ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 18

Add to Whishlist

List of questions

Question 171

Report Export Collapse

An HVAC contractor requested network connectivity permission to remotely support/troubleshoot equipment issues at a company location. Currently, the company does not have a process that allows vendors remote access to the corporate network Which of the following solutions represents the BEST course of action to allow the contractor access?

Become a Premium Member for full access
  Unlock Premium Member

Question 172

Report Export Collapse

Which of the following is required for an organization to meet the ISO 27018 standard?

Become a Premium Member for full access
  Unlock Premium Member

Question 173

Report Export Collapse

A vulnerability assessment endpoint generated a report of the latest findings. A security analyst needs to review the report and create a priority list of items that must be addressed. Which of the following should the analyst use to create the list quickly?

Become a Premium Member for full access
  Unlock Premium Member

Question 174

Report Export Collapse

A security analyst is reviewing the following vulnerability assessment report:

CompTIA CAS-004 image Question 174 94142 10022024175034000000

Which of the following should be patched FIRST to minimize attacks against Internet-facing hosts?

Become a Premium Member for full access
  Unlock Premium Member

Question 175

Report Export Collapse

An organization is researching the automation capabilities for systems within an OT network. A security analyst wants to assist with creating secure coding practices and would like to learn about the programming languages used on the PLCs. Which of the following programming languages is the MOST relevant for PLCs?

Become a Premium Member for full access
  Unlock Premium Member

Question 176

Report Export Collapse

A company based in the United States holds insurance details of EU citizens. Which of the following must be adhered to when processing EU citizens' personal, private, and confidential data?

Become a Premium Member for full access
  Unlock Premium Member

Question 177

Report Export Collapse

A security architect was asked to modify an existing internal network design to accommodate the following requirements for RDP:

* Enforce MFA for RDP

* Ensure RDP connections are only allowed with secure ciphers.

The existing network is extremely complex and not well segmented. Because of these limitations, the company has requested that the connections not be restricted by network-level firewalls Of ACLs.

Which of the following should the security architect recommend to meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 178

Report Export Collapse

A security engineer is reviewing a record of events after a recent data breach incident that Involved the following:

* A hacker conducted reconnaissance and developed a footprint of the company s Internet-facing web application assets.

* A vulnerability in a third-party horary was exploited by the hacker, resulting in the compromise of a local account.

* The hacker took advantage of the account's excessive privileges to access a data store and exfiltrate the data without detection.

Which of the following is the BEST solution to help prevent this type of attack from being successful in the future?

Become a Premium Member for full access
  Unlock Premium Member

Question 179

Report Export Collapse

A security engineer needs 10 implement a CASB to secure employee user web traffic. A Key requirement is mat relevant event data must be collected from existing on-premises infrastructure components and consumed by me CASB to expand traffic visibility. The solution must be nighty resilient to network outages. Which of the following architectural components would BEST meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 180

Report Export Collapse

The Chief information Officer (CIO) wants to implement enterprise mobility throughout the organization. The goal is to allow employees access to company resources. However the CIO wants the ability to enforce configuration settings, manage data, and manage both company-owned and personal devices. Which of the following should the CIO implement to achieve this goal?

Become a Premium Member for full access
  Unlock Premium Member
Total 578 questions
Go to page: of 58
Search

Related questions