Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CAS-004 CompTIA SecurityX Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CAS-004 Practice Questions

CompTIA SecurityX Certification Exam

Last Update 1 day ago
Total Questions : 619

Dive into our fully updated and stable CAS-004 practice test platform, featuring all the latest CompTIA CASP exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free CompTIA CASP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CAS-004. Use this test to pinpoint which areas you need to focus your study on.

CAS-004 PDF

CAS-004 PDF (Printable)
$43.75
$124.99

CAS-004 Testing Engine

CAS-004 PDF (Printable)
$50.75
$144.99

CAS-004 PDF + Testing Engine

CAS-004 PDF (Printable)
$63.7
$181.99
Question # 136

Which of the following testing plans is used to discuss disaster recovery scenarios with representatives from multiple departments within an incident response team but without taking any invasive actions?

Options:

A.  

Disaster recovery checklist

B.  

Tabletop exercise

C.  

Full interruption test

D.  

Parallel test

Discussion 0
Question # 137

Which of the following indicates when a company might not be viable after a disaster?

Options:

A.  

Maximum tolerable downtime

B.  

Recovery time objective

C.  

Mean time to recovery

D.  

Annual loss expectancy

Discussion 0
Question # 138

A software company is developing an application in which data must be encrypted with a cipher that requires the following:

* Initialization vector

* Low latency

* Suitable for streaming

Which of the following ciphers should the company use?

Options:

A.  

Cipher feedback

B.  

Cipher block chaining message authentication code

C.  

Cipher block chaining

D.  

Electronic codebook

Discussion 0
Question # 139

A pharmaceutical company was recently compromised by ransomware. Given the following EDR output from the process investigation:

Question # 139

On which of the following devices and processes did the ransomware originate?

Options:

A.  

cpt-ws018, powershell.exe

B.  

cpt-ws026, DearCry.exe

C.  

cpt-ws002, NO-AV.exe

D.  

cpt-ws026, NO-AV.exe

E.  

cpt-ws002, DearCry.exe

Discussion 0
Question # 140

A company created an external, PHP-based web application for its customers. A security researcher reports that the application has the Heartbleed vulnerability. Which of the following would BEST resolve and mitigate the issue? (Select TWO).

Options:

A.  

Deploying a WAF signature

B.  

Fixing the PHP code

C.  

Changing the web server from HTTPS to HTTP

D.  

UsingSSLv3

E.  

Changing the code from PHP to ColdFusion

F.  

Updating the OpenSSL library

Discussion 0
Question # 141

A CSP, which wants to compete in the market, has been approaching companies in an attempt to gain business. The CSP is able to provide the same uptime as other CSPs at a markedly reduced cost. Which of the following would be the MOST significant business risk to a company that signs a contract with this CSP?

Options:

A.  

Resource exhaustion

B.  

Geographic location

C.  

Control plane breach

D.  

Vendor lock-in

Discussion 0
Question # 142

A company wants to refactor a monolithic application to take advantage of cloud native services and service microsegmentation to secure sensitive application components. Which of the following should the company implement to ensure the architecture is portable?

Options:

A.  

Virtualized emulators

B.  

Type 2 hypervisors

C.  

Orchestration

D.  

Containerization

Discussion 0
Question # 143

Which of the following should be established when configuring a mobile device to protect user internet privacy, to ensure the connection is encrypted, and to keep user activity hidden? (Select TWO).

Options:

A.  

proxy

B.  

Tunneling

C.  

VDI

D.  

MDM

E.  

RDP

F.  

MAC address randomization

Discussion 0
Question # 144

Company A acquired Company

B.  

During an initial assessment, the companies discover they are using the same SSO system. To help users with the transition, Company A is requiring the following:

• Before the merger is complete, users from both companies should use a single set of usernames and passwords.

• Users in the same departments should have the same set of rights and privileges, but they should have different sets of rights and privileges if they have different IPs.

• Users from Company B should be able to access Company A's available resources.

Which of the following are the BEST solutions? (Select TWO).

Options:

A.  

Installing new Group Policy Object policies

B.  

Establishing one-way trust from Company B to Company A

C.  

Enabling multifactor authentication

D.  

Implementing attribute-based access control

E.  

Installing Company A's Kerberos systems in Company B's network

F.  

Updating login scripts

Discussion 0
Question # 145

A company is on a deadline to roll out an entire CRM platform to all users at one time. However, the company is behind schedule due to reliance on third-party vendors. Which of the following development approaches will allow the company to begin releases but also continue testing and development for future releases?

Options:

A.  

Implement iterative software releases.

B.  

Revise the scope of the project to use a waterfall approach

C.  

Change the scope of the project to use the spiral development methodology.

D.  

Perform continuous integration.

Discussion 0
Question # 146

A developer needs to implement PKI in an autonomous vehicle's software in the most efficient and labor-effective way possible. Which of the following will the developer MOST likely implement?

Options:

A.  

Certificate chain

B.  

Root CA

C.  

Certificate pinning

D.  

CRL

E.  

OCSP

Discussion 0
Question # 147

A security manager wants to transition the organization to a zero trust architecture. To meet this requirement, the security manager has instructed administrators to remove trusted zones, role-based access, and one-time authentication. Which of the following will need to be implemented to achieve this objective? (Select THREE).

Options:

A.  

Least privilege

B.  

VPN

C.  

Policy automation

D.  

PKI

E.  

Firewall

F.  

Continuous validation

G.  

Continuous integration

Discussion 0
Question # 148

A significant weather event caused all systems to fail over to the disaster recovery site successfully. However, successful data replication has not occurred in the last six months, which has resulted in

the service being unavailable. V•Vh1ch of the following would BEST prevent this scenario from happening again?

Options:

A.  

Performing routine tabletop exercises

B.  

Implementing scheduled, full interruption tests

C.  

Backing up system log reviews

D.  

Performing department disaster recovery walk-throughs

Discussion 0
Question # 149

A security architect is tasked with securing a new cloud-based videoconferencing and collaboration platform to support a new distributed workforce. The security architect's key objectives are to:

• Maintain customer trust

• Minimize data leakage

• Ensure non-repudiation

Which of the following would be the BEST set of recommendations from the security architect?

Options:

A.  

Enable the user authentication requirement, enable end-to-end encryption, and enable waiting rooms.

B.  

Disable file exchange, enable watermarking, and enable the user authentication requirement.

C.  

Enable end-to-end encryption, disable video recording, and disable file exchange.

D.  

Enable watermarking, enable the user authentication requirement, and disable video recording.

Discussion 0
Question # 150

A company wants to implement a new website that will be accessible via browsers with no mobile applications available. The new website will allow customers to submit sensitive medical information securely and receive online medical advice. The company already has multiple other websites where it provides various public health data and information. The new website must implement the following:

• The highest form Of web identity validation

• Encryption of all web transactions

• The strongest encryption in-transit

• Logical separation based on data sensitivity

Other things that should be considered include:

• The company operates multiple other websites that use encryption.

• The company wants to minimize total expenditure.

• The company wants to minimize complexity

Which of the following should the company implement on its new website? (Select TWO).

Options:

A.  

Wildcard certificate

B.  

EV certificate

C.  

Mutual authentication

D.  

Certificate pinning

E.  

SSO

F.  

HSTS

Discussion 0
Get CAS-004 dumps and pass your exam in 24 hours!

Free Exams Sample Questions