ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 23

List of questions

Question 221

Report Export Collapse

An attacker infiltrated an electricity-generation site and disabled the safety instrumented system. Ransomware was also deployed on the engineering workstation. The environment has back-to-back firewalls separating the corporate and OT systems. Which of the following is the MOST likely security consequence of this attack?

A turbine would overheat and cause physical harm.
A turbine would overheat and cause physical harm.
The engineers would need to go to the historian.
The engineers would need to go to the historian.
The SCADA equipment could not be maintained.
The SCADA equipment could not be maintained.
Data would be exfiltrated through the data diodes.
Data would be exfiltrated through the data diodes.
Suggested answer: A
asked 02/10/2024
Juan Manuel Lopez Ortega
32 questions

Question 222

Report Export Collapse

A software development company makes Its software version available to customers from a web portal. On several occasions, hackers were able to access the software repository to change the package that is automatically published on the website. Which of the following would be the BEST technique to ensure the software the users download is the official software released by the company?

Distribute the software via a third-party repository.
Distribute the software via a third-party repository.
Close the web repository and deliver the software via email.
Close the web repository and deliver the software via email.
Email the software link to all customers.
Email the software link to all customers.
Display the SHA checksum on the website.
Display the SHA checksum on the website.
Suggested answer: D
asked 02/10/2024
Ishan Rathnayaka
42 questions

Question 223

Report Export Collapse

A security analyst needs to recommend a remediation to the following threat:

CompTIA CAS-004 image Question 223 94191 10022024175035000000

Which of the following actions should the security analyst propose to prevent this successful exploitation?

Patch the system.
Patch the system.
Update the antivirus.
Update the antivirus.
Install a host-based firewall.
Install a host-based firewall.
Enable TLS 1.2.
Enable TLS 1.2.
Suggested answer: D
asked 02/10/2024
David Sichimwi
41 questions

Question 224

Report Export Collapse

An organization's finance system was recently attacked. A forensic analyst is reviewing the contents of the compromised files for credit card dat a. Which of the following commands should

the analyst run to BEST determine whether financial data was lost?

CompTIA CAS-004 image Question 224 94192 10022024175035000000

Option A
Option A
Option B
Option B
Option C
Option C
Option D
Option D
Suggested answer: C
asked 02/10/2024
Steve Daniels
46 questions

Question 225

Report Export Collapse

An organization is establishing a new software assurance program to vet applications before they are introduced into the production environment, Unfortunately. many Of the applications are provided only as compiled binaries. Which Of the following should the organization use to analyze these applications? (Select TWO).

Regression testing
Regression testing
SAST
SAST
Third-party dependency management
Third-party dependency management
IDE SAST
IDE SAST
Fuzz testing
Fuzz testing
IAST
IAST
Suggested answer: D, E
asked 02/10/2024
FOTIS FOURLIAS
48 questions

Question 226

Report Export Collapse

A company was recently infected by malware. During the root cause analysis. the company determined that several users were installing their own applications. TO prevent further compromises, the company has decided it will only allow authorized applications to run on its systems. Which Of the following should the company implement?

Signing
Signing
Access control
Access control
HIPS
HIPS
Permit listing
Permit listing
Suggested answer: D
asked 02/10/2024
shridhar deshpande
42 questions

Question 227

Report Export Collapse

A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt the data using the keys from the website. Which of the following should the security analyst recommend to protect the affected data?

Key rotation
Key rotation
Key revocation
Key revocation
Key escrow
Key escrow
Zeroization
Zeroization
Cryptographic obfuscation
Cryptographic obfuscation
Suggested answer: E
asked 02/10/2024
Erik-Jan Brul
39 questions

Question 228

Report Export Collapse

An organization is deploying a new, online digital bank and needs to ensure availability and performance. The cloud-based architecture is deployed using PaaS and SaaS solutions, and it was designed with the following considerations:

- Protection from DoS attacks against its infrastructure and web applications is in place.

- Highly available and distributed DNS is implemented.

- Static content is cached in the CDN.

- A WAF is deployed inline and is in block mode.

- Multiple public clouds are utilized in an active-passive architecture.

With the above controls in place, the bank is experiencing a slowdown on the unauthenticated payments page. Which of the following is the MOST likely cause?

The public cloud provider is applying QoS to the inbound customer traffic.
The public cloud provider is applying QoS to the inbound customer traffic.
The API gateway endpoints are being directly targeted.
The API gateway endpoints are being directly targeted.
The site is experiencing a brute-force credential attack.
The site is experiencing a brute-force credential attack.
A DDoS attack is targeted at the CDN.
A DDoS attack is targeted at the CDN.
Suggested answer: A
asked 02/10/2024
JED MEDIA
38 questions

Question 229

Report Export Collapse

A company is looking at sending historical backups containing customer PII to a cloud service provider to save on storage costs. Which of the following is the MOST important consideration before making this decision?

Availability
Availability
Data sovereignty
Data sovereignty
Geography
Geography
Vendor lock-in
Vendor lock-in
Suggested answer: B
asked 02/10/2024
Phillip Doman
38 questions

Question 230

Report Export Collapse

A security analyst wants to keep track of alt outbound web connections from workstations. The analyst's company uses an on-premises web filtering solution that forwards the outbound traffic to a perimeter firewall. When the security analyst gets the connection events from the firewall, the source IP of the outbound web traffic is the translated IP of the web filtering solution. Considering this scenario involving source NAT. which of the following would be the BEST option to inject in the HTTP header to include the real source IP from workstations?

X-Forwarded-Proto
X-Forwarded-Proto
X-Forwarded-For
X-Forwarded-For
Cache-Control
Cache-Control
Strict-Transport-Security
Strict-Transport-Security
Content-Security-Policy
Content-Security-Policy
Suggested answer: B
asked 02/10/2024
Nick Wells
48 questions
Total 564 questions
Go to page: of 57
Search

Related questions