ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 53

List of questions

Question 521

Report Export Collapse

A security analyst is designing a touch screen device so users can gain entry into a locked room by touching buttons numbered zero through nine in a specific numerical sequence. The analyst designs the keypad so that the numbers are randomly presented to the user each time the device is used. Which of the following best describes the design trade-offs? (Select two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 522

Report Export Collapse

A regulated company is in the process of refreshing its entire infrastructure. The company has a business-critical process running on an old 2008 Windows server. If this server fails, the company would lose millions of dollars in revenue. Which of the following actions should the company take?

Become a Premium Member for full access
  Unlock Premium Member

Question 523

Report Export Collapse

A security engineer needs to ensure production containers are automatically scanned for vulnerabilities before they are accepted into the production environment. Which of the following should the engineer use to automatically incorporate vulnerability scanning on every commit?

Become a Premium Member for full access
  Unlock Premium Member

Question 524

Report Export Collapse

A SIEM generated an alert after a third-party database administrator, who had recently been granted temporary access to the repository, accessed business-sensitive content in the database. The SIEM had generated similar alerts before this incident. Which of the following best explains the cause of the alert?

Become a Premium Member for full access
  Unlock Premium Member

Question 525

Report Export Collapse

A security analyst is assessing a new application written in Java. The security analyst must determine which vulnerabilities exist during runtime. Which of the following would provide the most exhaustive list of vulnerabilities while meeting the objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 526

Report Export Collapse

A company purchased Burp Suite licenses this year for each application security engineer. The engineers have used Burp Suite to identify several issues with the company's SaaS application. In the upcoming year, the Chief Information Security Officer would like to purchase additional tools to protect the SaaS product. Which of the following is the best option?

Become a Premium Member for full access
  Unlock Premium Member

Question 527

Report Export Collapse

A security analyst reviews network logs and notices a large number of domain name queries originating from an internal server for an unknown domain, similar to the following:

2736287327321782.hgQ43jsi23-y.com

0357320932922C91.hgQ43jsu23Ty.com

4042301801399103.hgQ43jsu23Ly.com

Which of the following should the analyst do next?

Become a Premium Member for full access
  Unlock Premium Member

Question 528

Report Export Collapse

A company that provides services to clients who work with highly sensitive data would like to provide assurance that the data's confidentiality is maintained in a dynamic, low-risk environment. Which of the following would best achieve this goal? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 529

Report Export Collapse

An ASIC manufacturer wishing to best reduce downstream supply chain risk can provide validation instructions for consumers that:

Become a Premium Member for full access
  Unlock Premium Member

Question 530

Report Export Collapse

A security analyst is examining a former employee's laptop for suspected evidence of suspicious activity. The analyst uses dd during the investigation. Which of the following best explains why the analyst is using this tool?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions