ExamGecko
Home / CompTIA / CAS-004 / List of questions
Ask Question

CompTIA CAS-004 Practice Test - Questions Answers, Page 49

List of questions

Question 481

Report
Export
Collapse

After investigating a recent security incident, a SOC analyst is charged with creating a reference guide for the entire team to use. Which of the following should the analyst create to address future incidents?

Become a Premium Member for full access
  Unlock Premium Member

Question 482

Report
Export
Collapse

An analyst reviews the following output collected during the execution of a web application security assessment:

CompTIA CAS-004 image Question 482 94450 10022024175035000000

Which of the following attacks would be most likely to succeed, given the output?

Become a Premium Member for full access
  Unlock Premium Member

Question 483

Report
Export
Collapse

A company has been the target of LDAP injections, as well as brute-force, whaling, and spear-phishing attacks. The company is concerned about ensuring continued system access. The company has already implemented a SSO system with strong passwords. Which of the following additional controls should the company deploy?

Become a Premium Member for full access
  Unlock Premium Member

Question 484

Report
Export
Collapse

An application security engineer is performing a vulnerability assessment against a new web application that uses SAML. The engineer wants to identify potential authentication issues within the application. Which of the following methods would be most appropriate for the engineer to perform?

Become a Premium Member for full access
  Unlock Premium Member

Question 485

Report
Export
Collapse

A company's Chief Information Security Officer wants to prevent the company from being the target of ransomware. The company's IT assets need to be protected. Which of the following are the most secure options to address these concerns? (Select three).

Become a Premium Member for full access
  Unlock Premium Member

Question 486

Report
Export
Collapse

A security administrator is setting up a virtualization solution that needs to run services from a single host. Each service should be the only one running in its environment. Each environment needs to have its own operating system as a base but share the kernel version and properties of the running host. Which of the following technologies would best meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 487

Report
Export
Collapse

During the development process, the team identifies major components that need to be rewritten. As a result, the company hires a security consultant to help address major process issues. Which of the following should the consultant recommend to best prevent these issues from reoccurring in the future?

Become a Premium Member for full access
  Unlock Premium Member

Question 488

Report
Export
Collapse

A company wants to reduce its backup storage requirement and is undertaking a data cleanup project. Which of the following should a security administrator consider first when determining which data should be deleted?

Become a Premium Member for full access
  Unlock Premium Member

Question 489

Report
Export
Collapse

Which of the following security features do email signatures provide?

Become a Premium Member for full access
  Unlock Premium Member

Question 490

Report
Export
Collapse

The IT team suggests the company would save money by using self-signed certificates, but the security team indicates the company must use digitally signed third-party certificates. Which of the following is a valid reason to pursue the security team's recommendation?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions