ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 48

Add to Whishlist

List of questions

Question 471

Report Export Collapse

An application engineer is using the Swagger framework to leverage REST APIs to authenticate endpoints. The engineer is receiving HTTP 403 responses. Which of the following should the engineer do to correct this issue? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 472

Report Export Collapse

A company has identified a number of vulnerable, end-of-support systems with limited defensive capabilities. Which of the following would be the first step in reducing the attack surface in this environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 473

Report Export Collapse

A security analyst identified a vulnerable and deprecated runtime engine that is supporting a public-facing banking application. The developers anticipate the transition to modern development environments will take at least a month. Which of the following controls would best mitigate the risk without interrupting the service during the transition?

Become a Premium Member for full access
  Unlock Premium Member

Question 474

Report Export Collapse

The management team at a company with a large, aging server environment is conducting a server risk assessment in order to create a replacement strategy. The replacement strategy will be based upon the likelihood a server will fail, regardless of the criticality of the application running on a particular server. Which of the following should be used to prioritize the server replacements?

Become a Premium Member for full access
  Unlock Premium Member

Question 475

Report Export Collapse

A recent security assessment generated a recommendation to transition Wi-Fi to WPA2/WPA3 Enterprise requiring EAP-TLS. Which of the following conditions must be met for the organization's mobile devices to be able to successfully join the corporate wireless network?

Become a Premium Member for full access
  Unlock Premium Member

Question 476

Report Export Collapse

An accounting team member received a voicemail message from someone who sounded like the Chief Financial Officer (CFO). In the voicemail message, the caller requested a wire transfer to a bank account the organization had not used before. Which of the following best describes this type of attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 477

Report Export Collapse

A compliance officer is responsible for selecting the right governance framework to protect individuals' data. Which of the following is the appropriate framework for the company to consult when collecting international user data for the purpose of processing credit cards?

Become a Premium Member for full access
  Unlock Premium Member

Question 478

Report Export Collapse

A company would like to move its payment card data to a cloud provider. Which of the following solutions will best protect account numbers from unauthorized disclosure?

Become a Premium Member for full access
  Unlock Premium Member

Question 479

Report Export Collapse

Which of the following describes how a risk assessment is performed when an organization has a critical vendor that provides multiple products?

Become a Premium Member for full access
  Unlock Premium Member

Question 480

Report Export Collapse

A pharmaceutical company uses a cloud provider to host thousands of independent resources in object storage. The company needs a practical and effective means of discovering data, monitoring changes, and identifying suspicious activity. Which of the following would best meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member
Total 578 questions
Go to page: of 58
Search

Related questions