ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 40

List of questions

Question 391

Report Export Collapse

A security engineer is trying to identify instances of a vulnerability in an internally developed line of business software. The software is hosted at the company's internal data center. Although a standard vulnerability definition does not exist, the identification and remediation results should be tracked in the company's vulnerability management system. Which of the following should the engineer use to identify this vulnerability?

Become a Premium Member for full access
  Unlock Premium Member

Question 392

Report Export Collapse

During a review of events, a security analyst notes that several log entries from the FIM system identify changes to firewall rule sets. While coordinating a response to the FIM entries, the analyst receives alerts from the DLP system that indicate an employee is sending sensitive data to an external email address. Which of the following would be the most relevant to review in order to gain a better understanding of whether these events are associated with an attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 393

Report Export Collapse

A company underwent an audit in which the following issues were enumerated:

* Insufficient security controls for internet-facing services, such as VPN and extranet

* Weak password policies governing external access for third-party vendors

Which of the following strategies would help mitigate the risks of unauthorized access?

Become a Premium Member for full access
  Unlock Premium Member

Question 394

Report Export Collapse

A user forwarded a suspicious email to a security analyst for review. The analyst examined the email and found that neither the URL nor the attachment showed any indication of malicious activities. Which of the following intelligence collection methods should the analyst use to confirm the legitimacy of the email?

Become a Premium Member for full access
  Unlock Premium Member

Question 395

Report Export Collapse

A user in the finance department uses a laptop to store a spreadsheet that contains confidential financial information for the company. Which of the following would be the best way to protect the file while the user brings the laptop between locations? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 396

Report Export Collapse

Application owners are reporting performance issues with traffic using port 1433 from the cloud environment. A security administrator has various pcap files to analyze the data between the related source and destination servers. Which of the following tools should be used to help troubleshoot the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 397

Report Export Collapse

A software development company wants to ensure that users can confirm the software is legitimate when installing it. Which of the following is the best way for the company to achieve this security objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 398

Report Export Collapse

After installing an unapproved application on a personal device, a Chief Executive Officer reported an incident to a security analyst. This device is not controlled by the MDM solution, as stated in the BYOD policy. However, the device contained critical confidential information. The cyber incident response team performed the analysis on the device and found the following log:

CompTIA CAS-004 image Question 398 94366 10022024175035000000

Which of the following is the most likely reason for the successful attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 399

Report Export Collapse

A security administrator wants to enable a feature that would prevent a compromised encryption key from being used to decrypt all the VPN traffic. Which of the following should the security administrator use?

Become a Premium Member for full access
  Unlock Premium Member

Question 400

Report Export Collapse

In order to save money, a company has moved its data to the cloud with a low-cost provider. The company did not perform a security review prior to the move; however, the company requires all of its data to be stored within the country where the headquarters is located. A new employee on the security team has been asked to evaluate the current provider against the most important requirements. The current cloud provider that the company is using offers:

* Only multitenant cloud hosting

* Minimal physical security

* Few access controls

* No access to the data center

The following information has been uncovered:

* The company is located in a known floodplain, which flooded last year.

* Government regulations require data to be stored within the country.

Which of the following should be addressed first?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions