ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 19

List of questions

Question 181

Report Export Collapse

A company just released a new video card. Due to limited supply and nigh demand, attackers are employing automated systems to purchase the device through the company's web store so they can resell it on the secondary market. The company's Intended customers are frustrated. A security engineer suggests implementing a CAPTCHA system on the web store to help reduce the number of video cards purchased through automated systems. Which of the following now describes the level of risk?

Inherent Low
Inherent Low
Mitigated
Mitigated
Residual
Residual
Transferred
Transferred
Suggested answer: C
asked 02/10/2024
Ellee Chen
44 questions

Question 182

Report Export Collapse

A forensic investigator would use the foremost command for:

cloning disks.
cloning disks.
analyzing network-captured packets.
analyzing network-captured packets.
recovering lost files.
recovering lost files.
extracting features such as email addresses
extracting features such as email addresses
Suggested answer: C
asked 02/10/2024
Robert Petty
55 questions

Question 183

Report Export Collapse

An organization mat provides a SaaS solution recently experienced an incident involving customer data loss. The system has a level of sell-healing that includes monitoring performance and available resources. When me system detects an issue, the self-healing process is supposed to restart pans of me software.

During the incident, when me self-healing system attempted to restart the services, available disk space on the data drive to restart all the services was inadequate. The self-healing system did not detect that some services did not fully restart and declared me system as fully operational. Which of the following BEST describes me reason why the silent failure occurred?

The system logs rotated prematurely.
The system logs rotated prematurely.
The disk utilization alarms are higher than what me service restarts require.
The disk utilization alarms are higher than what me service restarts require.
The number of nodes in me self-healing cluster was healthy,
The number of nodes in me self-healing cluster was healthy,
Conditional checks prior to the service restart succeeded.
Conditional checks prior to the service restart succeeded.
Suggested answer: D
asked 02/10/2024
Edwin Daneel
35 questions

Question 184

Report Export Collapse

A healthcare system recently suffered from a ransomware incident As a result the board of directors decided to hire a security consultant to improve existing network security. The security consultant found that the healthcare network was completely flat, had no privileged access limits and had open RDP access to servers with personal health information. As the consultant builds the remediation plan, which of the following solutions would BEST solve these challenges? (Select THREE).

SD-WAN
SD-WAN
PAM
PAM
Remote access VPN
Remote access VPN
MFA
MFA
Network segmentation
Network segmentation
BGP
BGP
NAC
NAC
Suggested answer: A, C, E
asked 02/10/2024
Zaid Mohammed Haqqani
41 questions

Question 185

Report Export Collapse

A business wants to migrate its workloads from an exclusively on-premises IT infrastructure to the cloud but cannot implement all the required controls. Which of the following BEST describes the risk associated with this implementation?

Loss of governance
Loss of governance
Vendor lockout
Vendor lockout
Compliance risk
Compliance risk
Vendor lock-in
Vendor lock-in
Suggested answer: C
asked 02/10/2024
James DePhillip
47 questions

Question 186

Report Export Collapse

As part of its risk strategy, a company is considering buying insurance for cybersecurity incidents.

Which of the following BEST describes this kind of risk response?

Risk rejection
Risk rejection
Risk mitigation
Risk mitigation
Risk transference
Risk transference
Risk avoidance
Risk avoidance
Suggested answer: C
asked 02/10/2024
Guillermo Fontaine
56 questions

Question 187

Report Export Collapse

A DevOps team has deployed databases, event-driven services, and an API gateway as PaaS solution that will support a new billing system. Which of the following security responsibilities will the DevOps team need to perform?

Securely configure the authentication mechanisms
Securely configure the authentication mechanisms
Patch the infrastructure at the operating system
Patch the infrastructure at the operating system
Execute port scanning against the services
Execute port scanning against the services
Upgrade the service as part of life-cycle management
Upgrade the service as part of life-cycle management
Suggested answer: A
asked 02/10/2024
Zoltan Mate
27 questions

Question 188

Report Export Collapse

An auditor needs to scan documents at rest for sensitive text. These documents contain both text and Images. Which of the following software functionalities must be enabled in the DLP solution for the auditor to be able to fully read these documents? (Select TWO).

Document interpolation
Document interpolation
Regular expression pattern matching
Regular expression pattern matching
Optical character recognition functionality
Optical character recognition functionality
Baseline image matching
Baseline image matching
Advanced rasterization
Advanced rasterization
Watermarking
Watermarking
Suggested answer: A, C
asked 02/10/2024
Christian Walet
42 questions

Question 189

Report Export Collapse

Due to adverse events, a medium-sized corporation suffered a major operational disruption that caused its servers to crash and experience a major power outage. Which of the following should be created to prevent this type of issue in the future?

SLA
SLA
BIA
BIA
BCM
BCM
BCP
BCP
RTO
RTO
Suggested answer: D
Explanation:

A Business Continuity Plan (BCP) is a set of policies and procedures that outline how an organization should respond to and recover from disruptions[1]. It is designed to ensure that critical operations and services can be quickly restored and maintained, and should include steps to identify risks, develop plans to mitigate those risks, and detail the procedures to be followed in the event of a disruption. Resources:

CompTIA Advanced Security Practitioner (CASP+) Study Guide, Chapter 4: ''Business Continuity Planning,'' Wiley, 2018.https://www.wiley.com/en-us/CompTIA+Advanced+Security+Practitioner+CASP%2B+Study+Guide%2C+2nd+Edition-p-9781119396582

asked 02/10/2024
Mustapha Amine Atmani
55 questions

Question 190

Report Export Collapse

A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

CompTIA CAS-004 image Question 190 94158 10022024175034000000

Which of the following would BEST mitigate this vulnerability?

Network intrusion prevention
Network intrusion prevention
Data encoding
Data encoding
Input validation
Input validation
CAPTCHA
CAPTCHA
Suggested answer: C
asked 02/10/2024
Mario Alba Barrero
34 questions
Total 564 questions
Go to page: of 57
Search

Related questions