ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 7

List of questions

Question 61

Report Export Collapse

Over the last 90 days, many storage services has been exposed in the cloud services environments, and the security team does not have the ability to see is creating these instance. Shadow IT is creating data services and instances faster than the small security team can keep up with them. The Chief information security Officer (CIASO) has asked the security officer (CISO) has asked the security lead architect to architect to recommend solutions to this problem.

Which of the following BEST addresses the problem best address the problem with the least amount of administrative effort?

Compile a list of firewall requests and compare than against interesting cloud services.
Compile a list of firewall requests and compare than against interesting cloud services.
Implement a CASB solution and track cloud service use cases for greater visibility.
Implement a CASB solution and track cloud service use cases for greater visibility.
Implement a user-behavior system to associate user events and cloud service creation events.
Implement a user-behavior system to associate user events and cloud service creation events.
Capture all log and feed then to a SIEM and then for cloud service events
Capture all log and feed then to a SIEM and then for cloud service events
Suggested answer: C
asked 02/10/2024
christopher patrick
33 questions

Question 62

Report Export Collapse

An analyst execute a vulnerability scan against an internet-facing DNS server and receives the following report:

Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege

SSL Medium Strength Cipher Suites Supported

Vulnerability in DNS Resolution Could Allow Remote Code Execution

SMB Host SIDs allows Local User Enumeration


Which of the following tools should the analyst use FIRST to validate the most critical vulnerability?

Password cracker
Password cracker
Port scanner
Port scanner
Account enumerator
Account enumerator
Exploitation framework
Exploitation framework
Suggested answer: A
asked 02/10/2024
Michael Amann
42 questions

Question 63

Report Export Collapse

The Chief information Officer (CIO) wants to establish a non-banding agreement with a third party that outlines the objectives of the mutual arrangement dealing with data transfers between both organizations before establishing a format partnership. Which of the follow would MOST likely be used?

MOU
MOU
OLA
OLA
NDA
NDA
SLA
SLA
Suggested answer: A
asked 02/10/2024
ce temp2
50 questions

Question 64

Report Export Collapse

A security analyst is trying to identify the source of a recent data loss incident. The analyst has reviewed all the for the time surrounding the identified all the assets on the network at the time of the data loss. The analyst suspects the key to finding the source was obfuscated in an application. Which of the following tools should the analyst use NEXT?

Software Decomplier
Software Decomplier
Network enurrerator
Network enurrerator
Log reduction and analysis tool
Log reduction and analysis tool
Static code analysis
Static code analysis
Suggested answer: D
asked 02/10/2024
Hasan Elmas
54 questions

Question 65

Report Export Collapse

Which of the following controls primarily detects abuse of privilege but does not prevent it?

Off-boarding
Off-boarding
Separation of duties
Separation of duties
Least privilege
Least privilege
Job rotation
Job rotation
Suggested answer: A
asked 02/10/2024
kinshuk choubisa
35 questions

Question 66

Report Export Collapse

A company provides guest WiFi access to the internet and physically separates the guest network from the company's internal WIFI. Due to a recent incident in which an attacker gained access to the compay's intend WIFI, the company plans to configure WPA2 Enterprise in an EAP- TLS configuration. Which of the following must be installed on authorized hosts for this new configuration to work properly?

Active Directory OPOs
Active Directory OPOs
PKI certificates
PKI certificates
Host-based firewall
Host-based firewall
NAC persistent agent
NAC persistent agent
Suggested answer: B
asked 02/10/2024
William Kerr
44 questions

Question 67

Report Export Collapse

The goal of a Chief information Security Officer (CISO) providing up-to-date metrics to a bank's risk committee is to ensure:

Budgeting for cybersecurity increases year over year.
Budgeting for cybersecurity increases year over year.
The committee knows how much work is being done.
The committee knows how much work is being done.
Business units are responsible for their own mitigation.
Business units are responsible for their own mitigation.
The bank is aware of the status of cybersecurity risks
The bank is aware of the status of cybersecurity risks
Suggested answer: A
asked 02/10/2024
Yogen Trikannad
39 questions

Question 68

Report Export Collapse

A cybersecurity engineer analyst a system for vulnerabilities. The tool created an OVAL. Results document as output. Which of the following would enable the engineer to interpret the results in a human readable form? (Select TWO.)

Text editor
Text editor
OOXML editor
OOXML editor
Event Viewer
Event Viewer
XML style sheet
XML style sheet
SCAP tool
SCAP tool
Debugging utility
Debugging utility
Suggested answer: B, D
asked 02/10/2024
Shaunt Khalatian
44 questions

Question 69

Report Export Collapse

A Chief information Security Officer (CISO) is developing corrective-action plans based on the following from a vulnerability scan of internal hosts:

CompTIA CAS-004 image Question 69 94037 10022024175034000000

Which of the following MOST appropriate corrective action to document for this finding?

The product owner should perform a business impact assessment regarding the ability to implement a WAF.
The product owner should perform a business impact assessment regarding the ability to implement a WAF.
The application developer should use a static code analysis tool to ensure any application code is not vulnerable to buffer overflows.
The application developer should use a static code analysis tool to ensure any application code is not vulnerable to buffer overflows.
The system administrator should evaluate dependencies and perform upgrade as necessary.
The system administrator should evaluate dependencies and perform upgrade as necessary.
The security operations center should develop a custom IDS rule to prevent attacks buffer overflows against this server.
The security operations center should develop a custom IDS rule to prevent attacks buffer overflows against this server.
Suggested answer: A
asked 02/10/2024
Mauro Daniele
40 questions

Question 70

Report Export Collapse

The Chief information Security Officer (CISO) of a small locate bank has a compliance requirement that a third-party penetration test of the core banking application must be conducted annually. Which of the following services would fulfill the compliance requirement with the LOWEST resource usage?

Black-box testing
Black-box testing
Gray-box testing
Gray-box testing
Red-team hunting
Red-team hunting
White-box testing
White-box testing
Blue-learn exercises
Blue-learn exercises
Suggested answer: C
asked 02/10/2024
Mohamed Abdul Haq Mohamed Akram
52 questions
Total 564 questions
Go to page: of 57
Search

Related questions