ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 37

List of questions

Question 361

Report Export Collapse

A bank hired a security architect to improve its security measures against the latest threats The solution must meet the following requirements

• Recognize and block fake websites

• Decrypt and scan encrypted traffic on standard and non-standard ports

• Use multiple engines for detection and prevention

• Have central reporting

Which of the following is the BEST solution the security architect can propose?

Become a Premium Member for full access
  Unlock Premium Member

Question 362

Report Export Collapse

A managed security provider (MSP) is engaging with a customer who was working through a complete digital transformation Part of this transformation involves a move to cloud servers to ensure a scalable, high-performance, online user experience The current architecture includes:

• Directory servers

• Web servers

• Database servers

• Load balancers

• Cloud-native VPN concentrator

• Remote access server

The MSP must secure this environment similarly to the infrastructure on premises Which of the following should the MSP put in place to BEST meet this objective? (Select THREE)

Become a Premium Member for full access
  Unlock Premium Member

Question 363

Report Export Collapse

A company recently deployed a SIEM and began importing logs from a firewall, a file server, a domain controller a web server, and a laptop. A security analyst receives a series of SIEM alerts and prepares to respond. The following is the alert information:

CompTIA CAS-004 image Question 363 94331 10022024175035000000

Which of the following should the security analyst do FIRST?

Become a Premium Member for full access
  Unlock Premium Member

Question 364

Report Export Collapse

A web service provider has just taken on a very large contract that comes with requirements that are currently not being implemented in order to meet contractual requirements, the company must achieve the following thresholds

• 99 99% uptime

• Load time in 3 seconds

• Response time = <1 0 seconds

Starting with the computing environment, which of the following should a security engineer recommend to BEST meet the requirements? (Select THREE)

Become a Premium Member for full access
  Unlock Premium Member

Question 365

Report Export Collapse

A security architect is working with a new customer to find a vulnerability assessment solution that meets the following requirements:

* Fast scanning

* The least false positives possible

* Signature-based

* A low impact on servers when performing a scan

In addition, the customer has several screened subnets, VLANs, and branch offices. Which of the following will best meet the customer's needs?

Become a Premium Member for full access
  Unlock Premium Member

Question 366

Report Export Collapse

A company is experiencing a large number of attempted network-based attacks against its online store. To determine the best course of action, a security analyst reviews the following logs.

CompTIA CAS-004 image Question 366 94334 10022024175035000000

Which of the following should the company do next to mitigate the risk of a compromise from these attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 367

Report Export Collapse

A company wants to use a process to embed a sign of ownership covertly inside a proprietary document without adding any identifying attributes. Which of the following would be best to use as part of the process to support copyright protections of the document?

Become a Premium Member for full access
  Unlock Premium Member

Question 368

Report Export Collapse

An ISP is receiving reports from a portion of its customers who state that typosquatting is occurring when they type in a portion of the URL for the ISP's website. The reports state that customers are being directed to an advertisement website that is asking for personal information. The security team has verified the DNS system is returning proper results and has no known lOCs. Which of the following should the security team implement to best mitigate this situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 369

Report Export Collapse

An IT department is currently working to implement an enterprise DLP solution. Due diligence and best practices must be followed in regard to mitigating risk. Which of the following ensures that authorized modifications are well planned and executed?

Become a Premium Member for full access
  Unlock Premium Member

Question 370

Report Export Collapse

The principal security analyst for a global manufacturer is investigating a security incident related to abnormal behavior in the ICS network. A controller was restarted as part of the troubleshooting process, and the following issue was identified when the controller was restarted:

CompTIA CAS-004 image Question 370 94338 10022024175035000000

During the investigation, this modified firmware version was identified on several other controllers at the site. The official vendor firmware versions do not have this checksum. Which of the following stages of the MITRE ATT&CK framework for ICS includes this technique?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions