ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 55

List of questions

Question 541

Report Export Collapse

A web application server is running a legacy operating system with an unpatched RCE (Remote Code Execution) vulnerability. The server cannot be upgraded until the corresponding application code is updated. Which of the following compensating controls would prevent successful exploitation?

Become a Premium Member for full access
  Unlock Premium Member

Question 542

Report Export Collapse

A security engineer is performing a threat modeling procedure against a machine learning system that correlates analytic information for decision support. Which of the following threat statements most likely applies to this type of system?

Become a Premium Member for full access
  Unlock Premium Member

Question 543

Report Export Collapse

A security analyst is reviewing the following output from a vulnerability scan of an organization's internet-facing web services:

* Line 06: Hostname sent via SNI does not match certificate.

* Line 10: Certificate not validated by OCSP.

* Line 13: Weak SHA-1 signature algorithm detected.

* Line 17: TLS 1.2 cipher suite negotiated.

* Line 18: SSL session not using forward secrecy.

Which of the following indicates a susceptibility whereby an attacker can take advantage of the trust relationship between the client and the server?

Become a Premium Member for full access
  Unlock Premium Member

Question 544

Report Export Collapse

In support of disaster recovery objectives, a third party agreed to provide 99.999% uptime. Recently, a hardware failure impacted a firewall without service degradation. Which of the following resiliency concepts was most likely in place?

Become a Premium Member for full access
  Unlock Premium Member

Question 545

Report Export Collapse

A security analyst and a DevOps engineer are working together to address configuration drifts in highly scalable systems that are leading to increased vulnerability findings. Which of the following recommendations would be best to eliminate this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 546

Report Export Collapse

A user logged in to a web application. Later, a SOC analyst noticed the user logged in to systems after normal business hours. The end user confirms the log-ins after hours were unauthorized. Following an investigation, the SOC analyst determined that the web server was running an outdated version of OpenSSL. No other suspicious user log-ins were found. Which of the following describes what happened and how to fix it?

Become a Premium Member for full access
  Unlock Premium Member

Question 547

Report Export Collapse

A recent audit discovered that multiple employees had been using their badges to walk through the secured data center to get to the employee break room. Most of the employees were given access during a previous project, but the access was not removed in a timely manner when the project was complete. Which of the following would reduce the likelihood of this scenario occurring again?

Become a Premium Member for full access
  Unlock Premium Member

Question 548

Report Export Collapse

Which of the following is the best reason for obtaining file hashes from a confiscated laptop?

Become a Premium Member for full access
  Unlock Premium Member

Question 549

Report Export Collapse

A security engineer receives reports through the organization's bug bounty program about remote code execution in a specific component in a custom application. Management wants to properly secure the component and proactively avoid similar issues. Which of the following is the best approach to uncover additional vulnerable paths in the application?

Become a Premium Member for full access
  Unlock Premium Member

Question 550

Report Export Collapse

An organization wants to implement an access control system based on its data classification policy that includes the following data types:

Confidential

Restricted

Internal

Public

The access control system should support SSO federation to map users into groups. Each group should only access systems that process and store data at the classification assigned to the group. Which of the following should the organization implement to enforce its requirements with minimal impact to systems and resources?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions