ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

Related questions











A company is on a deadline to roll out an entire CRM platform to all users at one time. However, the company is behind schedule due to reliance on third-party vendors. Which of the following development approaches will allow the company to begin releases but also continue testing and development for future releases?

A.
Implement iterative software releases.
A.
Implement iterative software releases.
Answers
B.
Revise the scope of the project to use a waterfall approach
B.
Revise the scope of the project to use a waterfall approach
Answers
C.
Change the scope of the project to use the spiral development methodology.
C.
Change the scope of the project to use the spiral development methodology.
Answers
D.
Perform continuous integration.
D.
Perform continuous integration.
Answers
Suggested answer: A

A security researcher detonated some malware in a lab environment and identified the following commands running from the EDR tool:

With which of the following MITRE ATT&CK TTPs is the command associated? (Select TWO).

A.
Indirect command execution
A.
Indirect command execution
Answers
B.
OS credential dumping
B.
OS credential dumping
Answers
C.
Inhibit system recovery
C.
Inhibit system recovery
Answers
D.
External remote services
D.
External remote services
Answers
E.
System information discovery
E.
System information discovery
Answers
F.
Network denial of service
F.
Network denial of service
Answers
Suggested answer: B, E

Explanation:

OS credential dumping is the process of obtaining account login and password information, normally in the form of a hash or a clear text password, from the operating system and software. System information discovery is the process of gathering information about the system, such as hostname, IP address, OS version, running processes, etc. Both of these techniques are commonly used by adversaries to gain access to sensitive data and resources on the target system. The command shown in the image is using Mimikatz, a tool that can dump credentials from memory, and also querying the system information using WMIC. Verified

Reference:

https://attack.mitre.org/techniques/T1003/

https://attack.mitre.org/techniques/T1082/

https://github.com/gentilkiwi/mimikatz

https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmic

An architectural firm is working with its security team to ensure that any draft images that are leaked to the public can be traced back to a specific external party. Which of the following would BEST accomplish this goal?

A.
Properly configure a secure file transfer system to ensure file integrity.
A.
Properly configure a secure file transfer system to ensure file integrity.
Answers
B.
Have the external parties sign non-disclosure agreements before sending any images.
B.
Have the external parties sign non-disclosure agreements before sending any images.
Answers
C.
Only share images with external parties that have worked with the firm previously.
C.
Only share images with external parties that have worked with the firm previously.
Answers
D.
Utilize watermarks in the images that are specific to each external party.
D.
Utilize watermarks in the images that are specific to each external party.
Answers
Suggested answer: D

Explanation:

Watermarking is a technique of adding an identifying image or pattern to an original image to protect its ownership and authenticity. Watermarks can be customized to include specific information about the external party, such as their name, logo, or date of receipt. This way, if any draft images are leaked to the public, the firm can trace back the source of the leak and take appropriate actions. Verified

Reference:

https://en.wikipedia.org/wiki/Watermark

https://www.canva.com/features/watermark-photos/

https://www.mdpi.com/2078-2489/11/2/110

A local university that has a global footprint is undertaking a complete overhaul of its website and associated systems. Some of the requirements are:

* Handle an increase in customer demand of resources

* Provide quick and easy access to information

* Provide high-quality streaming media

* Create a user-friendly interface

Which of the following actions should be taken FIRST?

A.
Deploy high-availability web servers.
A.
Deploy high-availability web servers.
Answers
B.
Enhance network access controls.
B.
Enhance network access controls.
Answers
C.
Implement a content delivery network.
C.
Implement a content delivery network.
Answers
D.
Migrate to a virtualized environment.
D.
Migrate to a virtualized environment.
Answers
Suggested answer: C

Explanation:

A content delivery network (CDN) is a geographically distributed network of servers that can cache content close to end users, allowing for faster and more efficient delivery of web content, such as images, videos, and streaming media. A CDN can also handle an increase in customer demand of resources, provide high-quality streaming media, and create a user-friendly interface by reducing latency and bandwidth consumption. A CDN can also improve the security and availability of the website by mitigating DDoS attacks and providing redundancy. Verified

Reference:

https://www.cloudflare.com/learning/cdn/what-is-a-cdn/

https://learn.microsoft.com/en-us/azure/cdn/cdn-overview

https://en.wikipedia.org/wiki/Content_delivery_network

A company is deploying multiple VPNs to support supplier connections into its extranet applications. The network security standard requires:

* All remote devices to have up-to-date antivirus

* An up-to-date and patched OS

Which of the following technologies should the company deploy to meet its security objectives? (Select TWO)_

A.
NAC
A.
NAC
Answers
B.
WAF
B.
WAF
Answers
C.
NIDS
C.
NIDS
Answers
D.
Reverse proxy
D.
Reverse proxy
Answers
E.
NGFW
E.
NGFW
Answers
F.
Bastion host
F.
Bastion host
Answers
Suggested answer: A, C

Which of the following processes involves searching and collecting evidence during an investigation or lawsuit?

A.
E-discovery
A.
E-discovery
Answers
B.
Review analysis
B.
Review analysis
Answers
C.
Information governance
C.
Information governance
Answers
D.
Chain of custody
D.
Chain of custody
Answers
Suggested answer: A

Explanation:

The process that involves searching and collecting evidence during an investigation or lawsuit is e-discovery. E-discovery stands for electronic discovery, which is the process of identifying, preserving, collecting, processing, reviewing, analyzing, and producing electronically stored information (ESI) that is relevant to a legal matter. E-discovery can be used for civil litigation, criminal prosecution, regulatory compliance, internal investigations, and other purposes. E-discovery can help parties obtain evidence from various sources, such as emails, documents, databases, social media, cloud services, mobile devices, and others. Verified

Reference:

https://www.techtarget.com/searchsecurity/definition/electronic-discovery

https://www.edrm.net/frameworks-and-standards/edrm-model/

https://www.law.cornell.edu/wex/electronic_discovery_(federal)

A security analyst has been tasked with providing key information in the risk register. Which of the following outputs or results would be used to BEST provide the information needed to determine the security posture for a risk decision? (Select TWO).

A.
Password cracker
A.
Password cracker
Answers
B.
SCAP scanner
B.
SCAP scanner
Answers
C.
Network traffic analyzer
C.
Network traffic analyzer
Answers
D.
Vulnerability scanner
D.
Vulnerability scanner
Answers
E.
Port scanner
E.
Port scanner
Answers
F.
Protocol analyzer
F.
Protocol analyzer
Answers
Suggested answer: B, D

Explanation:

The tools that can be used to provide key information in the risk register are SCAP scanner and vulnerability scanner. SCAP stands for Security Content Automation Protocol, which is a set of standards and specifications for automating the management of security configuration, vulnerability assessment, and compliance evaluation. SCAP scanner is a tool that can scan systems and networks for security issues based on SCAP content. Vulnerability scanner is a tool that can scan systems and networks for known vulnerabilities and weaknesses. These tools can help the security analyst identify and prioritize the risks associated with the systems and networks, as well as provide possible remediation actions. Verified

Reference:

https://www.techtarget.com/searchsecurity/definition/Security-Content-Automation-Protocol

https://learn.microsoft.com/en-us/azure/security/fundamentals/vulnerability-management

https://www.techtarget.com/searchsecurity/definition/vulnerability-scanner

Which of the following should be established when configuring a mobile device to protect user internet privacy, to ensure the connection is encrypted, and to keep user activity hidden? (Select TWO).

A.
proxy
A.
proxy
Answers
B.
Tunneling
B.
Tunneling
Answers
C.
VDI
C.
VDI
Answers
D.
MDM
D.
MDM
Answers
E.
RDP
E.
RDP
Answers
F.
MAC address randomization
F.
MAC address randomization
Answers
Suggested answer: A, F

Explanation:

The methods that can be used to protect user internet privacy, to ensure the connection is encrypted, and to keep user activity hidden are proxy and MAC address randomization. A proxy is a server that acts as an intermediary between a user and the internet, hiding the user's IP address and location from websites and other online services. A proxy can also encrypt the connection between the user and the proxy server, preventing anyone from snooping on the user's traffic. MAC address randomization is a feature that changes the MAC address of a mobile device periodically or when connecting to different networks. A MAC address is a unique identifier of a network interface that can be used to track the device's location and activity. MAC address randomization can help protect the user's privacy by making it harder for third parties to link the device to a specific user or network. Verified

Reference:

https://www.techtarget.com/searchsecurity/definition/proxy-server

https://www.techtarget.com/searchnetworking/definition/MAC-address-randomization

https://www.techtarget.com/searchsecurity/definition/MAC-address-Media-Access-Control-address

A third-party organization has implemented a system that allows it to analyze customers' data and deliver analysis results without being able to see the raw data. Which of the following is the organization implementing?

A.
Asynchronous keys
A.
Asynchronous keys
Answers
B.
Homomorphic encryption
B.
Homomorphic encryption
Answers
C.
Data lake
C.
Data lake
Answers
D.
Machine learning
D.
Machine learning
Answers
Suggested answer: B

Explanation:

The organization is implementing homomorphic encryption. Homomorphic encryption is a type of encryption that allows computations to be performed on encrypted data without decrypting it first. This means that the organization can analyze the customers' data and deliver analysis results without being able to see the raw data, preserving the privacy and confidentiality of the customers. Homomorphic encryption can enable various applications, such as cloud computing, machine learning, and data analytics, that require processing sensitive data without compromising security. Verified

Reference:

https://www.techtarget.com/searchsecurity/definition/homomorphic-encryption

https://learn.microsoft.com/en-us/azure/security/fundamentals/encryption-at-rest

https://www.ibm.com/topics/homomorphic-encryption

An organization is in frequent litigation and has a large number of legal holds. Which of the following types of functionality should the organization's new email system provide?

A.
DLP
A.
DLP
Answers
B.
Encryption
B.
Encryption
Answers
C.
E-discovery
C.
E-discovery
Answers
D.
Privacy-level agreements
D.
Privacy-level agreements
Answers
Suggested answer: C

Explanation:

The organization's new email system should provide e-discovery functionality. E-discovery stands for electronic discovery, which is the process of identifying, preserving, collecting, processing, reviewing, analyzing, and producing electronically stored information (ESI) that is relevant to a legal matter. E-discovery can help the organization comply with legal holds, which are orders or notices to preserve relevant ESI when litigation is anticipated or ongoing. E-discovery can also help the organization reduce the costs and risks of litigation, as well as improve the efficiency and accuracy of the discovery process. Verified

Reference:

https://www.techtarget.com/searchsecurity/definition/electronic-discovery

https://www.techtarget.com/searchsecurity/definition/legal-hold

https://www.ibm.com/topics/electronic-discovery

Total 510 questions
Go to page: of 51