ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











A company just released a new video card. Due to limited supply and nigh demand, attackers are employing automated systems to purchase the device through the company's web store so they can resell it on the secondary market. The company's Intended customers are frustrated. A security engineer suggests implementing a CAPTCHA system on the web store to help reduce the number of video cards purchased through automated systems. Which of the following now describes the level of risk?

A.
Inherent Low
A.
Inherent Low
Answers
B.
Mitigated
B.
Mitigated
Answers
C.
Residual
C.
Residual
Answers
D.
Transferred
D.
Transferred
Answers
Suggested answer: C

A forensic investigator would use the foremost command for:

A.
cloning disks.
A.
cloning disks.
Answers
B.
analyzing network-captured packets.
B.
analyzing network-captured packets.
Answers
C.
recovering lost files.
C.
recovering lost files.
Answers
D.
extracting features such as email addresses
D.
extracting features such as email addresses
Answers
Suggested answer: C

An organization mat provides a SaaS solution recently experienced an incident involving customer data loss. The system has a level of sell-healing that includes monitoring performance and available resources. When me system detects an issue, the self-healing process is supposed to restart pans of me software.

During the incident, when me self-healing system attempted to restart the services, available disk space on the data drive to restart all the services was inadequate. The self-healing system did not detect that some services did not fully restart and declared me system as fully operational. Which of the following BEST describes me reason why the silent failure occurred?

A.
The system logs rotated prematurely.
A.
The system logs rotated prematurely.
Answers
B.
The disk utilization alarms are higher than what me service restarts require.
B.
The disk utilization alarms are higher than what me service restarts require.
Answers
C.
The number of nodes in me self-healing cluster was healthy,
C.
The number of nodes in me self-healing cluster was healthy,
Answers
D.
Conditional checks prior to the service restart succeeded.
D.
Conditional checks prior to the service restart succeeded.
Answers
Suggested answer: D

A healthcare system recently suffered from a ransomware incident As a result the board of directors decided to hire a security consultant to improve existing network security. The security consultant found that the healthcare network was completely flat, had no privileged access limits and had open RDP access to servers with personal health information. As the consultant builds the remediation plan, which of the following solutions would BEST solve these challenges? (Select THREE).

A.
SD-WAN
A.
SD-WAN
Answers
B.
PAM
B.
PAM
Answers
C.
Remote access VPN
C.
Remote access VPN
Answers
D.
MFA
D.
MFA
Answers
E.
Network segmentation
E.
Network segmentation
Answers
F.
BGP
F.
BGP
Answers
G.
NAC
G.
NAC
Answers
Suggested answer: A, C, E

A business wants to migrate its workloads from an exclusively on-premises IT infrastructure to the cloud but cannot implement all the required controls. Which of the following BEST describes the risk associated with this implementation?

A.
Loss of governance
A.
Loss of governance
Answers
B.
Vendor lockout
B.
Vendor lockout
Answers
C.
Compliance risk
C.
Compliance risk
Answers
D.
Vendor lock-in
D.
Vendor lock-in
Answers
Suggested answer: C

As part of its risk strategy, a company is considering buying insurance for cybersecurity incidents.

Which of the following BEST describes this kind of risk response?

A.
Risk rejection
A.
Risk rejection
Answers
B.
Risk mitigation
B.
Risk mitigation
Answers
C.
Risk transference
C.
Risk transference
Answers
D.
Risk avoidance
D.
Risk avoidance
Answers
Suggested answer: C

A DevOps team has deployed databases, event-driven services, and an API gateway as PaaS solution that will support a new billing system. Which of the following security responsibilities will the DevOps team need to perform?

A.
Securely configure the authentication mechanisms
A.
Securely configure the authentication mechanisms
Answers
B.
Patch the infrastructure at the operating system
B.
Patch the infrastructure at the operating system
Answers
C.
Execute port scanning against the services
C.
Execute port scanning against the services
Answers
D.
Upgrade the service as part of life-cycle management
D.
Upgrade the service as part of life-cycle management
Answers
Suggested answer: A

An auditor needs to scan documents at rest for sensitive text. These documents contain both text and Images. Which of the following software functionalities must be enabled in the DLP solution for the auditor to be able to fully read these documents? (Select TWO).

A.
Document interpolation
A.
Document interpolation
Answers
B.
Regular expression pattern matching
B.
Regular expression pattern matching
Answers
C.
Optical character recognition functionality
C.
Optical character recognition functionality
Answers
D.
Baseline image matching
D.
Baseline image matching
Answers
E.
Advanced rasterization
E.
Advanced rasterization
Answers
F.
Watermarking
F.
Watermarking
Answers
Suggested answer: A, C

Due to adverse events, a medium-sized corporation suffered a major operational disruption that caused its servers to crash and experience a major power outage. Which of the following should be created to prevent this type of issue in the future?

A.
SLA
A.
SLA
Answers
B.
BIA
B.
BIA
Answers
C.
BCM
C.
BCM
Answers
D.
BCP
D.
BCP
Answers
E.
RTO
E.
RTO
Answers
Suggested answer: D

Explanation:

A Business Continuity Plan (BCP) is a set of policies and procedures that outline how an organization should respond to and recover from disruptions[1]. It is designed to ensure that critical operations and services can be quickly restored and maintained, and should include steps to identify risks, develop plans to mitigate those risks, and detail the procedures to be followed in the event of a disruption. Resources:

CompTIA Advanced Security Practitioner (CASP+) Study Guide, Chapter 4: ''Business Continuity Planning,'' Wiley, 2018.https://www.wiley.com/en-us/CompTIA+Advanced+Security+Practitioner+CASP%2B+Study+Guide%2C+2nd+Edition-p-9781119396582

A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

Which of the following would BEST mitigate this vulnerability?

A.
Network intrusion prevention
A.
Network intrusion prevention
Answers
B.
Data encoding
B.
Data encoding
Answers
C.
Input validation
C.
Input validation
Answers
D.
CAPTCHA
D.
CAPTCHA
Answers
Suggested answer: C
Total 510 questions
Go to page: of 51