ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











A business stores personal client data of individuals residing in the EU in order to process requests for mortgage loan approvals.

Which of the following does the business's IT manager need to consider?

A.
The availability of personal data
A.
The availability of personal data
Answers
B.
The right to personal data erasure
B.
The right to personal data erasure
Answers
C.
The company's annual revenue
C.
The company's annual revenue
Answers
D.
The language of the web application
D.
The language of the web application
Answers
Suggested answer: B

Explanation:

The right to personal data erasure, also known as the right to be forgotten, is one of the requirements of the EU General Data Protection Regulation (GDPR), which applies to any business that stores personal data of individuals residing in the EU. This right allows individuals to request the deletion of their personal data from a business under certain circumstances. The availability of personal data, the company's annual revenue, and the language of the web application are not relevant to the GDPR. Verified

Reference: https://www.comptia.org/blog/what-is-gdpr https://partners.comptia.org/docs/default-source/resources/casp-content-guide

A company publishes several APIs for customers and is required to use keys to segregate customer data sets.

Which of the following would be BEST to use to store customer keys?

A.
A trusted platform module
A.
A trusted platform module
Answers
B.
A hardware security module
B.
A hardware security module
Answers
C.
A localized key store
C.
A localized key store
Answers
D.
A public key infrastructure
D.
A public key infrastructure
Answers
Suggested answer: D

Explanation:

A public key infrastructure (PKI) is a system of certificates and keys that can provide encryption and authentication for APIs (application programming interfaces). A PKI can be used to store customer keys for accessing APIs and segregating customer data sets. A trusted platform module (TPM) is a hardware device that provides cryptographic functions and key storage, but it is not suitable for storing customer keys for APIs. A hardware security module (HSM) is similar to a TPM, but it is used for storing keys for applications, not for APIs. A localized key store is a software component that stores keys locally, but it is not as secure or scalable as a PKI. Verified

Reference: https://www.comptia.org/blog/what-is-pki https://partners.comptia.org/docs/default-source/resources/casp-content-guide

An organization wants to perform a scan of all its systems against best practice security configurations.

Which of the following SCAP standards, when combined, will enable the organization to view each of the configuration checks in a machine-readable checklist format for fill automation? (Choose two.)

A.
ARF
A.
ARF
Answers
B.
XCCDF
B.
XCCDF
Answers
C.
CPE
C.
CPE
Answers
D.
CVE
D.
CVE
Answers
E.
CVSS
E.
CVSS
Answers
F.
OVAL
F.
OVAL
Answers
Suggested answer: B, F

Explanation:

XCCDF (Extensible Configuration Checklist Description Format) and OVAL (Open Vulnerability and Assessment Language) are two SCAP (Security Content Automation Protocol) standards that can enable the organization to view each of the configuration checks in a machine-readable checklist format for full automation. XCCDF is a standard for expressing security checklists and benchmarks, while OVAL is a standard for expressing system configuration information and vulnerabilities. ARF (Asset Reporting Format) is a standard for expressing the transport format of information about assets, not configuration checks. CPE (Common Platform Enumeration) is a standard for identifying and naming hardware, software, and operating systems, not configuration checks. CVE (Common Vulnerabilities and Exposures) is a standard for identifying and naming publicly known cybersecurity vulnerabilities, not configuration checks. CVSS (Common Vulnerability Scoring System) is a standard for assessing the severity of cybersecurity vulnerabilities, not configuration checks. Verified

Reference: https://www.comptia.org/blog/what-is-scap https://partners.comptia.org/docs/default-source/resources/casp-content-guide

An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items.

Which of the following phases establishes the identification and prioritization of critical systems and functions?

A.
Review a recent gap analysis.
A.
Review a recent gap analysis.
Answers
B.
Perform a cost-benefit analysis.
B.
Perform a cost-benefit analysis.
Answers
C.
Conduct a business impact analysis.
C.
Conduct a business impact analysis.
Answers
D.
Develop an exposure factor matrix.
D.
Develop an exposure factor matrix.
Answers
Suggested answer: C

Explanation:

According to NIST SP 800-34 Rev. 1, a business impact analysis (BIA) is a process that identifies and evaluates the potential effects of natural and man-made events on organizational operations.The BIA enables an organization to determine which systems and processes are essential to the organization's mission and prioritize their recovery time objectives (RTOs) and recovery point objectives (RPOs).12

An organization is preparing to migrate its production environment systems from an on-premises environment to a cloud service. The lead security architect is concerned that the organization's current methods for addressing risk may not be possible in the cloud environment.

Which of the following BEST describes the reason why traditional methods of addressing risk may not be possible in the cloud?

A.
Migrating operations assumes the acceptance of all risk.
A.
Migrating operations assumes the acceptance of all risk.
Answers
B.
Cloud providers are unable to avoid risk.
B.
Cloud providers are unable to avoid risk.
Answers
C.
Specific risks cannot be transferred to the cloud provider.
C.
Specific risks cannot be transferred to the cloud provider.
Answers
D.
Risks to data in the cloud cannot be mitigated.
D.
Risks to data in the cloud cannot be mitigated.
Answers
Suggested answer: C

Explanation:

According to NIST SP 800-146, cloud computing introduces new risks that need to be assessed and managed by the cloud consumer. Some of these risks are related to the shared responsibility model of cloud computing, where some security controls are implemented by the cloud provider and some by the cloud consumer.The cloud consumer cannot transfer all the risks to the cloud provider and needs to understand which risks are retained and which are mitigated by the cloud provider.3

A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization.

Which of the following actions would BEST resolve the issue? (Choose two.)

A.
Conduct input sanitization.
A.
Conduct input sanitization.
Answers
B.
Deploy a SIEM.
B.
Deploy a SIEM.
Answers
C.
Use containers.
C.
Use containers.
Answers
D.
Patch the OS
D.
Patch the OS
Answers
E.
Deploy a WAF.
E.
Deploy a WAF.
Answers
F.
Deploy a reverse proxy
F.
Deploy a reverse proxy
Answers
G.
Deploy an IDS.
G.
Deploy an IDS.
Answers
Suggested answer: A, E

Explanation:

A WAF protects your web apps by filtering, monitoring, and blocking any malicious HTTP/S traffic traveling to the web application, and prevents any unauthorized data from leaving the app. It does this by adhering to a set of policies that help determine what traffic is malicious and what traffic is safe.

According to OWASP, LDAP injection is an attack that exploits web applications that construct LDAP statements based on user input without proper validation or sanitization. LDAP injection can result in unauthorized access, data modification, or denial of service.To prevent LDAP injection, OWASP recommends conducting input sanitization by escaping special characters in user input and deploying a web application firewall (WAF) that can detect and block malicious LDAP queries.45

In preparation for the holiday season, a company redesigned the system that manages retail sales and moved it to a cloud service provider. The new infrastructure did not meet the company's availability requirements. During a postmortem analysis, the following issues were highlighted:

1- International users reported latency when images on the web page were initially loading.

2- During times of report processing, users reported issues with inventory when attempting to place orders.

3- Despite the fact that ten new API servers were added, the load across servers was heavy at peak times.

Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?

A.
Serve static content via distributed CDNs, create a read replica of the central database and pull reports from there, and auto-scale API servers based on performance.
A.
Serve static content via distributed CDNs, create a read replica of the central database and pull reports from there, and auto-scale API servers based on performance.
Answers
B.
Increase the bandwidth for the server that delivers images, use a CDN, change the database to a non-relational database, and split the ten API servers across two load balancers.
B.
Increase the bandwidth for the server that delivers images, use a CDN, change the database to a non-relational database, and split the ten API servers across two load balancers.
Answers
C.
Serve images from an object storage bucket with infrequent read times, replicate the database across different regions, and dynamically create API servers based on load.
C.
Serve images from an object storage bucket with infrequent read times, replicate the database across different regions, and dynamically create API servers based on load.
Answers
D.
Serve static-content object storage across different regions, increase the instance size on the managed relational database, and distribute the ten API servers across multiple regions.
D.
Serve static-content object storage across different regions, increase the instance size on the managed relational database, and distribute the ten API servers across multiple regions.
Answers
Suggested answer: A

Explanation:

This solution would address the three issues as follows:

Serving static content via distributed CDNs would reduce the latency for international users by delivering images from the nearest edge location to the user's request.

Creating a read replica of the central database and pulling reports from there would offload the read-intensive workload from the primary database and avoid affecting the inventory data for order placement.

Auto-scaling API servers based on performance would dynamically adjust the number of servers to match the demand and balance the load across them at peak times.

During a remodel, a company's computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The company wants to be able to identify any unauthorized individuals who enter the storage room by following an authorized employee.

Which of the following processes would BEST satisfy this requirement?

A.
Monitor camera footage corresponding to a valid access request.
A.
Monitor camera footage corresponding to a valid access request.
Answers
B.
Require both security and management to open the door.
B.
Require both security and management to open the door.
Answers
C.
Require department managers to review denied-access requests.
C.
Require department managers to review denied-access requests.
Answers
D.
Issue new entry badges on a weekly basis.
D.
Issue new entry badges on a weekly basis.
Answers
Suggested answer: B

Explanation:

This solution would implement a two-factor authentication (2FA) process that would prevent unauthorized individuals from entering the storage room by following an authorized employee. The two factors would be the card reader issued by the security team and the presence of a department manager.

A company is preparing to deploy a global service.

Which of the following must the company do to ensure GDPR compliance? (Choose two.)

A.
Inform users regarding what data is stored.
A.
Inform users regarding what data is stored.
Answers
B.
Provide opt-in/out for marketing messages.
B.
Provide opt-in/out for marketing messages.
Answers
C.
Provide data deletion capabilities.
C.
Provide data deletion capabilities.
Answers
D.
Provide optional data encryption.
D.
Provide optional data encryption.
Answers
E.
Grant data access to third parties.
E.
Grant data access to third parties.
Answers
F.
Provide alternative authentication techniques.
F.
Provide alternative authentication techniques.
Answers
Suggested answer: A, C

Explanation:

The main rights for individuals under the GDPR are to:

allow subject access

have inaccuracies corrected

have information erased

prevent direct marketing

prevent automated decision-making and profiling

allow data portability (as per the paragraph above)

source: https://www.clouddirect.net/11-things-you-must-do-now-for-gdpr-compliance/

These are two of the requirements of the GDPR (General Data Protection Regulation), which is a legal framework that sets guidelines for the collection and processing of personal data of individuals within the European Union (EU). The GDPR also requires data controllers to obtain consent from data subjects, protect data with appropriate security measures, notify data subjects and authorities of data breaches, and appoint a data protection officer.

A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application.

Which of the following is the MOST likely cause?

A.
The user agent client is not compatible with the WAF.
A.
The user agent client is not compatible with the WAF.
Answers
B.
A certificate on the WAF is expired.
B.
A certificate on the WAF is expired.
Answers
C.
HTTP traffic is not forwarding to HTTPS to decrypt.
C.
HTTP traffic is not forwarding to HTTPS to decrypt.
Answers
D.
Old, vulnerable cipher suites are still being used.
D.
Old, vulnerable cipher suites are still being used.
Answers
Suggested answer: C

Explanation:

This could be the cause of the lack of visibility from the WAF (Web Application Firewall) for the web application, as the WAF may not be able to inspect or block unencrypted HTTP traffic. To solve this issue, the web server should redirect all HTTP requests to HTTPS and use SSL/TLS certificates to encrypt the traffic.

Total 510 questions
Go to page: of 51