ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 52

List of questions

Question 511

Report Export Collapse

During a vendor assessment, an analyst reviews a listing of the complementary user entity controls included in the audit report. Which of the following is the most important aspect to consider when reviewing this list with the security team?

Become a Premium Member for full access
  Unlock Premium Member

Question 512

Report Export Collapse

A company recently deployed new servers to create an additional cluster to support a new application. The corporate security policy states that all new servers must be resilient. The new cluster has a high-availability configuration for a smooth failover. The failover was successful following a recent power outage, but both clusters lost critical data, which impacted recovery time. Which of the following needs to be configured to help ensure minimal delays when power outages occur in the future?

Become a Premium Member for full access
  Unlock Premium Member

Question 513

Report Export Collapse

A security manager is creating a standard configuration across all endpoints that handle sensitive data. Which of the following techniques should be included in the standard configuration to ensure the endpoints are hardened?

Become a Premium Member for full access
  Unlock Premium Member

Question 514

Report Export Collapse

A security architect discovers the following page while testing a website for vulnerabilities:

404 - page not found: /gy67162

The page you have requested is no. avai.able on .his server.

Apache Tomcat 7.0.52

Which of the following best describes why this issue should be corrected?

Become a Premium Member for full access
  Unlock Premium Member

Question 515

Report Export Collapse

A company's BIA indicates that any loss of more than one hour of data would be catastrophic to the business. Which of the following must be in place to meet this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 516

Report Export Collapse

A customer requires secure communication of subscribed web services at all times, but the company currently signs its own certificate requests to an internal C

Become a Premium Member for full access
  Unlock Premium Member

Question 517

Report Export Collapse

A company moved its on-premises services to the cloud. Although a recent audit verified that data throughout the cloud service is properly classified and documented, other systems are unable to act or filter based on this information. Which of the following should the company deploy to allow other cloud-based systems to consume this information?

Become a Premium Member for full access
  Unlock Premium Member

Question 518

Report Export Collapse

A security administrator at a global organization wants to update password complexity rules for a system containing personally identifiable information. Which of the following would be the best resource for this information?

Become a Premium Member for full access
  Unlock Premium Member

Question 519

Report Export Collapse

A company wants to prevent a partner company from denying agreement to a transaction. Which of the following is the best solution for the company?

Become a Premium Member for full access
  Unlock Premium Member

Question 520

Report Export Collapse

A company has integrated source code from a subcontractor into its security product. The subcontractor is located in an adversarial country and has informed the company of a requirement to escrow the source code with the subcontractor's government. Which of the following is a potential security risk arising from this situation?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions