ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 46

List of questions

Question 451

Report Export Collapse

Which of the following is the reason why security engineers often cannot upgrade the security of embedded facility automation systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 452

Report Export Collapse

A security engineer has learned that terminated employees' accounts are not being disabled. The termination dates are updated automatically in the human resources information system software by the appropriate human resources staff. Which of the following would best reduce risks to the organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 453

Report Export Collapse

An IT director is working on a solution to meet the challenge of remotely managing laptop devices and securely locking them down. The solution must meet the following requirements:

* Cut down on patch management.

* Make use of standard configurations.

* Allow for custom resource configurations.

* Provide access to the enterprise system from multiple types of devices.

Which of the following would meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 454

Report Export Collapse

A penetration tester discovers a condition that causes unexpected behavior in a web application. This results in the dump of the interpreter's debugging information, which includes the interpreter's version, full path of binary files, and the user ID running the process. Which of the following actions would best mitigate this risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 455

Report Export Collapse

A junior security researcher has identified a buffer overflow vulnerability leading to remote code execution in a former employer's software. The security researcher asks for the manager's advice on the vulnerability submission process. Which of the following is the best advice the current manager can provide the security researcher?

Become a Premium Member for full access
  Unlock Premium Member

Question 456

Report Export Collapse

A company has a website with a huge database. The company wants to ensure that a DR site could be brought online quickly in the event of a failover. and end users would miss no more than 30 minutes of data. Which of the following should the company do to meet these objectives?

Become a Premium Member for full access
  Unlock Premium Member

Question 457

Report Export Collapse

A security analyst is reviewing the following output from a vulnerability scan from an organization's internet-facing web services:

CompTIA CAS-004 image Question 457 94425 10022024175035000000

Which of the following indicates a susceptibility whereby an attacker can take advantage of the trust relationship between the client and the server?

Become a Premium Member for full access
  Unlock Premium Member

Question 458

Report Export Collapse

Based on a recent security audit, a company discovered the perimeter strategy is inadequate for its recent growth. To address this issue, the company is looking for a solution that includes the following requirements:

* Collapse of multiple network security technologies into a single footprint

* Support for multiple VPNs with different security contexts

* Support for application layer security (Layer 7 of the OSI Model)

Which of the following technologies would be the most appropriate solution given these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 459

Report Export Collapse

A company uses a CSP to provide a front end for its new payment system offering. The new offering is currently certified as PCI compliant. In order for the integrated solution to be compliant, the customer:

Become a Premium Member for full access
  Unlock Premium Member

Question 460

Report Export Collapse

A company's software developers have indicated that the security team takes too long to perform application security tasks. A security analyst plans to improve the situation by implementing security into the SDLC. The developers have the following requirements:

1. The solution must be able to initiate SQL injection and reflected XSS attacks.

2. The solution must ensure the application is not susceptible to memory leaks.

Which of the following should be implemented to meet these requirements? (Select two).

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions