ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











An organization requires a legacy system to incorporate reference data into a new system. The organization anticipates the legacy system will remain in operation for the next 18 to 24 months. Additionally, the legacy system has multiple critical vulnerabilities with no patches available to resolve them. Which of the following is the BEST design option to optimize security?

A.
Limit access to the system using a jump box.
A.
Limit access to the system using a jump box.
Answers
B.
Place the new system and legacy system on separate VLANs
B.
Place the new system and legacy system on separate VLANs
Answers
C.
Deploy the legacy application on an air-gapped system.
C.
Deploy the legacy application on an air-gapped system.
Answers
D.
Implement MFA to access the legacy system.
D.
Implement MFA to access the legacy system.
Answers
Suggested answer: C

A user experiences an HTTPS connection error when trying to access an Internet banking website from a corporate laptop. The user then opens a browser on a mobile phone and is able to access the same Internet banking website without issue. Which of the following security configurations is MOST likely the cause of the error?

A.
HSTS
A.
HSTS
Answers
B.
TLS 1.2
B.
TLS 1.2
Answers
C.
Certificate pinning
C.
Certificate pinning
Answers
D.
Client authentication
D.
Client authentication
Answers
Suggested answer: A

A company security engineer arrives at work to face the following scenario:

1) Website defacement

2) Calls from the company president indicating the website needs to be fixed Immediately because It Is damaging the brand

3) A Job offer from the company's competitor

4) A security analyst's investigative report, based on logs from the past six months, describing how lateral movement across the network from various IP addresses originating from a foreign adversary country resulted in exfiltrated data

Which of the following threat actors Is MOST likely involved?

A.
Organized crime
A.
Organized crime
Answers
B.
Script kiddie
B.
Script kiddie
Answers
C.
APT/nation-state
C.
APT/nation-state
Answers
D.
Competitor
D.
Competitor
Answers
Suggested answer: C

Explanation:

An Advanced Persistent Threat (APT) is an attack that is targeted, well-planned, and conducted over a long period of time by a nation-state actor. The evidence provided in the scenario indicates that the security analyst has identified a foreign adversary, which is strong evidence that an APT/nation-state actor is responsible for the attack. Resources:

CompTIA Advanced Security Practitioner (CASP+) Study Guide, Chapter 5: ''Advanced Persistent Threats,'' Wiley, 2018.https://www.wiley.com/en-us/CompTIA+Advanced+Security+Practitioner+CASP%2B+Study+Guide%2C+2nd+Edition-p-9781119396582

A security analyst discovered that a database administrator's workstation was compromised by malware. After examining the Jogs. the compromised workstation was observed connecting to multiple databases through ODBC. The following query behavior was captured:

Assuming this query was used to acquire and exfiltrate data, which of the following types of data was compromised, and what steps should the incident response plan contain?

A) Personal health information: Inform the human resources department of the breach and review the DLP logs.

B) Account history; Inform the relationship managers of the breach and create new accounts for the affected users.

C) Customer IDs: Inform the customer service department of the breach and work to change the account numbers.

D) PAN: Inform the legal department of the breach and look for this data in dark web monitoring.

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: D

A company wants to improve Its active protection capabilities against unknown and zero-day malware. Which of the following Is the MOST secure solution?

A.
NIDS
A.
NIDS
Answers
B.
Application allow list
B.
Application allow list
Answers
C.
Sandbox detonation
C.
Sandbox detonation
Answers
D.
Endpoint log collection
D.
Endpoint log collection
Answers
E.
HIDS
E.
HIDS
Answers
Suggested answer: C

A bank is working with a security architect to find the BEST solution to detect database management system compromises. The solution should meet the following requirements:

Work at the application layer

Send alerts on attacks from both privileged and malicious users

Have a very low false positive

Which of the following should the architect recommend?

A.
FIM
A.
FIM
Answers
B.
WAF
B.
WAF
Answers
C.
NIPS
C.
NIPS
Answers
D.
DAM
D.
DAM
Answers
E.
UTM
E.
UTM
Answers
Suggested answer: D

A company's finance department acquired a new payment system that exports data to an unencrypted file on the system. The company implemented controls on the file so only appropriate personnel are allowed access. Which of the following risk techniques did the department use in this situation?

. Accept

. Avoid

A.
Transfer
A.
Transfer
Answers
B.
Mitigate
B.
Mitigate
Answers
Suggested answer:

An attacker infiltrated the code base of a hardware manufacturer and inserted malware before the code was compiled. The malicious code is now running at the hardware level across a number of industries and sectors. Which of the following categories BEST describes this type of vendor risk?

A.
SDLC attack
A.
SDLC attack
Answers
B.
Side-load attack
B.
Side-load attack
Answers
C.
Remote code signing
C.
Remote code signing
Answers
D.
Supply chain attack
D.
Supply chain attack
Answers
Suggested answer: D

An organization is assessing the security posture of a new SaaS CRM system that handles sensitive Pll and identity information, such as passport numbers. The SaaS CRM system does not meet the organization's current security standards. The assessment identifies the following:

1- There will be a $20,000 per day revenue loss for each day the system is delayed going into production.

2- The inherent risk is high.

3- The residual risk is low.

4- There will be a staged deployment to the solution rollout to the contact center.

Which of the following risk-handling techniques will BEST meet the organization's requirements?

A.
Apply for a security exemption, as the risk is too high to accept.
A.
Apply for a security exemption, as the risk is too high to accept.
Answers
B.
Transfer the risk to the SaaS CRM vendor, as the organization is using a cloud service.
B.
Transfer the risk to the SaaS CRM vendor, as the organization is using a cloud service.
Answers
C.
Accept the risk, as compensating controls have been implemented to manage the risk.
C.
Accept the risk, as compensating controls have been implemented to manage the risk.
Answers
D.
Avoid the risk by accepting the shared responsibility model with the SaaS CRM provider.
D.
Avoid the risk by accepting the shared responsibility model with the SaaS CRM provider.
Answers
Suggested answer: A

A company Invested a total of $10 million lor a new storage solution Installed across live on-site datacenters. Fitly percent of the cost of this Investment was for solid-state storage. Due to the high rate of wear on this storage, the company Is estimating that 5% will need to be replaced per year. Which of the following is the ALE due to storage replacement?

A.
$50,000
A.
$50,000
Answers
B.
$125,000
B.
$125,000
Answers
C.
$250,000
C.
$250,000
Answers
D.
$500.000
D.
$500.000
Answers
E.
$51,000,000
E.
$51,000,000
Answers
Suggested answer: C
Total 510 questions
Go to page: of 51