ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 41

List of questions

Question 401

Report Export Collapse

An internal security assessor identified large gaps in a company's IT asset inventory system during a monthly asset review. The assessor is aware of an external audit that is underway. In an effort to avoid external findings, the assessor chooses not to report the gaps in the inventory system. Which of the following legal considerations is the assessor directly violating?

Become a Premium Member for full access
  Unlock Premium Member

Question 402

Report Export Collapse

A security architect must mitigate the risks from what is suspected to be an exposed, private cryptographic key. Which of the following is the best step to take?

Become a Premium Member for full access
  Unlock Premium Member

Question 403

Report Export Collapse

Signed applications reduce risks by:

Become a Premium Member for full access
  Unlock Premium Member

Question 404

Report Export Collapse

After a server was compromised an incident responder looks at log files to determine the attack vector that was used The incident responder reviews the web server log files from the time before an unexpected SSH session began:

CompTIA CAS-004 image Question 404 94372 10022024175035000000

Which of the following is the most likely vulnerability that was exploited based on the log files?

Become a Premium Member for full access
  Unlock Premium Member

Question 405

Report Export Collapse

A network security engineer is designing a three-tier web architecture that will allow a third-party vendor to perform the following audit functions within the organization's cloud environment

* Review communication between all infrastructure endpoints

* Identify unauthorized and malicious data patterns

* Perform automated, risk-mitigating configuration changes

Which of the following should the network security engineer include in the design to address these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 406

Report Export Collapse

A PKI engineer is defining certificate templates for an organization's CA and would like to ensure at least two of the possible SAN certificate extension fields populate for documentation purposes. Which of the following are explicit options within this extension? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 407

Report Export Collapse

A hospital has fallen behind with patching known vulnerabilities due to concerns that patches may cause disruptions in the availability of data and impact patient care. The hospital does not have a tracking solution in place to audit whether systems have been updated or to track the length of time between notification of the weakness and patch completion Since tracking is not in place the hospital lacks accountability with regard to who is responsible for these activities and the timeline of patching efforts. Which of the following should the hospital do first to mitigate this risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 408

Report Export Collapse

Which of the following is record-level encryption commonly used to do?

Become a Premium Member for full access
  Unlock Premium Member

Question 409

Report Export Collapse

A security engineer is concerned about the threat of side-channel attacks The company experienced a past attack that degraded parts of a SCADA system, causing a fluctuation to 20,000rpm from its normal operating range As a result, the part deteriorated more quickly than the mean time to failure A further investigation revealed the attacker was able to determine the acceptable rpm range, and the malware would then fluctuate the rpm until the pan failed Which of the following solutions would be best to prevent a side-channel attack in the future?

Become a Premium Member for full access
  Unlock Premium Member

Question 410

Report Export Collapse

During a network defense engagement, a red team is able to edit the following registry key:

CompTIA CAS-004 image Question 410 94378 10022024175035000000

Which of the following tools is the red team using to perform this action?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions