfy the following requirements:

Support all phases of the SDLC.

Use tailored website portal software.

Allow the company to build and use its own gateway software.

Utilize its own data management platform.

Continue using agent-based security tools.

Which of the following cloud-computing models should the CIO implement?

A.
SaaS
A.
SaaS
Answers
B.
PaaS
B.
PaaS
Answers
C.
MaaS
C.
MaaS
Answers
D.
IaaS
D.
IaaS
Answers
Suggested answer: D

A security analyst detected a malicious PowerShell attack on a single server. The malware used the Invoke-Expression function to execute an external malicious script. The security analyst scanned the disk with an antivirus application and did not find any IOCs. The security analyst now needs to deploy a protection solution against this type of malware.

Which of the following BEST describes the type of malware the solution should protect against?

A.
Worm
A.
Worm
Answers
B.
Logic bomb
B.
Logic bomb
Answers
C.
Fileless
C.
Fileless
Answers
D.
Rootkit
D.
Rootkit
Answers
Suggested answer: C

A development team created a mobile application that contacts a company's back-end APIs housed in a PaaS environment. The APIs have been experiencing high processor utilization due to scraping activities. The security engineer needs to recommend a solution that will prevent and remedy the behavior.

Which of the following would BEST safeguard the APIs? (Choose two.)

A.
Bot protection
A.
Bot protection
Answers
B.
OAuth 2.0
B.
OAuth 2.0
Answers
C.
Input validation
C.
Input validation
Answers
D.
Autoscaling endpoints
D.
Autoscaling endpoints
Answers
E.
Rate limiting
E.
Rate limiting
Answers
F.
CSRF protection
F.
CSRF protection
Answers
Suggested answer: D, E

An organization's existing infrastructure includes site-to-site VPNs between datacenters. In the past year, a sophisticated attacker exploited a zero-day vulnerability on the VPN concentrator. Consequently, the Chief Information Security Officer (CISO) is making infrastructure changes to mitigate the risk of service loss should another zero-day exploit be used against the VPN solution.

Which of the following designs would be BEST for the CISO to use?

A.
Adding a second redundant layer of alternate vendor VPN concentrators
A.
Adding a second redundant layer of alternate vendor VPN concentrators
Answers
B.
Using Base64 encoding within the existing site-to-site VPN connections
B.
Using Base64 encoding within the existing site-to-site VPN connections
Answers
C.
Distributing security resources across VPN sites
C.
Distributing security resources across VPN sites
Answers
D.
Implementing IDS services with each VPN concentrator
D.
Implementing IDS services with each VPN concentrator
Answers
E.
Transitioning to a container-based architecture for site-based services
E.
Transitioning to a container-based architecture for site-based services
Answers
Suggested answer: A

Explanation:

If on VPN concentrator goes down due to a zero day threat, having a redundant VPN concentrator of a different vendor should keep you going.

Which of the following technologies allows CSPs to add encryption across multiple data storages?

A.
Symmetric encryption
A.
Symmetric encryption
Answers
B.
Homomorphic encryption
B.
Homomorphic encryption
Answers
C.
Data dispersion
C.
Data dispersion
Answers
D.
Bit splitting
D.
Bit splitting
Answers
Suggested answer: D

A vulnerability scanner detected an obsolete version of an open-source file-sharing application on one of a company's Linux servers. While the software version is no longer supported by the OSS community, the company's Linux vendor backported fixes, applied them for all current vulnerabilities, and agrees to support the software in the future.

Based on this agreement, this finding is BEST categorized as a:

A.
true positive.
A.
true positive.
Answers
B.
true negative.
B.
true negative.
Answers
C.
false positive.
C.
false positive.
Answers
D.
false negative.
D.
false negative.
Answers
Suggested answer: C
Total 510 questions
Go to page: of 51