ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 20

List of questions

Question 191

Report Export Collapse

An auditor needs to scan documents at rest for sensitive text. These documents contain both text and Images. Which of the following software functionalities must be enabled in the DLP solution for the auditor to be able to fully read these documents? (Select TWO).

Document interpolation
Document interpolation
Regular expression pattern matching
Regular expression pattern matching
Optical character recognition functionality
Optical character recognition functionality
Baseline image matching
Baseline image matching
Advanced rasterization
Advanced rasterization
Watermarking
Watermarking
Suggested answer: A, C
asked 02/10/2024
Alfredo Gonzalez
42 questions

Question 192

Report Export Collapse

A company Is adopting a new artificial-intelligence-based analytics SaaS solution. This Is the company's first attempt at using a SaaS solution, and a security architect has been asked to determine any future risks. Which of the following would be the GREATEST risk In adopting this solution?

The inability to assign access controls to comply with company policy
The inability to assign access controls to comply with company policy
The inability to require the service provider process data in a specific country
The inability to require the service provider process data in a specific country
The inability to obtain company data when migrating to another service
The inability to obtain company data when migrating to another service
The inability to conduct security assessments against a service provider
The inability to conduct security assessments against a service provider
Suggested answer: C
asked 02/10/2024
Adlian Akbar
39 questions

Question 193

Report Export Collapse

A company's Chief Information Officer wants to Implement IDS software onto the current system's architecture to provide an additional layer of security. The software must be able to monitor system activity, provide Information on attempted attacks, and provide analysis of malicious activities to determine the processes or users Involved. Which of the following would provide this information?

HIPS
HIPS
UEBA
UEBA
HlDS
HlDS
NIDS
NIDS
Suggested answer: B
asked 02/10/2024
istvan Balla
44 questions

Question 194

Report Export Collapse

An attack team performed a penetration test on a new smart card system. The team demonstrated that by subjecting the smart card to high temperatures, the secret key could be revealed.

Which of the following side-channel attacks did the team use?

Differential power analysis
Differential power analysis
Differential fault analysis
Differential fault analysis
Differential temperature analysis
Differential temperature analysis
Differential timing analysis
Differential timing analysis
Suggested answer: B
Explanation:

'Differential fault analysis (DFA) is a type of active side-channel attack in the field of cryptography, specifically cryptanalysis. The principle is to induce faults---unexpected environmental conditions---into cryptographic operations, to reveal their internal states.'

asked 02/10/2024
Bogdan Paun
37 questions

Question 195

Report Export Collapse

A local government that is investigating a data exfiltration claim was asked to review the fingerprint of the malicious user's actions. An investigator took a forensic image of the VM an downloaded the image to a secured USB drive to share with the government. Which of the following should be taken into consideration during the process of releasing the drive to the government?

Encryption in transit
Encryption in transit
Legal issues
Legal issues
Chain of custody
Chain of custody
Order of volatility
Order of volatility
Key exchange
Key exchange
Suggested answer: C
asked 02/10/2024
Peter Urban
48 questions

Question 196

Report Export Collapse

An auditor Is reviewing the logs from a web application to determine the source of an Incident. The web application architecture Includes an Internet-accessible application load balancer, a number of web servers In a private subnet, application servers, and one database server In a tiered configuration. The application load balancer cannot store the logs. The following are sample log snippets:

CompTIA CAS-004 image Question 196 94164 10022024175034000000

Which of the following should the auditor recommend to ensure future incidents can be traced back to the sources?

Enable the x-Forwarded-For header al the load balancer.
Enable the x-Forwarded-For header al the load balancer.
Install a software-based HIDS on the application servers.
Install a software-based HIDS on the application servers.
Install a certificate signed by a trusted CA.
Install a certificate signed by a trusted CA.
Use stored procedures on the database server.
Use stored procedures on the database server.
Store the value of the $_server ( ' REMOTE_ADDR ' ] received by the web servers.
Store the value of the $_server ( ' REMOTE_ADDR ' ] received by the web servers.
Suggested answer: C
asked 02/10/2024
Krishna Mody
39 questions

Question 197

Report Export Collapse

A help desk technician just informed the security department that a user downloaded a suspicious file from internet explorer last night. The user confirmed accessing all the files and folders before going home from work. the next morning, the user was no longer able to boot the system and was presented a screen with a phone number. The technician then tries to boot the computer using wake-on-LAN, but the system would not come up. which of the following explains why the computer would not boot?

The operating system was corrupted.
The operating system was corrupted.
SElinux was in enforced status.
SElinux was in enforced status.
A secure boot violation occurred.
A secure boot violation occurred.
The disk was encrypted.
The disk was encrypted.
Suggested answer: A
asked 02/10/2024
ozgur yilmaz
33 questions

Question 198

Report Export Collapse

A small business would like to provide guests who are using mobile devices encrypted WPA3 access without first distributing PSKs or other credentials. Which of the following features will enable the business to meet this objective?

Simultaneous Authentication of Equals
Simultaneous Authentication of Equals
Enhanced open
Enhanced open
Perfect forward secrecy
Perfect forward secrecy
Extensible Authentication Protocol
Extensible Authentication Protocol
Suggested answer: A
asked 02/10/2024
Robert Endicott
47 questions

Question 199

Report Export Collapse

Due to internal resource constraints, the management team has asked the principal security architect to recommend a solution that shifts partial responsibility for application-level controls to the cloud provider. In the shared responsibility model, which of the following levels of service meets this requirement?

laaS
laaS
SaaS
SaaS
FaaS
FaaS
PaaS
PaaS
Suggested answer: D
asked 02/10/2024
Sergio Quintero Angel
43 questions

Question 200

Report Export Collapse

A large telecommunications equipment manufacturer needs to evaluate the strengths of security controls in a new telephone network supporting first responders. Which of the following techniques would the company use to evaluate data confidentiality controls?

Eavesdropping
Eavesdropping
On-path
On-path
Cryptanalysis
Cryptanalysis
Code signing
Code signing
RF sidelobe sniffing
RF sidelobe sniffing
Suggested answer: A
asked 02/10/2024
Danilo Romelli
59 questions
Total 564 questions
Go to page: of 57
Search

Related questions