ExamGecko
Home Home / CompTIA / CAS-004

CompTIA CAS-004 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











Over the last 90 days, many storage services has been exposed in the cloud services environments, and the security team does not have the ability to see is creating these instance. Shadow IT is creating data services and instances faster than the small security team can keep up with them. The Chief information security Officer (CIASO) has asked the security officer (CISO) has asked the security lead architect to architect to recommend solutions to this problem.

Which of the following BEST addresses the problem best address the problem with the least amount of administrative effort?

A.
Compile a list of firewall requests and compare than against interesting cloud services.
A.
Compile a list of firewall requests and compare than against interesting cloud services.
Answers
B.
Implement a CASB solution and track cloud service use cases for greater visibility.
B.
Implement a CASB solution and track cloud service use cases for greater visibility.
Answers
C.
Implement a user-behavior system to associate user events and cloud service creation events.
C.
Implement a user-behavior system to associate user events and cloud service creation events.
Answers
D.
Capture all log and feed then to a SIEM and then for cloud service events
D.
Capture all log and feed then to a SIEM and then for cloud service events
Answers
Suggested answer: C

An analyst execute a vulnerability scan against an internet-facing DNS server and receives the following report:

Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege

SSL Medium Strength Cipher Suites Supported

Vulnerability in DNS Resolution Could Allow Remote Code Execution

SMB Host SIDs allows Local User Enumeration


Which of the following tools should the analyst use FIRST to validate the most critical vulnerability?

A.
Password cracker
A.
Password cracker
Answers
B.
Port scanner
B.
Port scanner
Answers
C.
Account enumerator
C.
Account enumerator
Answers
D.
Exploitation framework
D.
Exploitation framework
Answers
Suggested answer: A

The Chief information Officer (CIO) wants to establish a non-banding agreement with a third party that outlines the objectives of the mutual arrangement dealing with data transfers between both organizations before establishing a format partnership. Which of the follow would MOST likely be used?

A.
MOU
A.
MOU
Answers
B.
OLA
B.
OLA
Answers
C.
NDA
C.
NDA
Answers
D.
SLA
D.
SLA
Answers
Suggested answer: A

A security analyst is trying to identify the source of a recent data loss incident. The analyst has reviewed all the for the time surrounding the identified all the assets on the network at the time of the data loss. The analyst suspects the key to finding the source was obfuscated in an application. Which of the following tools should the analyst use NEXT?

A.
Software Decomplier
A.
Software Decomplier
Answers
B.
Network enurrerator
B.
Network enurrerator
Answers
C.
Log reduction and analysis tool
C.
Log reduction and analysis tool
Answers
D.
Static code analysis
D.
Static code analysis
Answers
Suggested answer: D

Which of the following controls primarily detects abuse of privilege but does not prevent it?

A.
Off-boarding
A.
Off-boarding
Answers
B.
Separation of duties
B.
Separation of duties
Answers
C.
Least privilege
C.
Least privilege
Answers
D.
Job rotation
D.
Job rotation
Answers
Suggested answer: A

A company provides guest WiFi access to the internet and physically separates the guest network from the company's internal WIFI. Due to a recent incident in which an attacker gained access to the compay's intend WIFI, the company plans to configure WPA2 Enterprise in an EAP- TLS configuration. Which of the following must be installed on authorized hosts for this new configuration to work properly?

A.
Active Directory OPOs
A.
Active Directory OPOs
Answers
B.
PKI certificates
B.
PKI certificates
Answers
C.
Host-based firewall
C.
Host-based firewall
Answers
D.
NAC persistent agent
D.
NAC persistent agent
Answers
Suggested answer: B

The goal of a Chief information Security Officer (CISO) providing up-to-date metrics to a bank's risk committee is to ensure:

A.
Budgeting for cybersecurity increases year over year.
A.
Budgeting for cybersecurity increases year over year.
Answers
B.
The committee knows how much work is being done.
B.
The committee knows how much work is being done.
Answers
C.
Business units are responsible for their own mitigation.
C.
Business units are responsible for their own mitigation.
Answers
D.
The bank is aware of the status of cybersecurity risks
D.
The bank is aware of the status of cybersecurity risks
Answers
Suggested answer: A

A cybersecurity engineer analyst a system for vulnerabilities. The tool created an OVAL. Results document as output. Which of the following would enable the engineer to interpret the results in a human readable form? (Select TWO.)

A.
Text editor
A.
Text editor
Answers
B.
OOXML editor
B.
OOXML editor
Answers
C.
Event Viewer
C.
Event Viewer
Answers
D.
XML style sheet
D.
XML style sheet
Answers
E.
SCAP tool
E.
SCAP tool
Answers
F.
Debugging utility
F.
Debugging utility
Answers
Suggested answer: B, D

A Chief information Security Officer (CISO) is developing corrective-action plans based on the following from a vulnerability scan of internal hosts:

Which of the following MOST appropriate corrective action to document for this finding?

A.
The product owner should perform a business impact assessment regarding the ability to implement a WAF.
A.
The product owner should perform a business impact assessment regarding the ability to implement a WAF.
Answers
B.
The application developer should use a static code analysis tool to ensure any application code is not vulnerable to buffer overflows.
B.
The application developer should use a static code analysis tool to ensure any application code is not vulnerable to buffer overflows.
Answers
C.
The system administrator should evaluate dependencies and perform upgrade as necessary.
C.
The system administrator should evaluate dependencies and perform upgrade as necessary.
Answers
D.
The security operations center should develop a custom IDS rule to prevent attacks buffer overflows against this server.
D.
The security operations center should develop a custom IDS rule to prevent attacks buffer overflows against this server.
Answers
Suggested answer: A

The Chief information Security Officer (CISO) of a small locate bank has a compliance requirement that a third-party penetration test of the core banking application must be conducted annually. Which of the following services would fulfill the compliance requirement with the LOWEST resource usage?

A.
Black-box testing
A.
Black-box testing
Answers
B.
Gray-box testing
B.
Gray-box testing
Answers
C.
Red-team hunting
C.
Red-team hunting
Answers
D.
White-box testing
D.
White-box testing
Answers
E.
Blue-learn exercises
E.
Blue-learn exercises
Answers
Suggested answer: C
Total 510 questions
Go to page: of 51