CompTIA CAS-004 Exam Practice Questions (P. 5)
- Full Access (645 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
An organization wants to perform a scan of all its systems against best practice security configurations.
Which of the following SCAP standards, when combined, will enable the organization to view each of the configuration checks in a machine-readable checklist format for full automation? (Choose two.)
Which of the following SCAP standards, when combined, will enable the organization to view each of the configuration checks in a machine-readable checklist format for full automation? (Choose two.)
- AARF
- BXCCDFMost Voted
- CCPE
- DCVE
- ECVSS
- FOVALMost Voted
Correct Answer:
BF
Reference:
https://www.govinfo.gov/content/pkg/GOVPUB-C13-9ecd8eae582935c93d7f410e955dabb6/pdf/GOVPUB-C13-
9ecd8eae582935c93d7f410e955dabb6.pdf
(p.12)
BF
Reference:
https://www.govinfo.gov/content/pkg/GOVPUB-C13-9ecd8eae582935c93d7f410e955dabb6/pdf/GOVPUB-C13-
9ecd8eae582935c93d7f410e955dabb6.pdf
(p.12)
send
light_mode
delete
Question #42
A company is migrating from company-owned phones to a BYOD strategy for mobile devices. The pilot program will start with the executive management team and be rolled out to the rest of the staff in phases. The company's Chief Financial Officer loses a phone multiple times a year.
Which of the following will MOST likely secure the data on the lost device?
Which of the following will MOST likely secure the data on the lost device?
- ARequire a VPN to be active to access company data.
- BSet up different profiles based on the person's risk.
- CRemotely wipe the device.Most Voted
- DRequire MFA to access company applications.
Correct Answer:
C
C

Based on the scenario of recurrent device loss, remotely wiping the device is indeed the most effective method to ensure security of the data on a lost phone within a BYOD environment. This wiped-out approach guarantees that no sensitive information remains accessible to unauthorized persons who might find or steal the phone. Although Multi-Factor Authentication (MFA) does strengthen access control, it does not address the core issue of protecting data already present on a lost device. Thus, implementing a remote wipe capability is rightly emphasized as it aligns directly with robust data protection practices in such incidents.
send
light_mode
delete
Question #43
A security architect works for a manufacturing organization that has many different branch offices. The architect is looking for a way to reduce traffic and ensure the branch offices receive the latest copy of revoked certificates issued by the CA at the organization's headquarters location. The solution must also have the lowest power requirement on the CA.
Which of the following is the BEST solution?
Which of the following is the BEST solution?
- ADeploy an RA on each branch office.
- BUse Delta CRLs at the branches.Most Voted
- CConfigure clients to use OCSP.
- DSend the new CRLs by using GPO.
Correct Answer:
C
Reference:
https://www.sciencedirect.com/topics/computer-science/revoke-certificate
C
Reference:
https://www.sciencedirect.com/topics/computer-science/revoke-certificate
send
light_mode
delete
Question #44
After a security incident, a network security engineer discovers that a portion of the company's sensitive external traffic has been redirected through a secondary
ISP that is not normally used.
Which of the following would BEST secure the routes while allowing the network to function in the event of a single provider failure?
ISP that is not normally used.
Which of the following would BEST secure the routes while allowing the network to function in the event of a single provider failure?
- ADisable BGP and implement a single static route for each internal network.
- BImplement a BGP route reflector.Most Voted
- CImplement an inbound BGP prefix list.
- DDisable BGP and implement OSPF.
Correct Answer:
B
B

Implementing a BGP route reflector is the most effective strategy for securing the network's routes while maintaining functionality in case one ISP fails. The BGP route reflector centralizes the distribution of routing information within an autonomous system, making it easier to manage and more secure against potential redirection through unauthorized paths. This configuration ensures that even with the failover to a secondary ISP, the traffic routes are controlled and predictable, enhancing overall network resilience and security.
send
light_mode
delete
Question #45
A company's SOC has received threat intelligence about an active campaign utilizing a specific vulnerability. The company would like to determine whether it is vulnerable to this active campaign.
Which of the following should the company use to make this determination?
Which of the following should the company use to make this determination?
- AThreat hunting
- BA system penetration testMost Voted
- CLog analysis within the SIEM tool
- DThe Cyber Kill Chain
Correct Answer:
B
B

A system penetration test is indeed the most effective method to determine a company's vulnerability to a specific security threat highlighted in threat intelligence. By simulating an attack that exploits the identified vulnerability, penetration testing not only confirms the susceptibility of the system but also provides practical insights into the potential impact of the exploit, enabling the security team to prioritize mitigation based on real-world data. It's a proactive security measure that prevents potential exploits by identifying and addressing vulnerabilities before they can be exploited by actual attackers.
send
light_mode
delete
Question #46
A security engineer needs to recommend a solution that will meet the following requirements:
✑ Identify sensitive data in the provider's network
✑ Maintain compliance with company and regulatory guidelines
✑ Detect and respond to insider threats, privileged user threats, and compromised accounts
✑ Enforce datacentric security, such as encryption, tokenization, and access control
Which of the following solutions should the security engineer recommend to address these requirements?
✑ Identify sensitive data in the provider's network
✑ Maintain compliance with company and regulatory guidelines
✑ Detect and respond to insider threats, privileged user threats, and compromised accounts
✑ Enforce datacentric security, such as encryption, tokenization, and access control
Which of the following solutions should the security engineer recommend to address these requirements?
- AWAF
- BCASB
- CSWG
- DDLPMost Voted
Correct Answer:
C
C

Examining the requirements and capabilities of the options provided, it becomes evident that a DLP (Data Loss Prevention) system aligns most comprehensively with the listed needs, contrary to the suggested SWG. DLP not only detects and protects sensitive data but also supports compliance with organizational and regulatory standards, monitors for insider threats, and enforces stringent data-centric security controls like encryption and access management. This makes it a preferable choice for addressing the full spectrum of requirements described.
send
light_mode
delete
Question #47
A security engineer estimates the company's popular web application experiences 100 attempted breaches per day. In the past four years, the company's data has been breached two times.
Which of the following should the engineer report as the ARO for successful breaches?
Which of the following should the engineer report as the ARO for successful breaches?
- A0.5Most Voted
- B8
- C50
- D36,500
Correct Answer:
A
Reference:
https://blog.netwrix.com/2020/07/24/annual-loss-expectancy-and-quantitative-risk-analysis/
A
Reference:
https://blog.netwrix.com/2020/07/24/annual-loss-expectancy-and-quantitative-risk-analysis/

send
light_mode
delete
Question #48
A network architect is designing a new SD-WAN architecture to connect all local sites to a central hub site. The hub is then responsible for redirecting traffic to public cloud and datacenter applications. The SD-WAN routers are managed through a SaaS, and the same security policy is applied to staff whether working in the office or at a remote location. The main requirements are the following:
1. The network supports core applications that have 99.99% uptime.
2. Configuration updates to the SD-WAN routers can only be initiated from the management service.
3. Documents downloaded from websites must be scanned for malware.
Which of the following solutions should the network architect implement to meet the requirements?
1. The network supports core applications that have 99.99% uptime.
2. Configuration updates to the SD-WAN routers can only be initiated from the management service.
3. Documents downloaded from websites must be scanned for malware.
Which of the following solutions should the network architect implement to meet the requirements?
- AReverse proxy, stateful firewalls, and VPNs at the local sites
- BIDSs, WAFs, and forward proxy IDS
- CDoS protection at the hub site, mutual certificate authentication, and cloud proxyMost Voted
- DIPSs at the hub, Layer 4 firewalls, and DLP
Correct Answer:
B
B

While the correct answer provided is B (IDSs, WAFs, and forward proxy IDS), a strong case can be made for option C as well, particularly regarding the high availability required and the security for configuration updates. Option C—covering DoS protection, mutual certificate authentication, and cloud proxy—directly addresses the uptime requirement through DoS measures and security through mutual authentication and cloud-based malware scanning. This might suggest a reevaluation of the correct answer, as both options seem to cater to different aspects of the stated requirements with significant validity.
send
light_mode
delete
Question #49
A security engineer needs to implement a solution to increase the security posture of user endpoints by providing more visibility and control over local administrator accounts. The endpoint security team is overwhelmed with alerts and wants a solution that has minimal operational burdens. Additionally, the solution must maintain a positive user experience after implementation.
Which of the following is the BEST solution to meet these objectives?
Which of the following is the BEST solution to meet these objectives?
- AImplement Privileged Access Management (PAM), keep users in the local administrators group, and enable local administrator account monitoring.
- BImplement PAM, remove users from the local administrators group, and prompt users for explicit approval when elevated privileges are required.Most Voted
- CImplement EDR, remove users from the local administrators group, and enable privilege escalation monitoring.
- DImplement EDR, keep users in the local administrators group, and enable user behavior analytics.
Correct Answer:
A
Reference:
https://www.cyberark.com/what-is/privileged-access-management/
A
Reference:
https://www.cyberark.com/what-is/privileged-access-management/
send
light_mode
delete
Question #50
An organization's hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.
Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?
Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?
- ADeploy a SOAR tool.
- BModify user password history and length requirements.
- CApply new isolation and segmentation schemes.
- DImplement decoy files on adjacent hosts.Most Voted
Correct Answer:
D
Reference:
https://www.cynet.com/network-attacks/network-attacks-and-network-security-threats/
D
Reference:
https://www.cynet.com/network-attacks/network-attacks-and-network-security-threats/
send
light_mode
delete
All Pages