ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 24

List of questions

Question 231

Report Export Collapse

An organization's finance system was recently attacked. A forensic analyst is reviewing the contents Of the compromised files for credit card dat a.

Which of the following commands should the analyst run to BEST determine whether financial data was lost?

CompTIA CAS-004 image Question 231 94199 10022024175035000000

Option A
Option A
Option B
Option B
Option C
Option C
Option D
Option D
Suggested answer: C
asked 02/10/2024
Mashudu Abraham
39 questions

Question 232

Report Export Collapse

A security architect is tasked with scoping a penetration test that will start next month. The architect wants to define what security controls will be impacted. Which of the following would be the BEST document to consult?

Rules of engagement
Rules of engagement
Master service agreement
Master service agreement
Statement of work
Statement of work
Target audience
Target audience
Suggested answer: C
Explanation:

The Statement of Work is a document that outlines the scope of the penetration test and defines the objectives, tools, methodology, and targets of the test. It also outlines the security controls that will be impacted by the test and what the expected outcomes are. Additionally, the Statement of Work should include any legal requirements and other considerations that should be taken into account during the penetration test.

asked 02/10/2024
Jarlesi Bolivar
37 questions

Question 233

Report Export Collapse

A security architect needs to implement a CASB solution for an organization with a highly distributed remote workforce. One Of the requirements for the implementation includes the capability to discover SaaS applications and block access to those

that are unapproved or identified as risky. Which of the following would BEST achieve this objective?


Deploy endpoint agents that monitor local web traffic to enforce DLP and encryption policies.
Deploy endpoint agents that monitor local web traffic to enforce DLP and encryption policies.
Implement cloud infrastructure to proxy all user web traffic to enforce DI-P and encryption policies.
Implement cloud infrastructure to proxy all user web traffic to enforce DI-P and encryption policies.
Implement cloud infrastructure to proxy all user web traffic and control access according to centralized policy.
Implement cloud infrastructure to proxy all user web traffic and control access according to centralized policy.
Deploy endpoint agents that monitor local web traffic and control access according to centralized policy.
Deploy endpoint agents that monitor local web traffic and control access according to centralized policy.
Suggested answer: C
Explanation:

The best way to achieve the objective of discovering SaaS applications and blocking access to unapproved or identified as risky ones is to implement cloud infrastructure to proxy all user web traffic and control access according to centralized policy (C). This solution would allow the security architect to inspect all web traffic and enforce access control policies centrally. This solution also allows the security architect to detect and block risky SaaS applications.Reference: CompTIA Advanced Security Practitioner (CASP+) Study Guide: Chapter 1: Network Security Architecture and Design, Section 1.3: Cloud Security.


asked 02/10/2024
Miroslav Burzinskij
41 questions

Question 234

Report Export Collapse

An administrator at a software development company would like to protect the integrity Of the company's applications with digital signatures. The developers report that the signing process keeps failing on all applications. The same key pair used for signing, however, is working properly on the website, is valid, and is issued by a trusted C

Which of the following is MOST likely the cause of the signature failing?
Which of the following is MOST likely the cause of the signature failing?
The NTP server is set incorrectly for the developers.
The NTP server is set incorrectly for the developers.
The CA has included the certificate in its CRL_
The CA has included the certificate in its CRL_
The certificate is set for the wrong key usage.
The certificate is set for the wrong key usage.
Each application is missing a SAN or wildcard entry on the certificate.
Each application is missing a SAN or wildcard entry on the certificate.
Suggested answer: C
Explanation:

Digital signatures require the use of a cryptographic key pair, which consists of a private key used to sign the application and a public key used to verify the signature. If the certificate used for signing the application is set for the wrong key usage, then the signature will fail. This can happen if the certificate is set for encrypting data instead of signing data, or if the certificate is set for the wrong algorithm, such as using an RSA key for an ECDSA signature.

asked 02/10/2024
Tolga Kesici
50 questions

Question 235

Report Export Collapse

A municipal department receives telemetry data from a third-party provider The server collecting telemetry sits in the municipal departments screened network and accepts connections from the third party over HTTPS. The daemon has a code execution vulnerability from a lack of input sanitization of out-of-bound messages, and therefore, the cybersecurity engineers would like to Implement nsk mitigations. Which of the following actions, if combined, would BEST prevent exploitation of this vulnerability? (Select TWO).

Implementing a TLS inspection proxy on-path to enable monitoring and policy enforcement
Implementing a TLS inspection proxy on-path to enable monitoring and policy enforcement
Creating a Linux namespace on the telemetry server and adding to it the servicing HTTP daemon
Creating a Linux namespace on the telemetry server and adding to it the servicing HTTP daemon
Installing and configuring filesystem integrity monitoring service on the telemetry server
Installing and configuring filesystem integrity monitoring service on the telemetry server
Implementing an EDR and alert on Identified privilege escalation attempts to the SIEM
Implementing an EDR and alert on Identified privilege escalation attempts to the SIEM
Subscribing to a UTM service that enforces privacy controls between the internal network and the screened subnet
Subscribing to a UTM service that enforces privacy controls between the internal network and the screened subnet
Using the published data schema to monitor and block off nominal telemetry messages
Using the published data schema to monitor and block off nominal telemetry messages
Suggested answer: A, C
Explanation:

A TLS inspection proxy can be used to monitor and enforce policy on HTTPS connections, ensuring that only valid traffic is allowed through and malicious traffic is blocked. Additionally, a filesystem integrity monitoring service can be installed and configured on the telemetry server to monitor for any changes to the filesystem, allowing any malicious changes to be detected and blocked.

asked 02/10/2024
Barret Tan
28 questions

Question 236

Report Export Collapse

An organization recently recovered from an attack that featured an adversary injecting Malicious logic into OS bootloaders on endpoint devices Therefore, the organization decided to require the use of TPM for measured boot and attestation, monitoring each component from the IJEFI through the full loading of OS components. of the following TPM structures enables this storage functionality?

Endorsement tickets
Endorsement tickets
Clock/counter structures
Clock/counter structures
Command tag structures with MAC schemes
Command tag structures with MAC schemes
Platform configuration registers
Platform configuration registers
Suggested answer: D
Explanation:

TPMs provide the ability to store measurements of code and data that can be used to ensure that code and data remain unchanged over time. This is done through Platform Configuration Registers (PCRs), which are structures used to store measurements of code and data. The measurements are taken during the boot process and can be used to compare the state of the system at different times, which can be used to detect any changes to the system and verify that the system has not been tampered with.

asked 02/10/2024
Tony Minjarez
46 questions

Question 237

Report Export Collapse

A company has moved its sensitive workloads lo the cloud and needs to ensure high availability and resiliency of its web-based application. The cloud architecture team was given the following requirements

* The application must run at 70% capacity at all times

* The application must sustain DoS and DDoS attacks.

* Services must recover automatically.

Which of the following should the cloud architecture team implement? (Select THREE).

Read-only replicas
Read-only replicas
BCP
BCP
Autoscaling
Autoscaling
WAF
WAF
CDN
CDN
Encryption
Encryption
Continuous snapshots
Continuous snapshots
Containenzation
Containenzation
Suggested answer: C, D, F
Explanation:

The cloud architecture team should implement Autoscaling (C), WAF (D) and Encryption (F). Autoscaling (C) will ensure that the application is running at 70% capacity at all times. WAF (D) will protect the application from DoS and DDoS attacks. Encryption (F) will protect the data from unauthorized access and ensure that the sensitive workloads remain secure.

asked 02/10/2024
Marco Di Munno
37 questions

Question 238

Report Export Collapse

A security analyst at a global financial firm was reviewing the design of a cloud-based system to identify opportunities to improve the security of the architecture. The system was recently involved in a data breach after a vulnerability was exploited within a virtual machine's operating system. The analyst observed the VPC in which the system was located was not peered with the security VPC that contained the centralized vulnerability scanner due to the cloud provider's limitations. Which of the following is the BEST course of action to help prevent this situation m the near future?

Establish cross-account trusts to connect all VPCs via API for secure configuration scanning.
Establish cross-account trusts to connect all VPCs via API for secure configuration scanning.
Migrate the system to another larger, top-tier cloud provider and leverage the additional VPC peering flexibility.
Migrate the system to another larger, top-tier cloud provider and leverage the additional VPC peering flexibility.
Implement a centralized network gateway to bridge network traffic between all VPCs.
Implement a centralized network gateway to bridge network traffic between all VPCs.
Enable VPC traffic mirroring for all VPCs and aggregate the data for threat detection.
Enable VPC traffic mirroring for all VPCs and aggregate the data for threat detection.
Suggested answer: A
Explanation:

The BEST course of action for the security analyst to help prevent a similar situation in the near future is to Establish cross-account trusts to connect all VPCs via API for secure configuration scanning (A). Cross-account trusts allow for VPCs to be securely connected for the purpose of secure configuration scanning, which can help to identify and remediate vulnerabilities within the system.

asked 02/10/2024
Arnaldo Martinez 2-30793
46 questions

Question 239

Report Export Collapse

A software company wants to build a platform by integrating with another company's established product. Which of the following provisions would be MOST important to include when drafting an agreement between the two companies?

Data sovereignty
Data sovereignty
Shared responsibility
Shared responsibility
Source code escrow
Source code escrow
Safe harbor considerations
Safe harbor considerations
Suggested answer: B
Explanation:

When drafting an agreement between two companies, it is important to clearly define the responsibilities of each party. This is particularly relevant when a software company is looking to integrate with an established product. A shared responsibility agreement ensures that both parties understand their respective responsibilities and are able to work together efficiently and effectively. For example, the software company might be responsible for integrating the product and ensuring it meets user needs, while the established product provider might be responsible for providing ongoing support and maintenance. By outlining these responsibilities in the agreement, both parties can ensure that the platform is built and maintained successfully.

Reference: CompTIA Advanced Security Practitioner (CASP+) Study Guide, Chapter 8, Working with Third Parties.

asked 02/10/2024
Tiago Silva
41 questions

Question 240

Report Export Collapse

A security operations center analyst is investigating anomalous activity between a database server and an unknown external IP address and gathered the following data:

* dbadmin last logged in at 7:30 a.m. and logged out at 8:05 a.m.

* A persistent TCP/6667 connection to the external address was established at 7:55 a.m. The connection is still active.

* Other than bytes transferred to keep the connection alive, only a few kilobytes of data transfer every hour since the start of the connection.

* A sample outbound request payload from PCAP showed the ASCII content: 'JOIN #community'.

Which of the following is the MOST likely root cause?

A SQL injection was used to exfiltrate data from the database server.
A SQL injection was used to exfiltrate data from the database server.
The system has been hijacked for cryptocurrency mining.
The system has been hijacked for cryptocurrency mining.
A botnet Trojan is installed on the database server.
A botnet Trojan is installed on the database server.
The dbadmin user is consulting the community for help via Internet Relay Chat.
The dbadmin user is consulting the community for help via Internet Relay Chat.
Suggested answer: D
Explanation:

The dbadmin user is consulting the community for help via Internet Relay Chat. The clues in the given information point to the dbadmin user having established an Internet Relay Chat (IRC) connection to an external address at 7:55 a.m. This connection is still active, and only a few kilobytes of data have been transferred since the start of the connection. The sample outbound request payload of 'JOIN #community' also suggests that the user is trying to join an IRC chatroom. This suggests that the dbadmin user is using the IRC connection to consult the community for help with a problem. Therefore, the root cause of the anomalous activity is likely the dbadmin user consulting the community for help via IRC.

Reference: CompTIA Advanced Security Practitioner (CASP+) Study Guide, Chapter 10, Investigating Intrusions and Suspicious Activity.

asked 02/10/2024
Marie Joyce Candice Dancel
44 questions
Total 564 questions
Go to page: of 57
Search

Related questions