ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 57

Add to Whishlist

List of questions

Question 561

Report Export Collapse

A software development company is implementing a SaaS-based password vault for customers to use. The requirements for the password vault include:

Vault encryption using a variable block and key size

Resistance to brute-force attacks

Which of the following should be implemented to meet these requirements? (Select two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 562

Report Export Collapse

A new VM server (Web Server C) was spun up in the cloud and added to the load balancer to an existing web application (Application A) that does not require internet access. Sales users are reporting intermittent issues with this application when processing orders that require access to the warehouse department.

Given the following information:

Firewall rules: Existing rules do not account for Web Server C's IP address (10.2.0.92).

Application A Security Group: Inbound rules and outbound rules are insufficient for the new server.

The security team wants to minimize the firewall rule set by avoiding specific host rules whenever possible. Which of the following actions must be taken to resolve the issue and meet the security team's requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 563

Report Export Collapse

A security administrator is assessing the risk associated with using a software tool built by a small start-up company to provide product pricing updates. Which of the following risks would most likely be a factor?

Become a Premium Member for full access
  Unlock Premium Member

Question 564

Report Export Collapse

A security analyst is evaluating all third-party software an organization uses. The analyst discovers that each department is violating the organization's policy by provisioning access to SaaS products without oversight from the security group and without using a centralized access control methodology. Which of the following should the organization use to enforce its SaaS product access requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 565

Report Export Collapse

SIMULATION

You have received a report that some users are unable to use their personal devices to

authenticate to a protected corporate website. The users have stated that no changes have been made on their personal devices since the last time they were able to authenticate successfully.

INSTRUCTIONS

Examine the device health policy for the MFA solution, the MFA usage logs, and the device

telemetry. Using that information:

. Select the policy/policies that were violated.

. Select the telemetry log(s) that

explain(s) the policy violations.

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

CompTIA CAS-004 image Question 1 63880435017903917283459

Become a Premium Member for full access
  Unlock Premium Member

Question 566

Report Export Collapse

SIMULATION

You are an information security analyst tasked to provide feedback and remediation

guidance to an organization that is working to comply with a prescriptive framework.

The framework includes the following controls related to network design:

. Network hosts must be segmented into security domains.

. A screened subnet must be used for all externally available assets.

. A shared services zone must be present for internal servers and should not contain workstations.

INSTRUCTIONS

Based on the stated requirements, place each resource in the appropriate network location. All resources must be used, and all network zones will be filled.

CompTIA CAS-004 image Question 2 63880435017982039058376

CompTIA CAS-004 image Question 2 63880435017982039058376

Become a Premium Member for full access
  Unlock Premium Member

Question 567

Report Export Collapse

An organization is deploying a container-based application that requires persistence of sensitive information on the filesystem. The filesystem will be deployed into a cloud environment. The information that will persist will include PHI (Protected Health Information). Which of the following solutions would be best to ensure confidentiality of information at rest?

Become a Premium Member for full access
  Unlock Premium Member

Question 568

Report Export Collapse

A company performs an annual attack surface analysis and identifies a large number of unexpected, external-facing systems. The Chief Information Security Officer (CISO) wishes to ensure this issue does not reoccur. Which of the following should the company do?

Become a Premium Member for full access
  Unlock Premium Member

Question 569

Report Export Collapse

A security architect is improving a healthcare organization's security posture. Most of the software is cloud-based, but some old applications are still running on a server on-site. Medical devices using such applications require very low latency. The most important consideration isconfidentiality, followed byavailability, and thenintegrity. Which of the following is thefirst stepthe security architect should implement to protect PII?

Become a Premium Member for full access
  Unlock Premium Member

Question 570

Report Export Collapse

A recentDASTscan indicates an application has multiple issues withpath traversal. Which of the following is thebestaction for the development team to take?

Become a Premium Member for full access
  Unlock Premium Member
Total 578 questions
Go to page: of 58
Search

Related questions