CompTIA CAS-004 Practice Test - Questions Answers, Page 51
List of questions
Related questions
A software developer has been tasked with creating a unique threat detection mechanism that is based on machine learning. The information system for which the tool is being developed is on a rapid CI/CD pipeline, and the tool developer is considered a supplier to the process. Which of the following presents the most risk to the development life cycle and lo the ability to deliver the security tool on time?
A security administrator has been provided with three separate certificates and is trying to organize them into a single chain of trust to deploy on a website. Given the following certificate properties:
Which of the following are true about the PKI hierarchy? (Select two).
A company reviews the regulatory requirements associated with a new product, and then company management elects to cancel production. Which of the following risk strategies is the company using in this scenario?
A security administrator is trying to securely provide public access to specific data from a web application. Clients who want to access the application will be required to:
* Only allow the POST and GET options.
* Transmit all data secured with TLS 1.2 or greater.
* Use specific URLs to access each type of data that is requested.
* Authenticate with a bearer token.
Which of the following should the security administrator recommend to meet these requirements?
An organization has deployed a cloud-based application that provides virtual event services globally to clients. During a typical event, thousands of users access various entry pages within a short period of time. The entry pages include sponsor-related content that is relatively static and is pulled from a database. When the first major event occurs, users report poor response time on the entry pages. Which of the following features is the most appropriate for the company to implement?
An organization needs to classify its systems and data in accordance with external requirements. Which of the following roles is best qualified to perform this task?
A security engineer is implementing DLP. Which of the following should the security engineer include in the overall DLP strategy?
An analyst determined that the current process for manually handling phishing attacks within the company is ineffective. The analyst is developing a new process to ensure phishing attempts are handled internally in an appropriate and timely manner. One of the analyst's requirements is that a blocklist be updated automatically when phishing attempts are identified. Which of the following would help satisfy this requirement?
A software development company needs to mitigate third-party risks to its software supply chain. Which of the following techniques should the company use in the development environment to best meet this objective?
A software developer needs to add an authentication method to a web application. The following requirements must be met:
* The web application needs to use well-supported standards.
* The initial login to the web application should rely on an outside, trusted third party.
* The login needs to be maintained for up to six months.
Which of the following would best support these requirements? (Select two).
Question