CompTIA CAS-004 Practice Test - Questions Answers, Page 54
List of questions
Question 531

A technology company developed an in-house chat application that is used only by developers. An open-source library within the application has been deprecated. The facts below are provided:
* The cost of replacing this system is nominal.
* The system provides no revenue to the business.
* The system is not a critical part of the business.
Which of the following is the best risk mitigation strategy?
Question 532

An ASIC manufacturer wishing to best reduce downstream supply chain risk can provide validation instructions for consumers that:
Question 533

An analyst is working to address a potential compromise of a corporate endpoint and discovers the attacker accessed a user's credentials. However, it is unclear if the system baseline was modified to achieve persistence. Which of the following would most likely support forensic activities in this scenario?
Question 534

A company has a website with a huge database. The company wants to ensure that a DR site could be brought online quickly in the event of a failover, and end users would miss no more than 30 minutes of data. Which of the following should the company do to meet these objectives?
Question 535

A security engineer is reviewing metrics for a series of bug bounty reports. The engineer finds systematic cross-site scripting issues and unresolved previous findings. Which of the following is the best solution to address the issue?
Question 536

A development team needs terminal access to preproduction servers to verify settings and enter purchased license keys. To address the team's needs, the security administrator implements the following requirements:
* Only trusted accounts can access the preproduction servers.
* Developers cannot access the preproduction servers directly from their workstations.
* The trusted accounts should only have access to specific preproduction servers.
Which of the following are necessary to fulfill the security requirements? (Select two).
Question 537

An administrator completed remediation for all the findings of a penetration test and notifies the management team that the systems are ready to be placed back into production. Which of the following steps should the management team require the analyst to perform immediately before placing the systems back into production?
Question 538

An organization is rolling out a robust vulnerability management system to monitor SCADA devices on the network. Which of the following scan types should be used to monitor these system types?
Question 539

A software developer must choose encryption algorithms to secure two parts of a mobile application. Given the following part descriptions and requirements:
* The first part of the application is used to transfer large files and must support file parts with transfer start/stop/resume. This part requires strong file encryption.
* The second part of the application uses a bit stream to continuously authenticate both ends of the connection. This part must implement confidentiality for the stream.
Which of the following encryption algorithms should the developer implement in the code to support both parts of the application? (Select two).
Question 540

A security engineer is reviewing Apache web server logs and has identified the following pattern in the log:
GET https://example.com/image5/../../etc/passwd HTTP/1.1 200 OK
The engineer has also reviewed IDS and firewall logs and established a correlation to an external IP address. Which of the following can be determined regarding the vulnerability and response?
Question