ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 30

List of questions

Question 291

Report Export Collapse

A company has decided that only administrators are permitted to use PowerShell on their Windows computers. Which of the following is the BEST way for an administrator to implement this decision?

Become a Premium Member for full access
  Unlock Premium Member

Question 292

Report Export Collapse

The Chief Information Security Officer (CISO) asked a security manager to set up a system that sends an alert whenever a mobile device enters a sensitive area of the company's data center. The CISO would also like to be able to alert the individual who is entering the area that the access was logged and monitored. Which of the following would meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 293

Report Export Collapse

A security analyst for a managed service provider wants to implement the most up-to-date and effective security methodologies to provide clients with the best offerings. Which of the following resources would the analyst MOST likely adopt?

Become a Premium Member for full access
  Unlock Premium Member

Question 294

Report Export Collapse

An engineering team has deployed a new VPN service that requires client certificates to be used in order to successfully connect. On iOS devices, however, the following error occurs after importing the .p12 certificate file:

mbedTLS: ca certificate undefined

Which of the following is the root cause of this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 295

Report Export Collapse

A security consultant is designing an infrastructure security solution for a client company that has provided the following requirements:

* Access to critical web services at the edge must be redundant and highly available.

* Secure access services must be resilient to a proprietary zero-day vulnerability in a single component.

* Automated transition of secure access solutions must be able to be triggered by defined events or manually by security operations staff.

Which of the following solutions BEST meets these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 296

Report Export Collapse

A security solution uses a sandbox environment to execute zero-day software and collect indicators of compromise. Which of the following should the organization do to BEST take advantage of this solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 297

Report Export Collapse

A systems administrator is preparing to run a vulnerability scan on a set of information systems in the organization. The systems administrator wants to ensure that the targeted systems produce accurate information especially regarding configuration settings.

Which of the following scan types will provide the systems administrator with the MOST accurate information?

Become a Premium Member for full access
  Unlock Premium Member

Question 298

Report Export Collapse

A networking team asked a security administrator to enable Flash on its web browser. The networking team explained that an important legacy embedded system gathers SNMP information from various devices. The system can only be managed through a web browser running Flash. The embedded system will be replaced within the year but is still critical at the moment.

Which of the following should the security administrator do to mitigate the risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 299

Report Export Collapse

Given the following log snippet from a web server:

CompTIA CAS-004 image Question 299 94267 10022024175035000000

Which of the following BEST describes this type of attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 300

Report Export Collapse

A pharmaceutical company recently experienced a security breach within its customer-facing web portal. The attackers performed a SQL injection attack and exported tables from the company's managed database, exposing customer information.

The company hosts the application with a CSP utilizing the IaaS model. Which of the following parties is ultimately responsible for the breach?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions