ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 31

List of questions

Question 301

Report Export Collapse

A host on a company's network has been infected by a worm that appears to be spreading via SMB. A security analyst has been tasked with containing the incident while also maintaining evidence for a subsequent investigation and malware analysis.

Which of the following steps would be best to perform FIRST?

Become a Premium Member for full access
  Unlock Premium Member

Question 302

Report Export Collapse

SIMULATION

You are a security analyst tasked with interpreting an Nmap scan output from company's privileged network.

The company's hardening guidelines indicate the following:

There should be one primary server or service per device.

Only default ports should be used.

Non-secure protocols should be disabled.

INSTRUCTIONS

Using the Nmap output, identify the devices on the network and their roles, and any open ports that should be closed.

For each device found by Nmap, add a device entry to the Devices Discovered list, with the following information:

The IP address of the device

The primary server or service of the device (Note that each IP should by associated with one service/port only)

The protocol(s) that should be disabled based on the hardening guidelines (Note that multiple ports may need to be closed to comply with the hardening guidelines)

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

CompTIA CAS-004 image Question 302 94270 10022024175035000000

CompTIA CAS-004 image Question 302 94270 10022024175035000000

Become a Premium Member for full access
  Unlock Premium Member

Question 303

Report Export Collapse

A company's product site recently had failed API calls, resulting in customers being unable to check out and purchase products. This type of failure could lead to the loss of customers and damage to the company's reputation in the market.

Which of the following should the company implement to address the risk of system unavailability?

Become a Premium Member for full access
  Unlock Premium Member

Question 304

Report Export Collapse

Which of the following represents the MOST significant benefit of implementing a passwordless authentication solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 305

Report Export Collapse

A review of the past year's attack patterns shows that attackers stopped reconnaissance after finding a susceptible system to compromise. The company would like to find a way to use this information to protect the environment while still gaining valuable attack information.

Which of the following would be BEST for the company to implement?

Become a Premium Member for full access
  Unlock Premium Member

Question 306

Report Export Collapse

A cloud security architect has been tasked with finding a solution for hardening VMS. The solution must meet the following requirements:

* Data needs to be stored outside of the VMS.

* No unauthorized modifications to the VMS are allowed

* If a change needs to be done, a new VM needs to be deployed.

Which of the following is the BEST solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 307

Report Export Collapse

Which of the following is a risk associated with SDN?

Become a Premium Member for full access
  Unlock Premium Member

Question 308

Report Export Collapse

Which of the following objectives BEST supports leveraging tabletop exercises in business continuity planning?

Become a Premium Member for full access
  Unlock Premium Member

Question 309

Report Export Collapse

A security engineer has been informed by the firewall team that a specific Windows workstation is part of a command-and-control network. The only information the security engineer is receiving is that the traffic is occurring on a non-standard port (TCP 40322). Which of the following commands should the security engineer use FIRST to find the malicious process?

Become a Premium Member for full access
  Unlock Premium Member

Question 310

Report Export Collapse

Due to internal resource constraints, the management team has asked the principal security architect to recommend a solution that shifts most of the responsibility for application-level controls to the cloud provider. In the shared responsibility model, which of the following levels of service meets this requirement?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions