ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 50

Add to Whishlist

List of questions

Question 491

Report Export Collapse

A security analyst received a report that a suspicious flash drive was picked up in the office's waiting area, located beyond the secured door. The analyst investigated the drive and found malware designed to harvest and transmit credentials. Security cameras in the area where the flash drive was discovered showed a vendor representative dropping the drive. Which of the following should the analyst recommend as an additional way to identify anyone who enters the building, in the event the camera system fails?

Become a Premium Member for full access
  Unlock Premium Member

Question 492

Report Export Collapse

An internal security audit determines that Telnet is currently being used within the environment to manage network switches. Which of the following tools should be utilized to identify credentials in plaintext that are used to log in to these devices?

Become a Premium Member for full access
  Unlock Premium Member

Question 493

Report Export Collapse

A security architect is reviewing the following organizational specifications for a new application:

* Be sessionless and API-based

* Accept uploaded documents with Pll, so all storage must be ephemeral

* Be able to scale on-demand across multiple nodes

* Restrict all network access except for the TLS port

Which of the following ways should the architect recommend the application be deployed in order to meet security and organizational infrastructure requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 494

Report Export Collapse

A Chief Information Security Officer (CISO) received a call from the Chief Executive Officer (CEO) about a data breach from the SOC lead around 9:00 a.m. At 10:00 a.m. The CEO informs the CISO that a breach of the firm is being reported on national news. Upon investigation, it is determined that a network administrator has reached out to a vendor prior to the breach for information on a security patch that failed to be installed. Which of the following should the CISO do to prevent this from happening again?

Become a Premium Member for full access
  Unlock Premium Member

Question 495

Report Export Collapse

A company is migrating its data center to the cloud. Some hosts had been previously isolated, but a risk assessment convinced the engineering team to reintegrate the systems. Because the systems were isolated, the risk associated with vulnerabilities was low. Which of the following should the security team recommend be performed before migrating these servers to the cloud?

Become a Premium Member for full access
  Unlock Premium Member

Question 496

Report Export Collapse

A security analyst is participating in a risk assessment and is helping to calculate the exposure factor associated with various systems and processes within the organization. Which of the following resources would be most useful to calculate the exposure factor in this scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 497

Report Export Collapse

Two companies that recently merged would like to unify application access between the companies, without initially merging internal authentication stores. Which of the following technical strategies would best meet this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 498

Report Export Collapse

A Chief Information Security Officer is concerned about the condition of the code security being used for web applications. It is important to get the review right the first time, and the company is willing to use a tool that will allow developers to validate code as it is written. Which of the following methods should the company use?

Become a Premium Member for full access
  Unlock Premium Member

Question 499

Report Export Collapse

A mobile device hardware manufacturer receives the following requirements from a company that wants to produce and sell a new mobile platform:

*The platform should store biometric data.

*The platform should prevent unapproved firmware from being loaded.

* A tamper-resistant, hardware-based counter should track if unapproved firmware was loaded.

Which of the following should the hardware manufacturer implement? (Select three).

Become a Premium Member for full access
  Unlock Premium Member

Question 500

Report Export Collapse

The primary advantage of an organization creating and maintaining a vendor risk registry is to:

Become a Premium Member for full access
  Unlock Premium Member
Total 578 questions
Go to page: of 58
Search

Related questions