ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 51

Add to Whishlist

List of questions

Question 501

Report Export Collapse

A software developer has been tasked with creating a unique threat detection mechanism that is based on machine learning. The information system for which the tool is being developed is on a rapid CI/CD pipeline, and the tool developer is considered a supplier to the process. Which of the following presents the most risk to the development life cycle and lo the ability to deliver the security tool on time?

Become a Premium Member for full access
  Unlock Premium Member

Question 502

Report Export Collapse

A security administrator has been provided with three separate certificates and is trying to organize them into a single chain of trust to deploy on a website. Given the following certificate properties:

CompTIA CAS-004 image Question 502 94470 10022024175035000000

Which of the following are true about the PKI hierarchy? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 503

Report Export Collapse

A company reviews the regulatory requirements associated with a new product, and then company management elects to cancel production. Which of the following risk strategies is the company using in this scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 504

Report Export Collapse

A security administrator is trying to securely provide public access to specific data from a web application. Clients who want to access the application will be required to:

* Only allow the POST and GET options.

* Transmit all data secured with TLS 1.2 or greater.

* Use specific URLs to access each type of data that is requested.

* Authenticate with a bearer token.

Which of the following should the security administrator recommend to meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 505

Report Export Collapse

An organization has deployed a cloud-based application that provides virtual event services globally to clients. During a typical event, thousands of users access various entry pages within a short period of time. The entry pages include sponsor-related content that is relatively static and is pulled from a database. When the first major event occurs, users report poor response time on the entry pages. Which of the following features is the most appropriate for the company to implement?

Become a Premium Member for full access
  Unlock Premium Member

Question 506

Report Export Collapse

An organization needs to classify its systems and data in accordance with external requirements. Which of the following roles is best qualified to perform this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 507

Report Export Collapse

A security engineer is implementing DLP. Which of the following should the security engineer include in the overall DLP strategy?

Become a Premium Member for full access
  Unlock Premium Member

Question 508

Report Export Collapse

An analyst determined that the current process for manually handling phishing attacks within the company is ineffective. The analyst is developing a new process to ensure phishing attempts are handled internally in an appropriate and timely manner. One of the analyst's requirements is that a blocklist be updated automatically when phishing attempts are identified. Which of the following would help satisfy this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 509

Report Export Collapse

A software development company needs to mitigate third-party risks to its software supply chain. Which of the following techniques should the company use in the development environment to best meet this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 510

Report Export Collapse

A software developer needs to add an authentication method to a web application. The following requirements must be met:

* The web application needs to use well-supported standards.

* The initial login to the web application should rely on an outside, trusted third party.

* The login needs to be maintained for up to six months.

Which of the following would best support these requirements? (Select two).

Become a Premium Member for full access
  Unlock Premium Member
Total 578 questions
Go to page: of 58
Search

Related questions