ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











A security analyst is reviewing the following output:

Which of the following would BEST mitigate this type of attack?

A.
Installing a network firewall
A.
Installing a network firewall
Answers
B.
Placing a WAF inline
B.
Placing a WAF inline
Answers
C.
Implementing an IDS
C.
Implementing an IDS
Answers
D.
Deploying a honeypot
D.
Deploying a honeypot
Answers
Suggested answer: B

Explanation:

The output shows a SQL injection attack that is trying to exploit a web application. A WAF (Web Application Firewall) is a security solution that can detect and block malicious web requests, such as SQL injection, XSS, CSRF, etc. Placing a WAF inline would prevent the attack from reaching the web server and database.

Reference: https://owasp.org/www-community/attacks/SQL_Injection https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/

Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?

A.
Key sharing
A.
Key sharing
Answers
B.
Key distribution
B.
Key distribution
Answers
C.
Key recovery
C.
Key recovery
Answers
D.
Key escrow
D.
Key escrow
Answers
Suggested answer: D

Explanation:

Key escrow is a process that involves storing encryption keys with a trusted third party, such as a CASB (Cloud Access Security Broker) or a government agency. Key escrow can enable authorized access to encrypted data in case of emergencies, legal issues, or data recovery. However, key escrow also introduces some risks and challenges, such as trust, security, and privacy.

Reference: https://www.techopedia.com/definition/1772/key-escrow https://searchsecurity.techtarget.com/definition/key-escrow

An organization is implementing a new identity and access management architecture with the following objectives:

Supporting MFA against on-premises infrastructure

Improving the user experience by integrating with SaaS applications

Applying risk-based policies based on location

Performing just-in-time provisioning

Which of the following authentication protocols should the organization implement to support these requirements?

A.
Kerberos and TACACS
A.
Kerberos and TACACS
Answers
B.
SAML and RADIUS
B.
SAML and RADIUS
Answers
C.
OAuth and OpenID
C.
OAuth and OpenID
Answers
D.
OTP and 802.1X
D.
OTP and 802.1X
Answers
Suggested answer: C

Explanation:

OAuth and OpenID are two authentication protocols that can support the objectives of the organization. OAuth is a protocol that allows users to grant access to their resources on one site (or service) to another site (or service) without sharing their credentials. OpenID is a protocol that allows users to use an existing account to sign in to multiple websites without creating new passwords. Both protocols can support MFA, SaaS integration, risk-based policies, and just-in-time provisioning.

Reference: https://auth0.com/docs/protocols/oauth2 https://openid.net/connect/

Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext?

A.
Lattice-based cryptography
A.
Lattice-based cryptography
Answers
B.
Quantum computing
B.
Quantum computing
Answers
C.
Asymmetric cryptography
C.
Asymmetric cryptography
Answers
D.
Homomorphic encryption
D.
Homomorphic encryption
Answers
Suggested answer: D

Explanation:

Homomorphic encryption is a type of encryption that allows computation and analysis of data within a ciphertext without knowledge of the plaintext. This means that encrypted data can be processed without being decrypted first, which enhances the security and privacy of the data. Homomorphic encryption can enable applications such as secure cloud computing, machine learning, and data analytics.

Reference: https://www.ibm.com/security/homomorphic-encryption https://www.synopsys.com/blogs/software-security/homomorphic-encryption/

A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company's services to ensure false positives do not drop legitimate traffic.

Which of the following would satisfy the requirement?

A.
NIDS
A.
NIDS
Answers
B.
NIPS
B.
NIPS
Answers
C.
WAF
C.
WAF
Answers
D.
Reverse proxy
D.
Reverse proxy
Answers
Suggested answer: A

Explanation:

https://owasp.org/www-community/controls/Intrusion_Detection

A NIDS (Network Intrusion Detection System) is a security solution that monitors network traffic for signs of malicious activity, such as attacks, intrusions, or policy violations. A NIDS does not affect the availability of the company's services because it operates in passive mode, which means it does not block or modify traffic. Instead, it alerts the network administrator or other security tools when it detects an anomaly or threat.

Reference: https://www.cisco.com/c/en/us/products/security/what-is-network-intrusion-detection-system.html https://www.imperva.com/learn/application-security/network-intrusion-detection-system-nids/

A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services.

Which of the following should be modified to prevent the issue from reoccurring?

A.
Recovery point objective
A.
Recovery point objective
Answers
B.
Recovery time objective
B.
Recovery time objective
Answers
C.
Mission-essential functions
C.
Mission-essential functions
Answers
D.
Recovery service level
D.
Recovery service level
Answers
Suggested answer: D

Explanation:

The recovery service level is a metric that defines the minimum level of service or performance that a system or process must provide after a disaster or disruption. The recovery service level can include parameters such as availability, capacity, throughput, latency, etc. The recovery service level should be modified to prevent the issue of running out of computational resources at 70% of restoration of critical services. The recovery service level should be aligned with the recovery point objective (RPO) and the recovery time objective (RTO), which are the maximum acceptable amount of data loss and downtime respectively.

Reference: https://www.techopedia.com/definition/29836/recovery-service-level https://www.ibm.com/cloud/learn/recovery-point-objective https://www.ibm.com/cloud/learn/recovery-time-objective

A shipping company that is trying to eliminate entire classes of threats is developing an SELinux policy to ensure its custom Android devices are used exclusively for package tracking.

After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to run?

A.
Protecting
A.
Protecting
Answers
B.
Permissive
B.
Permissive
Answers
C.
Enforcing
C.
Enforcing
Answers
D.
Mandatory
D.
Mandatory
Answers
Suggested answer: C

Explanation:

SELinux (Security-Enhanced Linux) is a security module for Linux systems that provides mandatory access control (MAC) policies for processes and files. SELinux can operate in three modes:

Enforcing: SELinux enforces the MAC policies and denies access based on rules.

Permissive: SELinux does not enforce the MAC policies but only logs actions that would have been denied if running in enforcing mode.

Disabled: SELinux is turned off.

To ensure its custom Android devices are used exclusively for package tracking, the company must configure SELinux to run in enforcing mode. This mode will prevent any unauthorized actions or applications from running on the devices and protect them from potential threats or misuse.

Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/selinux_users_and_administrators_guide/chap-security-enhanced_linux-introduction#sect-Security-Enhanced_Linux-Modes https://source.android.com/security/selinux

A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log.

Which of the following actions would BEST address the potential risks by the activity in the logs?

A.
Alerting the misconfigured service account password
A.
Alerting the misconfigured service account password
Answers
B.
Modifying the AllowUsers configuration directive
B.
Modifying the AllowUsers configuration directive
Answers
C.
Restricting external port 22 access
C.
Restricting external port 22 access
Answers
D.
Implementing host-key preferences
D.
Implementing host-key preferences
Answers
Suggested answer: B

Explanation:

The AllowUsers configuration directive is an option for SSH servers that specifies which users are allowed to log in using SSH. The directive can include usernames, hostnames, IP addresses, or patterns. The directive can also be negated with a preceding exclamation mark (!) to deny access to specific users.

The logs show that there are multiple failed login attempts from different IP addresses using different usernames, such as root, admin, test, etc. This indicates a brute-force attack that is trying to guess the SSH credentials. To address this risk, the security analyst should modify the AllowUsers configuration directive to only allow specific users or hosts that are authorized to access the SSH jump server. This will prevent unauthorized users from attempting to log in using SSH and reduce the attack surface.

Reference: https://man.openbsd.org/sshd_config#AllowUsers https://www.ssh.com/academy/ssh/brute-force

A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open-source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away.

Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?

A.
Scan the code with a static code analyzer, change privileged user passwords, and provide security training.
A.
Scan the code with a static code analyzer, change privileged user passwords, and provide security training.
Answers
B.
Change privileged usernames, review the OS logs, and deploy hardware tokens.
B.
Change privileged usernames, review the OS logs, and deploy hardware tokens.
Answers
C.
Implement MFA, review the application logs, and deploy a WAF.
C.
Implement MFA, review the application logs, and deploy a WAF.
Answers
D.
Deploy a VPN, configure an official open-source library repository, and perform a full application review for vulnerabilities.
D.
Deploy a VPN, configure an official open-source library repository, and perform a full application review for vulnerabilities.
Answers
Suggested answer: C

Explanation:

Implementing MFA can add an extra layer of security to protect against unauthorized access if the vulnerability is exploited. Reviewing the application logs can help identify if any attempts have been made to exploit the vulnerability, and deploying a WAF can help block any attempts to exploit the vulnerability. While the other options may provide some level of security, they may not directly address the vulnerability and may not reduce the risk to an acceptable level.

A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

Which of the following would BEST mitigate this vulnerability?

A.
CAPTCHA
A.
CAPTCHA
Answers
B.
Input validation
B.
Input validation
Answers
C.
Data encoding
C.
Data encoding
Answers
D.
Network intrusion prevention
D.
Network intrusion prevention
Answers
Suggested answer: B
Total 510 questions
Go to page: of 51