ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 45

Question list
Search
Search

List of questions

Search

Related questions











When implementing serverless computing an organization must still account for:

A.
the underlying computing network infrastructure
A.
the underlying computing network infrastructure
Answers
B.
hardware compatibility
B.
hardware compatibility
Answers
C.
the security of its data
C.
the security of its data
Answers
D.
patching the service
D.
patching the service
Answers
Suggested answer: C

Explanation:

While serverless computing abstracts the infrastructure layer from developers, organizations must still ensure the security of their data in the serverless environment. This includes protecting the data from unauthorized access and ensuring data privacy and integrity. Serverless architectures can be complex, and understanding the security model and shared responsibility is essential for safeguarding applications and services.

An employee's device was missing for 96 hours before being reported. The employee called the help desk to ask for another device Which of the following phases of the incident response cycle needs improvement?

A.
Containment
A.
Containment
Answers
B.
Preparation
B.
Preparation
Answers
C.
Resolution
C.
Resolution
Answers
D.
Investigation
D.
Investigation
Answers
Suggested answer: B

Explanation:

The incident response cycle's preparation phase includes establishing policies and procedures for reporting lost or stolen devices promptly. If an employee's device was missing for 96 hours before being reported, this indicates a lack of awareness or clear procedures on the employee's part, pointing to inadequacies in the preparation phase of the incident response.

in a situation where the cost of anti-malware exceeds the potential loss from a malware threat, which of the following is the most cost-effective risk response?

A.
Risk transfer
A.
Risk transfer
Answers
B.
Risk mitigation
B.
Risk mitigation
Answers
C.
Risk acceptance
C.
Risk acceptance
Answers
D.
Risk avoidance
D.
Risk avoidance
Answers
Suggested answer: C

Explanation:

Risk acceptance is the decision to accept the potential risk and continue operating without engaging in extraordinary measures to mitigate it. If the cost of anti-malware exceeds the potential loss from a malware threat, it would be more cost-effective to accept the risk rather than spend more on mitigations that don't provide proportional value. This is part of a cost-benefit analysis in risk management.

A security engineer needs to implement a cost-effective authentication scheme for a new web-based application that requires:

* Rapid authentication

* Flexible authorization

* Ease of deployment

* Low cost but high functionality

Which of the following approaches best meets these objectives?

A.
Kerberos
A.
Kerberos
Answers
B.
EAP
B.
EAP
Answers
C.
SAML
C.
SAML
Answers
D.
OAuth
D.
OAuth
Answers
E.
TACACS+
E.
TACACS+
Answers
Suggested answer: D

Explanation:

OAuth, which stands for Open Authorization, is a standard for authorization that enables secure token-based access. It allows users to grant a web application access to their information on another web application without giving them the credentials for their account. OAuth is particularly useful for rapid authentication, flexible authorization, ease of deployment, and offers high functionality at a low cost, making it an ideal choice for new web-based applications. This approach is well-suited for situations where web applications need to interact with each other on behalf of the user, without sharing user's password, such as integrating a geolocation application with Facebook. OAuth uses tokens issued by an authorization server, providing restricted access to a user's data, which aligns with the objectives of rapid authentication, flexible authorization, ease of deployment, and cost-effectiveness.

The security analyst discovers a new device on the company's dedicated loT subnet during the most recent vulnerability scan. The scan results show numerous open ports and insecure protocols in addition to default usernames and passwords. A camera needs to transmit video to the security server in the loT subnet. Which of the following should the security analyst recommend to securely operate the camera?

A.
Harden the camera configuration.
A.
Harden the camera configuration.
Answers
B.
Send camera logs to the SIEM.
B.
Send camera logs to the SIEM.
Answers
C.
Encrypt the camera's video stream.
C.
Encrypt the camera's video stream.
Answers
D.
Place the camera on an isolated segment
D.
Place the camera on an isolated segment
Answers
Suggested answer: A

Explanation:

To securely operate the camera, the security analyst should recommend hardening the camera configuration. This involves several steps:

Changing Default Credentials: Default usernames and passwords are a common vulnerability. They should be replaced with strong, unique passwords.

Disabling Unnecessary Services and Ports: The numerous open ports and insecure protocols should be reviewed, and any unnecessary services should be disabled to reduce the attack surface.

Firmware Updates: Ensuring the camera's firmware is up to date will mitigate known vulnerabilities.

Enable Encryption: If possible, enable encryption for both data in transit and at rest to protect the video stream and other communications from interception.

This approach addresses the identified vulnerabilities directly and ensures that the device is more secure. Simply sending logs to the SIEM or isolating the camera might not fully mitigate the risks associated with default settings and open ports.

CompTIA CASP+ CAS-004 Exam Objectives: Section 2.4: Implement security activities across the technology life cycle.

CompTIA CASP+ Study Guide, Chapter 5: Implementing Host Security.

An IDS was unable to detect malicious network traffic during a recent security incident, even though all traffic was being sent using HTTPS. As a result, a website used by employees was compromised. Which of the following detection mechanisms would allow the IDS to detect an attack like this one in the future?

A.
Deobfuscation
A.
Deobfuscation
Answers
B.
Protocol decoding
B.
Protocol decoding
Answers
C.
Inspection proxy
C.
Inspection proxy
Answers
D.
Digital rights management
D.
Digital rights management
Answers
Suggested answer: C

Explanation:

An inspection proxy, also known as an SSL/TLS inspection proxy, can decrypt HTTPS traffic, allowing the IDS to analyze the content for malicious activity. This method ensures that encrypted traffic can be inspected without compromising the security of the data in transit. The inspection proxy will re-encrypt the data before sending it on to its destination, maintaining the confidentiality of the communication while enabling security tools to perform their functions.

CompTIA CASP+ CAS-004 Exam Objectives: Section 3.3: Integrate network and security components and implement security controls.

CompTIA CASP+ Study Guide, Chapter 7: Analyzing Security Incidents.

An organization performed a risk assessment and discovered that less than 50% of its employees have been completing security awareness training. Which of the following should the Chief Information Security Officer highlight as an area of Increased vulnerability in a report to the management team?

A.
Social engineering
A.
Social engineering
Answers
B.
Third-party compromise
B.
Third-party compromise
Answers
C.
APT targeting
C.
APT targeting
Answers
D.
Pivoting
D.
Pivoting
Answers
Suggested answer: A

Explanation:

The Chief Information Security Officer (CISO) should highlight social engineering as an area of increased vulnerability due to the lack of completion of security awareness training by employees. Social engineering attacks exploit human behavior, and employees who are not adequately trained are more likely to fall victim to phishing, pretexting, and other types of social engineering tactics. Increasing awareness and training helps employees recognize and respond appropriately to these threats.

CompTIA CASP+ CAS-004 Exam Objectives: Section 4.3: Understand how to conduct risk management activities.

CompTIA CASP+ Study Guide, Chapter 9: Risk Management and Incident Response.


A technician accidentally deleted the secret key that was corresponding to the public key pinned to a busy online magazine. To remedy the situation, the technician obtained a new certificate with a different key. However, paying subscribers were locked out of the website until the key-pinning policy expired. Which of the following alternatives should the technician adopt to prevent a similar issue in the future?

A.
Registration authority
A.
Registration authority
Answers
B.
Certificate revocation list
B.
Certificate revocation list
Answers
C.
Client authentication
C.
Client authentication
Answers
D.
Certificate authority authorization
D.
Certificate authority authorization
Answers
Suggested answer: D

Explanation:

Certificate Authority Authorization (CAA) is not listed directly in the provided options, but it is a relevant mechanism in the context of managing certificates and preventing issues similar to the one described. However, based on the available choices, the Online Certificate Status Protocol (OCSP) comes closest to providing a viable solution. OCSP allows for real-time validation of a certificate's revocation status, which could mitigate the issue of users being locked out due to key pinning policies. It is a more modern and efficient alternative to Certificate Revocation Lists (CRLs), offering faster and more reliable certificate status checks. By implementing OCSP, the technician could ensure that clients receive timely updates on the revocation status of certificates, potentially avoiding the downtime caused by the key-pinning policy awaiting expiration.

Which of the following should an organization implement to prevent unauthorized API key sharing?

A.
OTP
A.
OTP
Answers
B.
Encryption
B.
Encryption
Answers
C.
API gateway
C.
API gateway
Answers
D.
HSM
D.
HSM
Answers
Suggested answer: C

Explanation:

An API gateway is a management tool that sits between a client and a collection of backend services. It acts as a reverse proxy to accept all application programming interface (API) calls, aggregate the various services required to fulfill them, and return the appropriate result. API gateways can enforce policies such as rate limiting and authentication to prevent unauthorized access, making it an effective solution to prevent unauthorized API key sharing. By managing APIs at the gateway level, organizations can ensure that API keys are used as intended and are not shared or misused, addressing the need for secure management of API keys.

A security team is creating tickets to track the progress of remediation. Which of the following is used to specify the due dates for high- and critical-priority findings?

A.
MSA
A.
MSA
Answers
B.
SLA
B.
SLA
Answers
C.
ISA
C.
ISA
Answers
D.
MOU
D.
MOU
Answers
Suggested answer: B

Explanation:

A Service Level Agreement (SLA) is the document used to specify due dates for the remediation of high- and critical-priority findings. SLAs outline the responsibilities of the service provider, including time frames for addressing issues or vulnerabilities, based on their severity. By setting clear timelines for remediation, SLAs ensure that critical security vulnerabilities are addressed in a timely manner. CASP+ emphasizes the importance of SLAs in maintaining accountability for security operations and ensuring compliance with organizational security policies.

CASP+ CAS-004 Exam Objectives: Domain 1.0 -- Risk Management (SLAs and Security Management)

CompTIA CASP+ Study Guide: SLAs for Security Vulnerability Management

Total 510 questions
Go to page: of 51