Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA CAS-004 Practice Exam with Questions & Answers | Set: 11

Questions 151

An internal security audit determines that Telnet is currently being used within the environment to manage network switches. Which of the following tools should be utilized to identify credentials in plaintext that are used to log in to these devices?

Options:
A.

Fuzzer

B.

Network traffic analyzer

C.

HTTP interceptor

D.

Port scanner

E.

Password cracker

CompTIA CAS-004 Premium Access
Questions 152

You are an information security analyst tasked to provide feedback and remediation

guidance to an organization that is working to comply with a prescriptive framework.

The framework includes the following controls related to network design:

. Network hosts must be segmented into security domains.

. A screened subnet must be used for all externally available assets.

. A shared services zone must be present for internal servers and should not contain workstations.

INSTRUCTIONS

Based on the stated requirements, place each resource in the appropriate network location. All resources must be used, and all network zones will be filled.

CAS-004 Question 152

CAS-004 Question 152

Options:
Questions 153

During the development process, the team identifies major components that need to be rewritten. As a result, the company hires a security consultant to help address major process issues. Which of the following should the consultant recommend tobestprevent these issues from reoccurring in the future?

Options:
A.

Implementing a static analysis tool within the CI/CD system

B.

Configuring a dynamic application security testing tool

C.

Performing software composition analysis on all third-party components

D.

Utilizing a risk-based threat modeling approach on new projects

E.

Setting up an interactive application security testing tool

Questions 154

A security analyst has been provided the following partial Snort IDS rule to review and add into the company's Snort IDS to identify a CVE:

CAS-004 Question 154

Which of the following should the analyst recommend to mitigate this type of vulnerability?

Options:
A.

IPSec rules

B.

OS patching

C.

Two-factor authentication

D.

TCP wrappers

Questions 155

A security administrator is trying to securely provide public access to specific data from a web application. Clients who want to access the application will be required to:

• Only allow the POST and GET options.

• Transmit all data secured with TLS 1.2 or greater.

• Use specific URLs to access each type of data that is requested.

• Authenticate with a bearer token.

Which of the following should the security administrator recommend to meet these requirements?

Options:
A.

API gateway

B.

Application load balancer

C.

Web application firewall

D.

Reverse proxy

Questions 156

A company performs an annual attack surface analysis and identifies a large number of unexpected, external-facing systems. The Chief Information Security Officer (CISO) wishes to ensure this issue does not reoccur. Which of the following should the company do?

Options:
A.

Update the company's risk profile.

B.

Minimize errors in the risk assessment metrics.

C.

Continuously monitor key risk indicators.

D.

Reduce the costs associated with performing risk assessments.

Questions 157

A web application server is running a legacy operating system with an unpatched RCE (Remote Code Execution) vulnerability. The server cannot be upgraded until the corresponding application code is updated. Which of the following compensating controls would prevent successful exploitation?

Options:
A.

Segmentation

B.

CASB

C.

HIPS

D.

UEBA

Questions 158

A security analyst received the following finding from a cloud security assessment tool:

Virtual Machine Data Disk is encrypted with the default encryption key.

Because the organization hosts highly sensitive data files, regulations dictate it must be encrypted so it is unreadable to the CSP. Which of the following should be implemented to remediate the finding and meet the regulatory requirement? (Select two).

Options:
A.

Disk encryption with customer-provided keys

B.

Disk encryption with keys from a third party

C.

Row-level encryption with a key escrow

D.

File-level encryption with cloud vendor-provided keys

E.

File-level encryption with customer-provided keys

F.

Disk-level encryption with a cross-signed certificate

Questions 159

A company is migrating its data center to the cloud. Some hosts had been previously isolated, but a risk assessment convinced the engineering team to reintegrate the systems. Because the systems were isolated, the risk associated with vulnerabilities was low. Which of the following should the security team recommend be performed before migrating these servers to the cloud?

Options:
A.

Performing patching and hardening

B.

Deploying host and network IDS

C.

Implementing least functionality and time-based access

D.

Creating a honeypot and adding decoy files

Questions 160

A small bank is evaluating different methods to address and resolve the following requirements

" Must be able to store credit card data using the smallest amount of data possible

• Must be compliant with PCI DSS

• Must maintain confidentiality if one piece of the layer is compromised

Which of the following is the best solution for the bank?

Options:
A.

Scrubbing

B.

Tokenization

C.

Masking

D.

Homomorphic encryption

Questions 161

A security manager is creating a standard configuration across all endpoints that handle sensitive data. Which of the following techniques should be included in the standard configuration to ensure the endpoints are hardened?

Options:
A.

Drive encryption

B.

Patch management

C.

Event logging

D.

Resource monitoring

Questions 162

loCs were missed during a recent security incident due to the reliance on a signature-based detection platform. A security engineer must recommend a solution that can be implemented to address this shortcoming. Which of the following would be the most appropriate recommendation?

Options:
A.

FIM

B.

SASE

C.

UEBA

D.

CSPM

E.

EAP

Questions 163

An organization has a secure manufacturing facility that is approximately 10mi (16km) away from its corporate headquarters. The organization's management team is concerned about being able to track personnel who utilize the facility. Which of the following would best help to prevent staff from being tracked?

Options:
A.

Ensuring that all staff use covered parking so they cannot be seen from outside the perimeter.

B.

Configuring geofencing to disable mobile devices and wearable devices near the secure facility.

C.

Constructing a tunnel between headquarters and the facility to allow more secure access.

D.

Enforcing physical security controls like access control vestibules and appropriate fencing.

Questions 164

An IDS was unable to detect malicious network traffic during a recent security incident, even though all traffic was being sent using HTTPS. As a result, a website used by employees was compromised. Which of the following detection mechanisms would allow the IDS to detect an attack like this one in the future?

Options:
A.

Deobfuscation

B.

Protocol decoding

C.

Inspection proxy

D.

Digital rights management

Questions 165

A recentDASTscan indicates an application has multiple issues withpath traversal. Which of the following is thebestaction for the development team to take?

Options:
A.

Develop a secure library for file handling that normalizes and validates the input path.

B.

Create a sandbox for the application that disallows filesystem access.

C.

Ensure that output encoding is appropriately implemented on all data fields.

D.

Implement a blocklist for a specific set of meta characters.

E.

Deploy a code sandbox solution that reduces the application's permissions.