ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











An attacker infiltrated an electricity-generation site and disabled the safety instrumented system. Ransomware was also deployed on the engineering workstation. The environment has back-to-back firewalls separating the corporate and OT systems. Which of the following is the MOST likely security consequence of this attack?

A.
A turbine would overheat and cause physical harm.
A.
A turbine would overheat and cause physical harm.
Answers
B.
The engineers would need to go to the historian.
B.
The engineers would need to go to the historian.
Answers
C.
The SCADA equipment could not be maintained.
C.
The SCADA equipment could not be maintained.
Answers
D.
Data would be exfiltrated through the data diodes.
D.
Data would be exfiltrated through the data diodes.
Answers
Suggested answer: A

A software development company makes Its software version available to customers from a web portal. On several occasions, hackers were able to access the software repository to change the package that is automatically published on the website. Which of the following would be the BEST technique to ensure the software the users download is the official software released by the company?

A.
Distribute the software via a third-party repository.
A.
Distribute the software via a third-party repository.
Answers
B.
Close the web repository and deliver the software via email.
B.
Close the web repository and deliver the software via email.
Answers
C.
Email the software link to all customers.
C.
Email the software link to all customers.
Answers
D.
Display the SHA checksum on the website.
D.
Display the SHA checksum on the website.
Answers
Suggested answer: D

A security analyst needs to recommend a remediation to the following threat:

Which of the following actions should the security analyst propose to prevent this successful exploitation?

A.
Patch the system.
A.
Patch the system.
Answers
B.
Update the antivirus.
B.
Update the antivirus.
Answers
C.
Install a host-based firewall.
C.
Install a host-based firewall.
Answers
D.
Enable TLS 1.2.
D.
Enable TLS 1.2.
Answers
Suggested answer: D

An organization's finance system was recently attacked. A forensic analyst is reviewing the contents of the compromised files for credit card dat a. Which of the following commands should

the analyst run to BEST determine whether financial data was lost?

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: C

An organization is establishing a new software assurance program to vet applications before they are introduced into the production environment, Unfortunately. many Of the applications are provided only as compiled binaries. Which Of the following should the organization use to analyze these applications? (Select TWO).

A.
Regression testing
A.
Regression testing
Answers
B.
SAST
B.
SAST
Answers
C.
Third-party dependency management
C.
Third-party dependency management
Answers
D.
IDE SAST
D.
IDE SAST
Answers
E.
Fuzz testing
E.
Fuzz testing
Answers
F.
IAST
F.
IAST
Answers
Suggested answer: D, E

A company was recently infected by malware. During the root cause analysis. the company determined that several users were installing their own applications. TO prevent further compromises, the company has decided it will only allow authorized applications to run on its systems. Which Of the following should the company implement?

A.
Signing
A.
Signing
Answers
B.
Access control
B.
Access control
Answers
C.
HIPS
C.
HIPS
Answers
D.
Permit listing
D.
Permit listing
Answers
Suggested answer: D

A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt the data using the keys from the website. Which of the following should the security analyst recommend to protect the affected data?

A.
Key rotation
A.
Key rotation
Answers
B.
Key revocation
B.
Key revocation
Answers
C.
Key escrow
C.
Key escrow
Answers
D.
Zeroization
D.
Zeroization
Answers
E.
Cryptographic obfuscation
E.
Cryptographic obfuscation
Answers
Suggested answer: E

An organization is deploying a new, online digital bank and needs to ensure availability and performance. The cloud-based architecture is deployed using PaaS and SaaS solutions, and it was designed with the following considerations:

- Protection from DoS attacks against its infrastructure and web applications is in place.

- Highly available and distributed DNS is implemented.

- Static content is cached in the CDN.

- A WAF is deployed inline and is in block mode.

- Multiple public clouds are utilized in an active-passive architecture.

With the above controls in place, the bank is experiencing a slowdown on the unauthenticated payments page. Which of the following is the MOST likely cause?

A.
The public cloud provider is applying QoS to the inbound customer traffic.
A.
The public cloud provider is applying QoS to the inbound customer traffic.
Answers
B.
The API gateway endpoints are being directly targeted.
B.
The API gateway endpoints are being directly targeted.
Answers
C.
The site is experiencing a brute-force credential attack.
C.
The site is experiencing a brute-force credential attack.
Answers
D.
A DDoS attack is targeted at the CDN.
D.
A DDoS attack is targeted at the CDN.
Answers
Suggested answer: A

A company is looking at sending historical backups containing customer PII to a cloud service provider to save on storage costs. Which of the following is the MOST important consideration before making this decision?

A.
Availability
A.
Availability
Answers
B.
Data sovereignty
B.
Data sovereignty
Answers
C.
Geography
C.
Geography
Answers
D.
Vendor lock-in
D.
Vendor lock-in
Answers
Suggested answer: B

A security analyst wants to keep track of alt outbound web connections from workstations. The analyst's company uses an on-premises web filtering solution that forwards the outbound traffic to a perimeter firewall. When the security analyst gets the connection events from the firewall, the source IP of the outbound web traffic is the translated IP of the web filtering solution. Considering this scenario involving source NAT. which of the following would be the BEST option to inject in the HTTP header to include the real source IP from workstations?

A.
X-Forwarded-Proto
A.
X-Forwarded-Proto
Answers
B.
X-Forwarded-For
B.
X-Forwarded-For
Answers
C.
Cache-Control
C.
Cache-Control
Answers
D.
Strict-Transport-Security
D.
Strict-Transport-Security
Answers
E.
Content-Security-Policy
E.
Content-Security-Policy
Answers
Suggested answer: B
Total 510 questions
Go to page: of 51