ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











A company is looking for a solution to hide data stored in databases. The solution must meet the following requirements:

Be efficient at protecting the production environment

Not require any change to the application

Act at the presentation layer

Which of the following techniques should be used?

A.
Masking
A.
Masking
Answers
B.
Tokenization
B.
Tokenization
Answers
C.
Algorithmic
C.
Algorithmic
Answers
D.
Random substitution
D.
Random substitution
Answers
Suggested answer: A

A software house is developing a new application. The application has the following requirements:

Reduce the number of credential requests as much as possible

Integrate with social networks

Authenticate users

Which of the following is the BEST federation method to use for the application?

A.
WS-Federation
A.
WS-Federation
Answers
B.
OpenID
B.
OpenID
Answers
C.
OAuth
C.
OAuth
Answers
D.
SAML
D.
SAML
Answers
Suggested answer: D

An organization is prioritizing efforts to remediate or mitigate risks identified during the latest assessment. For one of the risks, a full remediation was not possible, but the organization was able to successfully apply mitigations to reduce the likelihood of impact.

Which of the following should the organization perform NEXT?

A.
Assess the residual risk.
A.
Assess the residual risk.
Answers
B.
Update the organization's threat model.
B.
Update the organization's threat model.
Answers
C.
Move to the next risk in the register.
C.
Move to the next risk in the register.
Answers
D.
Recalculate the magnitude of impact.
D.
Recalculate the magnitude of impact.
Answers
Suggested answer: A

Company A acquired Company . During an audit, a security engineer found Company B's environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B's infrastructure could be integrated into Company A's security program.

Which of the following risk-handling techniques was used?

A.
Accept
A.
Accept
Answers
B.
Avoid
B.
Avoid
Answers
C.
Transfer
C.
Transfer
Answers
D.
Mitigate
D.
Mitigate
Answers
Suggested answer: D

A security consultant needs to protect a network of electrical relays that are used for monitoring and controlling the energy used in a manufacturing facility.

Which of the following systems should the consultant review before making a recommendation?

A.
CAN
A.
CAN
Answers
B.
ASIC
B.
ASIC
Answers
C.
FPGA
C.
FPGA
Answers
D.
SCADA
D.
SCADA
Answers
Suggested answer: D

A networking team was asked to provide secure remote access to all company employees. The team decided to use client-to-site VPN as a solution. During a discussion, the Chief Information Security Officer raised a security concern and asked the networking team to route the Internet traffic of remote users through the main office infrastructure. Doing this would prevent remote users from accessing the Internet through their local networks while connected to the VPN.

Which of the following solutions does this describe?

A.
Full tunneling
A.
Full tunneling
Answers
B.
Asymmetric routing
B.
Asymmetric routing
Answers
C.
SSH tunneling
C.
SSH tunneling
Answers
D.
Split tunneling
D.
Split tunneling
Answers
Suggested answer: A

Explanation:

The concern is users operating in a spit tunnel config which is what is being described. Using a Full Tunnel would route traffic from all applications through a single tunnel. https://cybernews.com/what-is-vpn/split-tunneling/

A security compliance requirement states that specific environments that handle sensitive data must be protected by need-to-know restrictions and can only connect to authorized endpoints. The requirement also states that a DLP solution within the environment must be used to control the data from leaving the environment.

Which of the following should be implemented for privileged users so they can support the environment from their workstations while remaining compliant?

A.
NAC to control authorized endpoints
A.
NAC to control authorized endpoints
Answers
B.
FIM on the servers storing the data
B.
FIM on the servers storing the data
Answers
C.
A jump box in the screened subnet
C.
A jump box in the screened subnet
Answers
D.
A general VPN solution to the primary network
D.
A general VPN solution to the primary network
Answers
Suggested answer: A

Explanation:

Network Access Control (NAC) is used to bolster the network security by restricting the availability of network resources to managed endpoints that don't satisfy the compliance requirements of the Organization.

Which of the following agreements includes no penalties and can be signed by two entities that are working together toward the same goal?

A.
MOU
A.
MOU
Answers
B.
NDA
B.
NDA
Answers
C.
SLA
C.
SLA
Answers
D.
ISA
D.
ISA
Answers
Suggested answer: A

A large number of emails have been reported, and a security analyst is reviewing the following information from the emails:

As part of the image process, which of the following is the FIRST step the analyst should take?

A.
Block the email address carl b@comptia1 com, as it is sending spam to subject matter experts
A.
Block the email address carl b@comptia1 com, as it is sending spam to subject matter experts
Answers
B.
Validate the final 'Received' header against the DNS entry of the domain.
B.
Validate the final 'Received' header against the DNS entry of the domain.
Answers
C.
Compare the 'Return-Path' and 'Received' fields.
C.
Compare the 'Return-Path' and 'Received' fields.
Answers
D.
Ignore the emails, as SPF validation is successful, and it is a false positive
D.
Ignore the emails, as SPF validation is successful, and it is a false positive
Answers
Suggested answer: C

A security architect is given the following requirements to secure a rapidly changing enterprise with an increasingly distributed and remote workforce

* Cloud-delivered services

* Full network security stack

* SaaS application security management

* Minimal latency for an optimal user experience

* Integration with the cloud 1AM platform

Which of the following is the BEST solution?

A.
Routing and Remote Access Service (RRAS)
A.
Routing and Remote Access Service (RRAS)
Answers
B.
NGFW
B.
NGFW
Answers
C.
Managed Security Service Provider (MSSP)
C.
Managed Security Service Provider (MSSP)
Answers
D.
SASE
D.
SASE
Answers
Suggested answer: D
Total 510 questions
Go to page: of 51