Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CAS-004 CompTIA SecurityX Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CAS-004 Practice Questions

CompTIA SecurityX Certification Exam

Last Update 1 day ago
Total Questions : 619

Dive into our fully updated and stable CAS-004 practice test platform, featuring all the latest CompTIA CASP exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free CompTIA CASP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CAS-004. Use this test to pinpoint which areas you need to focus your study on.

CAS-004 PDF

CAS-004 PDF (Printable)
$43.75
$124.99

CAS-004 Testing Engine

CAS-004 PDF (Printable)
$50.75
$144.99

CAS-004 PDF + Testing Engine

CAS-004 PDF (Printable)
$63.7
$181.99
Question # 151

A security analyst has been tasked with providing key information in the risk register. Which of the following outputs or results would be used to BEST provide the information needed to determine the

security posture for a risk decision? (Select TWO).

Options:

A.  

Password cracker

B.  

SCAP scanner

C.  

Network traffic analyzer

D.  

Vulnerability scanner

E.  

Port scanner

F.  

Protocol analyzer

Discussion 0
Question # 152

A systems administrator was given the following IOC to detect the presence of a malicious piece of software communicating with its command-and-control server:

post /malicious. php

User-Agent: Malicious Tool V 1.0

Host: www.rcalicious.com

The IOC documentation suggests the URL is the only part that could change. Which of the following regular expressions would allow the systems administrator to determine if any of the company hosts are compromised, while reducing false positives?

Options:

A.  

User-Agent: Malicious Tool.*

B.  

www\. malicious\. com\/malicious. php

C.  

POST /malicious\. php

D.  

Hose: [a-2] *\.malicious\.com

E.  

malicious. *

Discussion 0
Question # 153

A client is adding scope to a project. Which of the following processes should be used when requesting updates or corrections to the client's systems?

Options:

A.  

The implementation engineer requests direct approval from the systems engineer and the Chief Information Security Officer.

B.  

The change control board must review and approve a submission.

C.  

The information system security officer provides the systems engineer with the system updates.

D.  

The security engineer asks the project manager to review the updates for the client's system.

Discussion 0
Question # 154

An organization is moving its intellectual property data from on premises to a CSP and wants to secure the data from theft. Which of the following can be used to mitigate this risk?

Options:

A.  

An additional layer of encryption

B.  

A third-party data integrity monitoring solution

C.  

A complete backup that is created before moving the data

D.  

Additional application firewall rules specific to the migration

Discussion 0
Question # 155

An engineering team has deployed a new VPN service that requires client certificates to be used in order to successfully connect. On iOS devices, however, the following error occurs after importing the .p12 certificate file:

mbedTLS: ca certificate undefined

Which of the following is the root cause of this issue?

Options:

A.  

iOS devices have an empty root certificate chain by default.

B.  

OpenSSL is not configured to support PKCS#12 certificate files.

C.  

The VPN client configuration is missing the CA private key.

D.  

The iOS keychain imported only the client public and private keys.

Discussion 0
Question # 156

A systems administrator at a web-hosting provider has been tasked with renewing the public certificates of all customer sites. Which of the following would BEST support multiple domain names while minimizing the amount of certificates needed?

Options:

A.  

ocsp

B.  

CRL

C.  

SAN

D.  

CA

Discussion 0
Question # 157

A security consultant has been asked to recommend a secure network design that would:

• Permit an existing OPC server to communicate with a new Modbus server that is controlling electrical relays.

• Limit operational disruptions.

Due to the limitations within the Modbus protocol, which of the following configurations should the security engineer recommend as part of the solution?

Options:

A.  

Restrict inbound traffic so that only the OPC server is permitted to reach the Modbus server on port 135.

B.  

Restrict outbound traffic so that only the OPC server is permitted to reach the Modbus server on port 102.

C.  

Restrict outbound traffic so that only the OPC server is permitted to reach the Modbus server on port 5000.

D.  

Restrict inbound traffic so that only the OPC server is permitted to reach the Modbus server on port 502.

Discussion 0
Question # 158

A mobile administrator is reviewing the following mobile device DHCP logs to ensure the proper mobile settings are applied to managed devices:

Question # 158

Which of the following mobile configuration settings is the mobile administrator verifying?

Options:

A.  

Service set identifier authentication

B.  

Wireless network auto joining

C.  

802.1X with mutual authentication

D.  

Association MAC address randomization

Discussion 0
Question # 159

The Chief Information Security Officer (CISO) asked a security manager to set up a system that sends an alert whenever a mobile device enters a sensitive area of the company's data center. The CISO would also like to be able to alert the individual who is entering the area that the access was logged and monitored. Which of the following would meet these requirements?

Options:

A.  

Near-field communication

B.  

Short Message Service

C.  

Geofencing

D.  

Bluetooth

Discussion 0
Question # 160

Due to internal resource constraints, the management team has asked the principal security architect to recommend a solution that shifts most of the responsibility for application-level controls to the cloud provider. In the shared responsibility model, which of the following levels of service meets this requirement?

Options:

A.  

IaaS

B.  

SaaS

C.  

Faas

D.  

PaaS

Discussion 0
Question # 161

A network administrator receives a ticket regarding an error from a remote worker who is trying to reboot a laptop. The laptop has not yet loaded the operating system, and the user is unable to continue the boot process. The administrator is able to provide the user with a recovery PIN, and the user is able to reboot the system and access the device as needed. Which of the following is the MOST likely cause of the error?

Options:

A.  

Lockout of privileged access account

B.  

Duration of the BitLocker lockout period

C.  

Failure of the Kerberos time drift sync

D.  

Failure of TPM authentication

Discussion 0
Question # 162

A company is repeatedly being breached by hackers who valid credentials. The company’s Chief information Security Officer (CISO) has installed multiple controls for authenticating users, including biometric and token-based factors. Each successive control has increased overhead and complexity but has failed to stop further breaches. An external consultant is evaluating the process currently in place to support the authentication controls. Which of the following recommendation would MOST likely reduce the risk of unauthorized access?

Options:

A.  

Implement strict three-factor authentication.

B.  

Implement least privilege policies

C.  

Switch to one-time or all user authorizations.

D.  

Strengthen identify-proofing procedures

Discussion 0
Question # 163

The Chief information Officer (CIO) wants to establish a non-banding agreement with a third party that outlines the objectives of the mutual arrangement dealing with data transfers between both organizations before establishing a format partnership. Which of the follow would MOST likely be used?

Options:

A.  

MOU

B.  

OLA

C.  

NDA

D.  

SLA

Discussion 0
Question # 164

A company’s Chief Information Security Officer is concerned that the company’s proposed move to the cloud could lead to a lack of visibility into network traffic flow logs within the VP

C.  

Which of the following compensating controls would be BEST to implement in this situation?

Options:

A.  

EDR

B.  

SIEM

C.  

HIDS

D.  

UEBA

Discussion 0
Question # 165

A developer implement the following code snippet.

Question # 165

Which of the following vulnerabilities does the code snippet resolve?

Options:

A.  

SQL inject

B.  

Buffer overflow

C.  

Missing session limit

D.  

Information leakage

Discussion 0
Get CAS-004 dumps and pass your exam in 24 hours!

Free Exams Sample Questions