ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 17

List of questions

Question 161

Report Export Collapse

A company is looking for a solution to hide data stored in databases. The solution must meet the following requirements:

Be efficient at protecting the production environment

Not require any change to the application

Act at the presentation layer

Which of the following techniques should be used?

Masking
Masking
Tokenization
Tokenization
Algorithmic
Algorithmic
Random substitution
Random substitution
Suggested answer: A
asked 02/10/2024
abdelhafid houssa
46 questions

Question 162

Report Export Collapse

A software house is developing a new application. The application has the following requirements:

Reduce the number of credential requests as much as possible

Integrate with social networks

Authenticate users

Which of the following is the BEST federation method to use for the application?

WS-Federation
WS-Federation
OpenID
OpenID
OAuth
OAuth
SAML
SAML
Suggested answer: D
asked 02/10/2024
Shaharyar Chaudhry
45 questions

Question 163

Report Export Collapse

An organization is prioritizing efforts to remediate or mitigate risks identified during the latest assessment. For one of the risks, a full remediation was not possible, but the organization was able to successfully apply mitigations to reduce the likelihood of impact.

Which of the following should the organization perform NEXT?

Assess the residual risk.
Assess the residual risk.
Update the organization's threat model.
Update the organization's threat model.
Move to the next risk in the register.
Move to the next risk in the register.
Recalculate the magnitude of impact.
Recalculate the magnitude of impact.
Suggested answer: A
asked 02/10/2024
Deshawn Sharpe
36 questions

Question 164

Report Export Collapse

Company A acquired Company . During an audit, a security engineer found Company B's environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B's infrastructure could be integrated into Company A's security program.

Which of the following risk-handling techniques was used?

Accept
Accept
Avoid
Avoid
Transfer
Transfer
Mitigate
Mitigate
Suggested answer: D
asked 02/10/2024
EduBP srl EduBP
46 questions

Question 165

Report Export Collapse

A security consultant needs to protect a network of electrical relays that are used for monitoring and controlling the energy used in a manufacturing facility.

Which of the following systems should the consultant review before making a recommendation?

CAN
CAN
ASIC
ASIC
FPGA
FPGA
SCADA
SCADA
Suggested answer: D
asked 02/10/2024
José Santos
37 questions

Question 166

Report Export Collapse

A networking team was asked to provide secure remote access to all company employees. The team decided to use client-to-site VPN as a solution. During a discussion, the Chief Information Security Officer raised a security concern and asked the networking team to route the Internet traffic of remote users through the main office infrastructure. Doing this would prevent remote users from accessing the Internet through their local networks while connected to the VPN.

Which of the following solutions does this describe?

Full tunneling
Full tunneling
Asymmetric routing
Asymmetric routing
SSH tunneling
SSH tunneling
Split tunneling
Split tunneling
Suggested answer: A
Explanation:

The concern is users operating in a spit tunnel config which is what is being described. Using a Full Tunnel would route traffic from all applications through a single tunnel. https://cybernews.com/what-is-vpn/split-tunneling/

asked 02/10/2024
Michael Weaver
24 questions

Question 167

Report Export Collapse

A security compliance requirement states that specific environments that handle sensitive data must be protected by need-to-know restrictions and can only connect to authorized endpoints. The requirement also states that a DLP solution within the environment must be used to control the data from leaving the environment.

Which of the following should be implemented for privileged users so they can support the environment from their workstations while remaining compliant?

NAC to control authorized endpoints
NAC to control authorized endpoints
FIM on the servers storing the data
FIM on the servers storing the data
A jump box in the screened subnet
A jump box in the screened subnet
A general VPN solution to the primary network
A general VPN solution to the primary network
Suggested answer: A
Explanation:

Network Access Control (NAC) is used to bolster the network security by restricting the availability of network resources to managed endpoints that don't satisfy the compliance requirements of the Organization.

asked 02/10/2024
Website Subscription
42 questions

Question 168

Report Export Collapse

Which of the following agreements includes no penalties and can be signed by two entities that are working together toward the same goal?

MOU
MOU
NDA
NDA
SLA
SLA
ISA
ISA
Suggested answer: A
asked 02/10/2024
Débora Gomes Almeida
49 questions

Question 169

Report Export Collapse

A large number of emails have been reported, and a security analyst is reviewing the following information from the emails:

CompTIA CAS-004 image Question 169 94137 10022024175034000000

As part of the image process, which of the following is the FIRST step the analyst should take?

Block the email address carl b@comptia1 com, as it is sending spam to subject matter experts
Block the email address carl b@comptia1 com, as it is sending spam to subject matter experts
Validate the final 'Received' header against the DNS entry of the domain.
Validate the final 'Received' header against the DNS entry of the domain.
Compare the 'Return-Path' and 'Received' fields.
Compare the 'Return-Path' and 'Received' fields.
Ignore the emails, as SPF validation is successful, and it is a false positive
Ignore the emails, as SPF validation is successful, and it is a false positive
Suggested answer: C
asked 02/10/2024
Steven Reyes
41 questions

Question 170

Report Export Collapse

A security architect is given the following requirements to secure a rapidly changing enterprise with an increasingly distributed and remote workforce

* Cloud-delivered services

* Full network security stack

* SaaS application security management

* Minimal latency for an optimal user experience

* Integration with the cloud 1AM platform

Which of the following is the BEST solution?

Routing and Remote Access Service (RRAS)
Routing and Remote Access Service (RRAS)
NGFW
NGFW
Managed Security Service Provider (MSSP)
Managed Security Service Provider (MSSP)
SASE
SASE
Suggested answer: D
asked 02/10/2024
Flora Hundal
38 questions
Total 564 questions
Go to page: of 57
Search

Related questions