ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











An HVAC contractor requested network connectivity permission to remotely support/troubleshoot equipment issues at a company location. Currently, the company does not have a process that allows vendors remote access to the corporate network Which of the following solutions represents the BEST course of action to allow the contractor access?

A.
Add the vendor's equipment to the existing network Give the vendor access through the standard corporate VPN
A.
Add the vendor's equipment to the existing network Give the vendor access through the standard corporate VPN
Answers
B.
Give the vendor a standard desktop PC to attach the equipment to Give the vendor access through the standard corporate VPN
B.
Give the vendor a standard desktop PC to attach the equipment to Give the vendor access through the standard corporate VPN
Answers
C.
Establish a certification process for the vendor Allow certified vendors access to the VDI to monitor and maintain the HVAC equipment
C.
Establish a certification process for the vendor Allow certified vendors access to the VDI to monitor and maintain the HVAC equipment
Answers
D.
Create a dedicated segment with no access to the corporate network Implement dedicated VPN hardware for vendor access
D.
Create a dedicated segment with no access to the corporate network Implement dedicated VPN hardware for vendor access
Answers
Suggested answer: D

Which of the following is required for an organization to meet the ISO 27018 standard?

A.
All Pll must be encrypted.
A.
All Pll must be encrypted.
Answers
B.
All network traffic must be inspected.
B.
All network traffic must be inspected.
Answers
C.
GDPR equivalent standards must be met
C.
GDPR equivalent standards must be met
Answers
D.
COBIT equivalent standards must be met
D.
COBIT equivalent standards must be met
Answers
Suggested answer: A

A vulnerability assessment endpoint generated a report of the latest findings. A security analyst needs to review the report and create a priority list of items that must be addressed. Which of the following should the analyst use to create the list quickly?

A.
Business impact rating
A.
Business impact rating
Answers
B.
CVE dates
B.
CVE dates
Answers
C.
CVSS scores
C.
CVSS scores
Answers
D.
OVAL
D.
OVAL
Answers
Suggested answer: A

A security analyst is reviewing the following vulnerability assessment report:

Which of the following should be patched FIRST to minimize attacks against Internet-facing hosts?

A.
Server1
A.
Server1
Answers
B.
Server2
B.
Server2
Answers
C.
Server 3
C.
Server 3
Answers
D.
Servers
D.
Servers
Answers
Suggested answer: A

An organization is researching the automation capabilities for systems within an OT network. A security analyst wants to assist with creating secure coding practices and would like to learn about the programming languages used on the PLCs. Which of the following programming languages is the MOST relevant for PLCs?

A.
Ladder logic
A.
Ladder logic
Answers
B.
Rust
B.
Rust
Answers
C.
C
C.
C
Answers
D.
Python
D.
Python
Answers
E.
Java
E.
Java
Answers
Suggested answer: A

A company based in the United States holds insurance details of EU citizens. Which of the following must be adhered to when processing EU citizens' personal, private, and confidential data?

A.
The principle of lawful, fair, and transparent processing
A.
The principle of lawful, fair, and transparent processing
Answers
B.
The right to be forgotten principle of personal data erasure requests
B.
The right to be forgotten principle of personal data erasure requests
Answers
C.
The non-repudiation and deniability principle
C.
The non-repudiation and deniability principle
Answers
D.
The principle of encryption, obfuscation, and data masking
D.
The principle of encryption, obfuscation, and data masking
Answers
Suggested answer: A

A security architect was asked to modify an existing internal network design to accommodate the following requirements for RDP:

* Enforce MFA for RDP

* Ensure RDP connections are only allowed with secure ciphers.

The existing network is extremely complex and not well segmented. Because of these limitations, the company has requested that the connections not be restricted by network-level firewalls Of ACLs.

Which of the following should the security architect recommend to meet these requirements?

A.
Implement a reverse proxy for remote desktop with a secure cipher configuration enforced.
A.
Implement a reverse proxy for remote desktop with a secure cipher configuration enforced.
Answers
B.
Implement a bastion host with a secure cipher configuration enforced.
B.
Implement a bastion host with a secure cipher configuration enforced.
Answers
C.
Implement a remote desktop gateway server, enforce secure ciphers, and configure to use OTP
C.
Implement a remote desktop gateway server, enforce secure ciphers, and configure to use OTP
Answers
D.
Implement a GPO that enforces TLS cipher suites and limits remote desktop access to only VPN users.
D.
Implement a GPO that enforces TLS cipher suites and limits remote desktop access to only VPN users.
Answers
Suggested answer: C

Explanation:

A remote desktop gateway server is a solution that allows users to connect to remote desktops or applications over the internet using the Remote Desktop Protocol (RDP). A remote desktop gateway server can enforce MFA for RDP by integrating with Azure AD MFA using the Network Policy Server (NPS) extension. The NPS extension can send an OTP (one-time password) to the user's phone or mobile app as a second factor of authentication. A remote desktop gateway server can also enforce secure ciphers by configuring the SSL Cipher Suite Order Group Policy setting to specify the preferred order of cipher suites for TLS/SSL connections. Verified

Reference:

https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/rds-plan-access-from-anywhere

https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-nps-extension-rdg

https://docs.microsoft.com/en-us/windows-server/security/tls/tls-registry-settings#ssl-cipher-suite-order

A security engineer is reviewing a record of events after a recent data breach incident that Involved the following:

* A hacker conducted reconnaissance and developed a footprint of the company s Internet-facing web application assets.

* A vulnerability in a third-party horary was exploited by the hacker, resulting in the compromise of a local account.

* The hacker took advantage of the account's excessive privileges to access a data store and exfiltrate the data without detection.

Which of the following is the BEST solution to help prevent this type of attack from being successful in the future?

A.
Dynamic analysis
A.
Dynamic analysis
Answers
B.
Secure web gateway
B.
Secure web gateway
Answers
C.
Software composition analysis
C.
Software composition analysis
Answers
D.
User behavior analysis
D.
User behavior analysis
Answers
E.
Stateful firewall
E.
Stateful firewall
Answers
Suggested answer: C

Explanation:

Software composition analysis (SCA) is the best solution to help prevent this type of attack from being successful in the future. SCA is a process of identifying the third-party and open source components in the applications of an organization. This analysis leads to the discovery of security risks, quality of code, and license compliance of the components. SCA can help the security engineer to detect and remediate any vulnerabilities in a third-party library that was exploited by the hacker, such as updating to a newer and more secure version of the library. SCA can also help to enforce secure coding practices and standards, such as following the principle of least privilege and avoiding excessive privileges for local accounts. By using SCA, the security engineer can improve the security posture and resilience of the web application assets against future attacks. Verified

Reference:

https://www.synopsys.com/glossary/what-is-software-composition-analysis.html

https://www.geeksforgeeks.org/overview-of-software-composition-analysis/

A security engineer needs 10 implement a CASB to secure employee user web traffic. A Key requirement is mat relevant event data must be collected from existing on-premises infrastructure components and consumed by me CASB to expand traffic visibility. The solution must be nighty resilient to network outages. Which of the following architectural components would BEST meet these requirements?

A.
Log collection
A.
Log collection
Answers
B.
Reverse proxy
B.
Reverse proxy
Answers
C.
AWAF
C.
AWAF
Answers
D.
API mode
D.
API mode
Answers
Suggested answer: A

The Chief information Officer (CIO) wants to implement enterprise mobility throughout the organization. The goal is to allow employees access to company resources. However the CIO wants the ability to enforce configuration settings, manage data, and manage both company-owned and personal devices. Which of the following should the CIO implement to achieve this goal?

A.
BYOO
A.
BYOO
Answers
B.
CYOD
B.
CYOD
Answers
C.
COPE
C.
COPE
Answers
D.
MDM
D.
MDM
Answers
Suggested answer: A
Total 510 questions
Go to page: of 51