ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











An auditor needs to scan documents at rest for sensitive text. These documents contain both text and Images. Which of the following software functionalities must be enabled in the DLP solution for the auditor to be able to fully read these documents? (Select TWO).

A.
Document interpolation
A.
Document interpolation
Answers
B.
Regular expression pattern matching
B.
Regular expression pattern matching
Answers
C.
Optical character recognition functionality
C.
Optical character recognition functionality
Answers
D.
Baseline image matching
D.
Baseline image matching
Answers
E.
Advanced rasterization
E.
Advanced rasterization
Answers
F.
Watermarking
F.
Watermarking
Answers
Suggested answer: A, C

A company Is adopting a new artificial-intelligence-based analytics SaaS solution. This Is the company's first attempt at using a SaaS solution, and a security architect has been asked to determine any future risks. Which of the following would be the GREATEST risk In adopting this solution?

A.
The inability to assign access controls to comply with company policy
A.
The inability to assign access controls to comply with company policy
Answers
B.
The inability to require the service provider process data in a specific country
B.
The inability to require the service provider process data in a specific country
Answers
C.
The inability to obtain company data when migrating to another service
C.
The inability to obtain company data when migrating to another service
Answers
D.
The inability to conduct security assessments against a service provider
D.
The inability to conduct security assessments against a service provider
Answers
Suggested answer: C

A company's Chief Information Officer wants to Implement IDS software onto the current system's architecture to provide an additional layer of security. The software must be able to monitor system activity, provide Information on attempted attacks, and provide analysis of malicious activities to determine the processes or users Involved. Which of the following would provide this information?

A.
HIPS
A.
HIPS
Answers
B.
UEBA
B.
UEBA
Answers
C.
HlDS
C.
HlDS
Answers
D.
NIDS
D.
NIDS
Answers
Suggested answer: B

An attack team performed a penetration test on a new smart card system. The team demonstrated that by subjecting the smart card to high temperatures, the secret key could be revealed.

Which of the following side-channel attacks did the team use?

A.
Differential power analysis
A.
Differential power analysis
Answers
B.
Differential fault analysis
B.
Differential fault analysis
Answers
C.
Differential temperature analysis
C.
Differential temperature analysis
Answers
D.
Differential timing analysis
D.
Differential timing analysis
Answers
Suggested answer: B

Explanation:

'Differential fault analysis (DFA) is a type of active side-channel attack in the field of cryptography, specifically cryptanalysis. The principle is to induce faults---unexpected environmental conditions---into cryptographic operations, to reveal their internal states.'

A local government that is investigating a data exfiltration claim was asked to review the fingerprint of the malicious user's actions. An investigator took a forensic image of the VM an downloaded the image to a secured USB drive to share with the government. Which of the following should be taken into consideration during the process of releasing the drive to the government?

A.
Encryption in transit
A.
Encryption in transit
Answers
B.
Legal issues
B.
Legal issues
Answers
C.
Chain of custody
C.
Chain of custody
Answers
D.
Order of volatility
D.
Order of volatility
Answers
E.
Key exchange
E.
Key exchange
Answers
Suggested answer: C

An auditor Is reviewing the logs from a web application to determine the source of an Incident. The web application architecture Includes an Internet-accessible application load balancer, a number of web servers In a private subnet, application servers, and one database server In a tiered configuration. The application load balancer cannot store the logs. The following are sample log snippets:

Which of the following should the auditor recommend to ensure future incidents can be traced back to the sources?

A.
Enable the x-Forwarded-For header al the load balancer.
A.
Enable the x-Forwarded-For header al the load balancer.
Answers
B.
Install a software-based HIDS on the application servers.
B.
Install a software-based HIDS on the application servers.
Answers
C.
Install a certificate signed by a trusted CA.
C.
Install a certificate signed by a trusted CA.
Answers
D.
Use stored procedures on the database server.
D.
Use stored procedures on the database server.
Answers
E.
Store the value of the $_server ( ' REMOTE_ADDR ' ] received by the web servers.
E.
Store the value of the $_server ( ' REMOTE_ADDR ' ] received by the web servers.
Answers
Suggested answer: C

A help desk technician just informed the security department that a user downloaded a suspicious file from internet explorer last night. The user confirmed accessing all the files and folders before going home from work. the next morning, the user was no longer able to boot the system and was presented a screen with a phone number. The technician then tries to boot the computer using wake-on-LAN, but the system would not come up. which of the following explains why the computer would not boot?

A.
The operating system was corrupted.
A.
The operating system was corrupted.
Answers
B.
SElinux was in enforced status.
B.
SElinux was in enforced status.
Answers
C.
A secure boot violation occurred.
C.
A secure boot violation occurred.
Answers
D.
The disk was encrypted.
D.
The disk was encrypted.
Answers
Suggested answer: A

A small business would like to provide guests who are using mobile devices encrypted WPA3 access without first distributing PSKs or other credentials. Which of the following features will enable the business to meet this objective?

A.
Simultaneous Authentication of Equals
A.
Simultaneous Authentication of Equals
Answers
B.
Enhanced open
B.
Enhanced open
Answers
C.
Perfect forward secrecy
C.
Perfect forward secrecy
Answers
D.
Extensible Authentication Protocol
D.
Extensible Authentication Protocol
Answers
Suggested answer: A

Due to internal resource constraints, the management team has asked the principal security architect to recommend a solution that shifts partial responsibility for application-level controls to the cloud provider. In the shared responsibility model, which of the following levels of service meets this requirement?

A.
laaS
A.
laaS
Answers
B.
SaaS
B.
SaaS
Answers
C.
FaaS
C.
FaaS
Answers
D.
PaaS
D.
PaaS
Answers
Suggested answer: D

A large telecommunications equipment manufacturer needs to evaluate the strengths of security controls in a new telephone network supporting first responders. Which of the following techniques would the company use to evaluate data confidentiality controls?

A.
Eavesdropping
A.
Eavesdropping
Answers
B.
On-path
B.
On-path
Answers
C.
Cryptanalysis
C.
Cryptanalysis
Answers
D.
Code signing
D.
Code signing
Answers
E.
RF sidelobe sniffing
E.
RF sidelobe sniffing
Answers
Suggested answer: A
Total 510 questions
Go to page: of 51