ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











A company wants to quantify and communicate the effectiveness of its security controls but must establish measures. Which of the following is MOST likely to be included in an effective assessment roadmap for these controls?

A.
Create a change management process.
A.
Create a change management process.
Answers
B.
Establish key performance indicators.
B.
Establish key performance indicators.
Answers
C.
Create an integrated master schedule.
C.
Create an integrated master schedule.
Answers
D.
Develop a communication plan.
D.
Develop a communication plan.
Answers
E.
Perform a security control assessment.
E.
Perform a security control assessment.
Answers
Suggested answer: C

A company launched a new service and created a landing page within its website network for users to access the service. Per company policy, all websites must utilize encryption for any authentication pages. A junior network administrator proceeded to use an outdated procedure to order new certificates. Afterward, customers are reporting the following error when accessing a new web page: NET:ERR_CERT_COMMON_NAME_INVALID. Which of the following BEST describes what the administrator should do NEXT?

A.
Request a new certificate with the correct subject alternative name that includes the new websites.
A.
Request a new certificate with the correct subject alternative name that includes the new websites.
Answers
B.
Request a new certificate with the correct organizational unit for the company's website.
B.
Request a new certificate with the correct organizational unit for the company's website.
Answers
C.
Request a new certificate with a stronger encryption strength and the latest cipher suite.
C.
Request a new certificate with a stronger encryption strength and the latest cipher suite.
Answers
D.
Request a new certificate with the same information but including the old certificate on the CRL.
D.
Request a new certificate with the same information but including the old certificate on the CRL.
Answers
Suggested answer: D

An enterprise is undergoing an audit to review change management activities when promoting code to production. The audit reveals the following:

* Some developers can directly publish code to the production environment.

* Static code reviews are performed adequately.

* Vulnerability scanning occurs on a regularly scheduled basis per policy.

Which of the following should be noted as a recommendation within the audit report?

A.
Implement short maintenance windows.
A.
Implement short maintenance windows.
Answers
B.
Perform periodic account reviews.
B.
Perform periodic account reviews.
Answers
C.
Implement job rotation.
C.
Implement job rotation.
Answers
D.
Improve separation of duties.
D.
Improve separation of duties.
Answers
Suggested answer: D

An organization requires a contractual document that includes

* An overview of what is covered

* Goals and objectives

* Performance metrics for each party

* A review of how the agreement is managed by all parties

Which of the following BEST describes this type of contractual document?

A.
SLA
A.
SLA
Answers
B.
BAA
B.
BAA
Answers
C.
NDA
C.
NDA
Answers
D.
ISA
D.
ISA
Answers
Suggested answer: A

Explanation:

A Service Level Agreement is a contract between a service provider and a customer that outlines the level of services to be provided, the metrics by which those services will be measured, and how the agreement will be managed by both parties. SLAs also include provisions for dispute resolution and for the termination of the agreement.

Based on PCI DSS v3.4, One Particular database field can store data, but the data must be unreadable. which of the following data objects meets this requirement?

A.
PAN
A.
PAN
Answers
B.
CVV2
B.
CVV2
Answers
C.
Cardholder name
C.
Cardholder name
Answers
D.
expiration date
D.
expiration date
Answers
Suggested answer: A

A company just released a new video card. Due to limited supply and high demand, attackers are employing automated systems to purchase the device through the company's web store so they can resell it on the secondary market. The company's intended customers are frustrated. A security engineer suggests implementing a CAPTCHA system on the web store to help reduce the number of video cards purchased through automated systems. Which of the following now describes the level of risk?

A.
Inherent
A.
Inherent
Answers
B.
Low
B.
Low
Answers
C.
Mitigated
C.
Mitigated
Answers
D.
Residual.
D.
Residual.
Answers
E.
Transferred
E.
Transferred
Answers
Suggested answer: D

A developer wants to develop a secure external-facing web application. The developer is looking for an online community that produces tools, methodologies, articles, and documentation in the field of

web-application security Which of the following is the BEST option?

A.
ICANN
A.
ICANN
Answers
B.
PCI DSS
B.
PCI DSS
Answers
C.
OWASP
C.
OWASP
Answers
D.
CSA
D.
CSA
Answers
E.
NIST
E.
NIST
Answers
Suggested answer: C

Which of the following is the BEST disaster recovery solution when resources are running in a cloud environment?

A.
Remote provider BCDR
A.
Remote provider BCDR
Answers
B.
Cloud provider BCDR
B.
Cloud provider BCDR
Answers
C.
Alternative provider BCDR
C.
Alternative provider BCDR
Answers
D.
Primary provider BCDR
D.
Primary provider BCDR
Answers
Suggested answer: B

An organization is assessing the security posture of a new SaaS CRM system that handles sensitive PI I and identity information, such as passport numbers. The SaaS CRM system does not meet the organization's current security standards. The assessment identifies the following:

1) There will be a 520,000 per day revenue loss for each day the system is delayed going into production.

2) The inherent risk is high.

3) The residual risk is low.

4) There will be a staged deployment to the solution rollout to the contact center.

Which of the following risk-handling techniques will BEST meet the organization's requirements?

A.
Apply for a security exemption, as the risk is too high to accept.
A.
Apply for a security exemption, as the risk is too high to accept.
Answers
B.
Transfer the risk to the SaaS CRM vendor, as the organization is using a cloud service.
B.
Transfer the risk to the SaaS CRM vendor, as the organization is using a cloud service.
Answers
C.
Accept the risk, as compensating controls have been implemented to manage the risk.
C.
Accept the risk, as compensating controls have been implemented to manage the risk.
Answers
D.
Avoid the risk by accepting the shared responsibility model with the SaaS CRM provider.
D.
Avoid the risk by accepting the shared responsibility model with the SaaS CRM provider.
Answers
Suggested answer: D

A company's finance department acquired a new payment system that exports data to an unencrypted file on the system. The company implemented controls on the file so only appropriate personnel are allowed access. Which of the following risk techniques did the department use in this situation?

A.
Accept
A.
Accept
Answers
B.
Avoid
B.
Avoid
Answers
C.
Transfer
C.
Transfer
Answers
D.
Mitigate
D.
Mitigate
Answers
Suggested answer: D
Total 510 questions
Go to page: of 51