ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 3

List of questions

Question 21

Report Export Collapse

A security analyst is reviewing the following output:

CompTIA CAS-004 image Question 21 93989 10022024175034000000

Which of the following would BEST mitigate this type of attack?

Installing a network firewall
Installing a network firewall
Placing a WAF inline
Placing a WAF inline
Implementing an IDS
Implementing an IDS
Deploying a honeypot
Deploying a honeypot
Suggested answer: B
Explanation:

The output shows a SQL injection attack that is trying to exploit a web application. A WAF (Web Application Firewall) is a security solution that can detect and block malicious web requests, such as SQL injection, XSS, CSRF, etc. Placing a WAF inline would prevent the attack from reaching the web server and database.

Reference: https://owasp.org/www-community/attacks/SQL_Injection https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/

asked 02/10/2024
Vaibhav Damle
48 questions

Question 22

Report Export Collapse

Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?

Key sharing
Key sharing
Key distribution
Key distribution
Key recovery
Key recovery
Key escrow
Key escrow
Suggested answer: D
Explanation:

Key escrow is a process that involves storing encryption keys with a trusted third party, such as a CASB (Cloud Access Security Broker) or a government agency. Key escrow can enable authorized access to encrypted data in case of emergencies, legal issues, or data recovery. However, key escrow also introduces some risks and challenges, such as trust, security, and privacy.

Reference: https://www.techopedia.com/definition/1772/key-escrow https://searchsecurity.techtarget.com/definition/key-escrow

asked 02/10/2024
RJ MOTAUNG
45 questions

Question 23

Report Export Collapse

An organization is implementing a new identity and access management architecture with the following objectives:

Supporting MFA against on-premises infrastructure

Improving the user experience by integrating with SaaS applications

Applying risk-based policies based on location

Performing just-in-time provisioning

Which of the following authentication protocols should the organization implement to support these requirements?

Kerberos and TACACS
Kerberos and TACACS
SAML and RADIUS
SAML and RADIUS
OAuth and OpenID
OAuth and OpenID
OTP and 802.1X
OTP and 802.1X
Suggested answer: C
Explanation:

OAuth and OpenID are two authentication protocols that can support the objectives of the organization. OAuth is a protocol that allows users to grant access to their resources on one site (or service) to another site (or service) without sharing their credentials. OpenID is a protocol that allows users to use an existing account to sign in to multiple websites without creating new passwords. Both protocols can support MFA, SaaS integration, risk-based policies, and just-in-time provisioning.

Reference: https://auth0.com/docs/protocols/oauth2 https://openid.net/connect/

asked 02/10/2024
Andrea Di Giuseppe
41 questions

Question 24

Report Export Collapse

Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext?

Lattice-based cryptography
Lattice-based cryptography
Quantum computing
Quantum computing
Asymmetric cryptography
Asymmetric cryptography
Homomorphic encryption
Homomorphic encryption
Suggested answer: D
Explanation:

Homomorphic encryption is a type of encryption that allows computation and analysis of data within a ciphertext without knowledge of the plaintext. This means that encrypted data can be processed without being decrypted first, which enhances the security and privacy of the data. Homomorphic encryption can enable applications such as secure cloud computing, machine learning, and data analytics.

Reference: https://www.ibm.com/security/homomorphic-encryption https://www.synopsys.com/blogs/software-security/homomorphic-encryption/

asked 02/10/2024
Maria Gervasi
41 questions

Question 25

Report Export Collapse

A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company's services to ensure false positives do not drop legitimate traffic.

Which of the following would satisfy the requirement?

NIDS
NIDS
NIPS
NIPS
WAF
WAF
Reverse proxy
Reverse proxy
Suggested answer: A
Explanation:

https://owasp.org/www-community/controls/Intrusion_Detection

A NIDS (Network Intrusion Detection System) is a security solution that monitors network traffic for signs of malicious activity, such as attacks, intrusions, or policy violations. A NIDS does not affect the availability of the company's services because it operates in passive mode, which means it does not block or modify traffic. Instead, it alerts the network administrator or other security tools when it detects an anomaly or threat.

Reference: https://www.cisco.com/c/en/us/products/security/what-is-network-intrusion-detection-system.html https://www.imperva.com/learn/application-security/network-intrusion-detection-system-nids/

asked 02/10/2024
cheitram patel
38 questions

Question 26

Report Export Collapse

A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services.

Which of the following should be modified to prevent the issue from reoccurring?

Recovery point objective
Recovery point objective
Recovery time objective
Recovery time objective
Mission-essential functions
Mission-essential functions
Recovery service level
Recovery service level
Suggested answer: D
Explanation:

The recovery service level is a metric that defines the minimum level of service or performance that a system or process must provide after a disaster or disruption. The recovery service level can include parameters such as availability, capacity, throughput, latency, etc. The recovery service level should be modified to prevent the issue of running out of computational resources at 70% of restoration of critical services. The recovery service level should be aligned with the recovery point objective (RPO) and the recovery time objective (RTO), which are the maximum acceptable amount of data loss and downtime respectively.

Reference: https://www.techopedia.com/definition/29836/recovery-service-level https://www.ibm.com/cloud/learn/recovery-point-objective https://www.ibm.com/cloud/learn/recovery-time-objective

asked 02/10/2024
Franklin Adama
51 questions

Question 27

Report Export Collapse

A shipping company that is trying to eliminate entire classes of threats is developing an SELinux policy to ensure its custom Android devices are used exclusively for package tracking.

After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to run?

Protecting
Protecting
Permissive
Permissive
Enforcing
Enforcing
Mandatory
Mandatory
Suggested answer: C
Explanation:

SELinux (Security-Enhanced Linux) is a security module for Linux systems that provides mandatory access control (MAC) policies for processes and files. SELinux can operate in three modes:

Enforcing: SELinux enforces the MAC policies and denies access based on rules.

Permissive: SELinux does not enforce the MAC policies but only logs actions that would have been denied if running in enforcing mode.

Disabled: SELinux is turned off.

To ensure its custom Android devices are used exclusively for package tracking, the company must configure SELinux to run in enforcing mode. This mode will prevent any unauthorized actions or applications from running on the devices and protect them from potential threats or misuse.

Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/selinux_users_and_administrators_guide/chap-security-enhanced_linux-introduction#sect-Security-Enhanced_Linux-Modes https://source.android.com/security/selinux

asked 02/10/2024
ENET SOLUTIONS LOGICOM
42 questions

Question 28

Report Export Collapse

A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log.

Which of the following actions would BEST address the potential risks by the activity in the logs?

Alerting the misconfigured service account password
Alerting the misconfigured service account password
Modifying the AllowUsers configuration directive
Modifying the AllowUsers configuration directive
Restricting external port 22 access
Restricting external port 22 access
Implementing host-key preferences
Implementing host-key preferences
Suggested answer: B
Explanation:

The AllowUsers configuration directive is an option for SSH servers that specifies which users are allowed to log in using SSH. The directive can include usernames, hostnames, IP addresses, or patterns. The directive can also be negated with a preceding exclamation mark (!) to deny access to specific users.

The logs show that there are multiple failed login attempts from different IP addresses using different usernames, such as root, admin, test, etc. This indicates a brute-force attack that is trying to guess the SSH credentials. To address this risk, the security analyst should modify the AllowUsers configuration directive to only allow specific users or hosts that are authorized to access the SSH jump server. This will prevent unauthorized users from attempting to log in using SSH and reduce the attack surface.

Reference: https://man.openbsd.org/sshd_config#AllowUsers https://www.ssh.com/academy/ssh/brute-force

asked 02/10/2024
Mahdi Far
38 questions

Question 29

Report Export Collapse

A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open-source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away.

Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?

Scan the code with a static code analyzer, change privileged user passwords, and provide security training.
Scan the code with a static code analyzer, change privileged user passwords, and provide security training.
Change privileged usernames, review the OS logs, and deploy hardware tokens.
Change privileged usernames, review the OS logs, and deploy hardware tokens.
Implement MFA, review the application logs, and deploy a WAF.
Implement MFA, review the application logs, and deploy a WAF.
Deploy a VPN, configure an official open-source library repository, and perform a full application review for vulnerabilities.
Deploy a VPN, configure an official open-source library repository, and perform a full application review for vulnerabilities.
Suggested answer: C
Explanation:

Implementing MFA can add an extra layer of security to protect against unauthorized access if the vulnerability is exploited. Reviewing the application logs can help identify if any attempts have been made to exploit the vulnerability, and deploying a WAF can help block any attempts to exploit the vulnerability. While the other options may provide some level of security, they may not directly address the vulnerability and may not reduce the risk to an acceptable level.

asked 02/10/2024
Emanuel Popescu
41 questions

Question 30

Report Export Collapse

A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

CompTIA CAS-004 image Question 30 93998 10022024175034000000

Which of the following would BEST mitigate this vulnerability?

CAPTCHA
CAPTCHA
Input validation
Input validation
Data encoding
Data encoding
Network intrusion prevention
Network intrusion prevention
Suggested answer: B
asked 02/10/2024
Khalfan KAABI
42 questions
Total 564 questions
Go to page: of 57
Search

Related questions