CompTIA CAS-004 CompTIA Advanced Security Practitioner (CASP+) Exam Web: www.solution2pass.com Version: Demo Email: [email protected] [ Total Questions: 10]
IMPORTANT NOTICE Feedback We have developed quality product and state-of-art service to ensure our customers interest. If you have any suggestions, please feel free to contact us at [email protected] Support If you have any questions about our product, please provide the following items: exam code screenshot of the question login id/email please contact us at [email protected] and our technical experts will provide support within 24 hours. Copyright The product of each order has its own encryption code, so you should use it independently. Any unauthorized changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Pass Guaranteed CompTIA - CAS-004 Question #:1 A company undergoing digital transformation is reviewing the resiliency of a CSP and is concerned about meeting SLA requirements in the event of a CSP incident. Which of the following would be BEST to proceed with the transformation? A. An on-premises solution as a backup B. A load balancer with a round-robin configuration C. A multicloud provider solution D. An active-active solution within the same tenant Answer: D Question #:2 A junior developer is informed about the impact of new malware on an Advanced RISC Machine (ARM) CPU, and the code must be fixed accordingly. Based on the debug, the malware is able to insert itself in another process memory location. Which of the following technologies can the developer enable on the ARM architecture to prevent this type of malware? A. Execute never B. No-execute C. Total memory encryption D. Virtual memory encryption Answer: A Question #:3 A financial services company wants to migrate its email services from on-premises servers to a cloud-based email solution. The Chief information Security Officer (CISO) must brief board of directors on the potential security concerns related to this migration. The board is concerned about the following. * Transactions being required by unauthorized individual * Complete discretion regarding client names, account numbers, and investment information. * Malicious attacker using email to distribute malware and ransom ware. * Exfiltration of sensitivity company information. Only Solution2Pass for Any Exam 1 of 5
Pass Guaranteed CompTIA - CAS-004 The cloud-based email solution will provide an6-malware, reputation-based scanning, signature-based scanning, and sandboxing. Which of the following is the BEST option to resolve the board’s concerns for this email migration? A. Data loss prevention B. Endpoint detection response C. SSL VPN D. Application whitelisting Answer: A Question #:4 A company publishes several APIs for customers and is required to use keys to segregate customer data sets. Which of the following would be BEST to use to store customer keys? A. A trusted platform module B. A hardware security module C. A localized key store D. A public key infrastructure Answer: C Question #:5 A security analyst is reading the results of a successful exploit that was recently conducted by third-party penetration testers. The testers reverse engineered a privileged executable. In the report, the planning and execution of the exploit is detailed using logs and outputs from the test However, the attack vector of the exploit is missing, making it harder to recommend remediation’s. Given the following output: Only Solution2Pass for Any Exam 2 of 5
Pass Guaranteed CompTIA - CAS-004 The penetration testers MOST likely took advantage of: A. A TOC/TOU vulnerability B. A plain-text password disclosure C. An integer overflow vulnerability D. A buffer overflow vulnerability Answer: A Question #:6 A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened. A. Impalement application whitelisting and add only the email client to the whitelist for laptop in the claims processing department. B. Required all laptops to connect to the VPN before accessing email. C. Implement cloud-based content filtering with sandboxing capabilities. D. Install a mail gateway to scan incoming messages and strip attachments before they reach the mailbox. Answer: C Only Solution2Pass for Any Exam 3 of 5
Pass Guaranteed CompTIA - CAS-004 Question #:7 A threat hunting team receives a report about possible APT activity in the network. Which of the following threat management frameworks should the team implement? A. NIST SP 800-53 B. MITRE ATT&CK C. The Cyber Kill Chain D. The Diamond Model of Intrusion Analysis Answer: A Question #:8 Which of the following controls primarily detects abuse of privilege but does not prevent it? A. Off-boarding B. Separation of duties C. Least privilege D. Job rotation Answer: A Question #:9 A security architect works for a manufacturing organization that has many different branch offices. The architect is looking for a way to reduce traffic and ensure the branch offices receive the latest copy of revoked certificates issued by the CA at the organization’s headquarters location. The solution must also have the lowest power requirement on the CA. Which of the following is the BEST solution? A. Deploy an RA on each branch office. B. Use Delta CRLs at the branches. C. Configure clients to use OCSP. D. Send the new CRLs by using GPO. Answer: C Question #:10 Only Solution2Pass for Any Exam 4 of 5
Pass Guaranteed CompTIA - CAS-004 A cybersecurity analyst receives a ticket that indicates a potential incident is occurring. There has been a large in log files generated by a generated by a website containing a ‘’Contact US’’ form. The analyst must determine if the increase in website traffic is due to a recent marketing campaign of if this is a potential incident. Which of the following would BEST assist the analyst? A. Ensuring proper input validation is configured on the ‘’Contact US’’ form B. Deploy a WAF in front of the public website C. Checking for new rules from the inbound network IPS vendor D. Running the website log files through a log reduction and analysis tool Answer: D Only Solution2Pass for Any Exam 5 of 5
About solution2pass.com solution2pass.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam Questions, Study Guides, Practice Tests. We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on. View list of all certification exams: All vendors We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed below. Sales: [email protected] Feedback: [email protected] Support: [email protected] Any problems about IT certification or our products, You can write us back and we will get back to you within 24 hours.
Search
Read the Text Version
- 1 - 8
Pages: