ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 19

Add to Whishlist

List of questions

Question 181

Report Export Collapse

A company just released a new video card. Due to limited supply and nigh demand, attackers are employing automated systems to purchase the device through the company's web store so they can resell it on the secondary market. The company's Intended customers are frustrated. A security engineer suggests implementing a CAPTCHA system on the web store to help reduce the number of video cards purchased through automated systems. Which of the following now describes the level of risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 182

Report Export Collapse

A forensic investigator would use the foremost command for:

Become a Premium Member for full access
  Unlock Premium Member

Question 183

Report Export Collapse

An organization mat provides a SaaS solution recently experienced an incident involving customer data loss. The system has a level of sell-healing that includes monitoring performance and available resources. When me system detects an issue, the self-healing process is supposed to restart pans of me software.

During the incident, when me self-healing system attempted to restart the services, available disk space on the data drive to restart all the services was inadequate. The self-healing system did not detect that some services did not fully restart and declared me system as fully operational. Which of the following BEST describes me reason why the silent failure occurred?

Become a Premium Member for full access
  Unlock Premium Member

Question 184

Report Export Collapse

A healthcare system recently suffered from a ransomware incident As a result the board of directors decided to hire a security consultant to improve existing network security. The security consultant found that the healthcare network was completely flat, had no privileged access limits and had open RDP access to servers with personal health information. As the consultant builds the remediation plan, which of the following solutions would BEST solve these challenges? (Select THREE).

Become a Premium Member for full access
  Unlock Premium Member

Question 185

Report Export Collapse

A business wants to migrate its workloads from an exclusively on-premises IT infrastructure to the cloud but cannot implement all the required controls. Which of the following BEST describes the risk associated with this implementation?

Become a Premium Member for full access
  Unlock Premium Member

Question 186

Report Export Collapse

As part of its risk strategy, a company is considering buying insurance for cybersecurity incidents.

Which of the following BEST describes this kind of risk response?

Become a Premium Member for full access
  Unlock Premium Member

Question 187

Report Export Collapse

A DevOps team has deployed databases, event-driven services, and an API gateway as PaaS solution that will support a new billing system. Which of the following security responsibilities will the DevOps team need to perform?

Become a Premium Member for full access
  Unlock Premium Member

Question 188

Report Export Collapse

An auditor needs to scan documents at rest for sensitive text. These documents contain both text and Images. Which of the following software functionalities must be enabled in the DLP solution for the auditor to be able to fully read these documents? (Select TWO).

Become a Premium Member for full access
  Unlock Premium Member

Question 189

Report Export Collapse

Due to adverse events, a medium-sized corporation suffered a major operational disruption that caused its servers to crash and experience a major power outage. Which of the following should be created to prevent this type of issue in the future?

Become a Premium Member for full access
  Unlock Premium Member

Question 190

Report Export Collapse

A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

CompTIA CAS-004 image Question 190 94158 10022024175034000000

Which of the following would BEST mitigate this vulnerability?

Become a Premium Member for full access
  Unlock Premium Member
Total 578 questions
Go to page: of 58
Search

Related questions