ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 45

List of questions

Question 441

Report Export Collapse

When implementing serverless computing an organization must still account for:

Become a Premium Member for full access
  Unlock Premium Member

Question 442

Report Export Collapse

An employee's device was missing for 96 hours before being reported. The employee called the help desk to ask for another device Which of the following phases of the incident response cycle needs improvement?

Become a Premium Member for full access
  Unlock Premium Member

Question 443

Report Export Collapse

in a situation where the cost of anti-malware exceeds the potential loss from a malware threat, which of the following is the most cost-effective risk response?

Become a Premium Member for full access
  Unlock Premium Member

Question 444

Report Export Collapse

A security engineer needs to implement a cost-effective authentication scheme for a new web-based application that requires:

* Rapid authentication

* Flexible authorization

* Ease of deployment

* Low cost but high functionality

Which of the following approaches best meets these objectives?

Become a Premium Member for full access
  Unlock Premium Member

Question 445

Report Export Collapse

The security analyst discovers a new device on the company's dedicated loT subnet during the most recent vulnerability scan. The scan results show numerous open ports and insecure protocols in addition to default usernames and passwords. A camera needs to transmit video to the security server in the loT subnet. Which of the following should the security analyst recommend to securely operate the camera?

Become a Premium Member for full access
  Unlock Premium Member

Question 446

Report Export Collapse

An IDS was unable to detect malicious network traffic during a recent security incident, even though all traffic was being sent using HTTPS. As a result, a website used by employees was compromised. Which of the following detection mechanisms would allow the IDS to detect an attack like this one in the future?

Become a Premium Member for full access
  Unlock Premium Member

Question 447

Report Export Collapse

An organization performed a risk assessment and discovered that less than 50% of its employees have been completing security awareness training. Which of the following should the Chief Information Security Officer highlight as an area of Increased vulnerability in a report to the management team?

Become a Premium Member for full access
  Unlock Premium Member

Question 448

Report Export Collapse

A technician accidentally deleted the secret key that was corresponding to the public key pinned to a busy online magazine. To remedy the situation, the technician obtained a new certificate with a different key. However, paying subscribers were locked out of the website until the key-pinning policy expired. Which of the following alternatives should the technician adopt to prevent a similar issue in the future?

Become a Premium Member for full access
  Unlock Premium Member

Question 449

Report Export Collapse

Which of the following should an organization implement to prevent unauthorized API key sharing?

Become a Premium Member for full access
  Unlock Premium Member

Question 450

Report Export Collapse

A security team is creating tickets to track the progress of remediation. Which of the following is used to specify the due dates for high- and critical-priority findings?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions