Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CAS-004 CompTIA SecurityX Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CAS-004 Practice Questions

CompTIA SecurityX Certification Exam

Last Update 1 day ago
Total Questions : 619

Dive into our fully updated and stable CAS-004 practice test platform, featuring all the latest CompTIA CASP exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free CompTIA CASP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CAS-004. Use this test to pinpoint which areas you need to focus your study on.

CAS-004 PDF

CAS-004 PDF (Printable)
$43.75
$124.99

CAS-004 Testing Engine

CAS-004 PDF (Printable)
$50.75
$144.99

CAS-004 PDF + Testing Engine

CAS-004 PDF (Printable)
$63.7
$181.99
Question # 166

Which of the following protocols is a low power, low data rate that allows for the creation of PAN networks?

Options:

A.  

Zigbee

B.  

CAN

C.  

DNP3

D.  

Modbus

Discussion 0
Question # 167

An organization is prioritizing efforts to remediate or mitigate risks identified during the latest assessment. For one of the risks, a full remediation was not possible, but the organization was able to successfully apply mitigations to reduce the likelihood of impact.

Which of the following should the organization perform NEXT?

Options:

A.  

Assess the residual risk.

B.  

Update the organization’s threat model.

C.  

Move to the next risk in the register.

D.  

Recalculate the magnitude of impact.

Discussion 0
Question # 168

A company’s product site recently had failed API calls, resulting in customers being unable to check out and purchase products. This type of failure could lead to the loss of customers and damage to the company’s reputation in the market.

Which of the following should the company implement to address the risk of system unavailability?

Options:

A.  

User and entity behavior analytics

B.  

Redundant reporting systems

C.  

A self-healing system

D.  

Application controls

Discussion 0
Question # 169

A host on a company’s network has been infected by a worm that appears to be spreading via SM

B.  

A security analyst has been tasked with containing the incident while also maintaining evidence for a subsequent investigation and malware analysis.

Which of the following steps would be best to perform FIRST?

Options:

A.  

Turn off the infected host immediately.

B.  

Run a full anti-malware scan on the infected host.

C.  

Modify the smb.conf file of the host to prevent outgoing SMB connections.

D.  

Isolate the infected host from the network by removing all network connections.

Discussion 0
Question # 170

A company's Chief Information Officer wants to Implement IDS software onto the current system's architecture to provide an additional layer of security. The software must be able to monitor system activity, provide Information on attempted attacks, and provide analysis of malicious activities to determine the processes or users Involved. Which of the following would provide this information?

Options:

A.  

HIPS

B.  

UEBA

C.  

HlDS

D.  

NIDS

Discussion 0
Question # 171

A security architect was asked to modify an existing internal network design to accommodate the following requirements for RDP:

• Enforce MFA for RDP

• Ensure RDP connections are only allowed with secure ciphers.

The existing network is extremely complex and not well segmented. Because of these limitations, the company has requested that the connections not be restricted by network-level firewalls Of ACLs.

Which of the following should the security architect recommend to meet these requirements?

Options:

A.  

Implement a reverse proxy for remote desktop with a secure cipher configuration enforced.

B.  

Implement a bastion host with a secure cipher configuration enforced.

C.  

Implement a remote desktop gateway server, enforce secure ciphers, and configure to use OTP

D.  

Implement a GPO that enforces TLS cipher suites and limits remote desktop access to only VPN users.

Discussion 0
Question # 172

A business wants to migrate its workloads from an exclusively on-premises IT infrastructure to the cloud but cannot implement all the required controls. Which of the following BEST describes the risk associated with this implementation?

Options:

A.  

Loss of governance

B.  

Vendor lockout

C.  

Compliance risk

D.  

Vendor lock-in

Discussion 0
Question # 173

A company just released a new video card. Due to limited supply and high demand, attackers are employing automated systems to purchase the device through the company's web store so they can resell it on the secondary market. The company's intended customers are frustrated. A security engineer suggests implementing a CAPTCHA system on the web store to help reduce the number of video cards purchased through automated systems. Which of the following now describes the level of risk?

Options:

A.  

Inherent

B.  

Low

C.  

Mitigated

D.  

Residual.

E.  

Transferred

Discussion 0
Question # 174

A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt the data using the keys from the website. Which of the following should the security analyst recommend to protect the affected data?

Options:

A.  

Key rotation

B.  

Key revocation

C.  

Key escrow

D.  

Zeroization

E.  

Cryptographic obfuscation

Discussion 0
Question # 175

A review of the past year’s attack patterns shows that attackers stopped reconnaissance after finding a susceptible system to compromise. The company would like to find a way to use this information to protect the environment while still gaining valuable attack information.

Which of the following would be BEST for the company to implement?

Options:

A.  

A WAF

B.  

An IDS

C.  

A SIEM

D.  

A honeypot

Discussion 0
Question # 176

A software company wants to build a platform by integrating with another company's established product. Which of the following provisions would be MOST important to include when drafting an agreement between the two companies?

Options:

A.  

Data sovereignty

B.  

Shared responsibility

C.  

Source code escrow

D.  

Safe harbor considerations

Discussion 0
Question # 177

An application developer is including third-party background security fixes in an application. The fixes seem to resolve a currently identified security issue. However, when the application isreleased to thepublic, report come In that a previously vulnerability has returned. Which of the following should the developer integrate into the process to BEST prevent this type of behavior?

Options:

A.  

Peer review

B.  

Regression testing

C.  

User acceptance

D.  

Dynamic analysis

Discussion 0
Question # 178

An architectural firm is working with its security team to ensure that any draft images that are leaked to the public can be traced back to a specific external party. Which of the following would BEST accomplish this goal?

Options:

A.  

Properly configure a secure file transfer system to ensure file integrity.

B.  

Have the external parties sign non-disclosure agreements before sending any images.

C.  

Only share images with external parties that have worked with the firm previously.

D.  

Utilize watermarks in the images that are specific to each external party.

Discussion 0
Question # 179

A help desk technician just informed the security department that a user downloaded a suspicious file from internet explorer last night. The user confirmed accessing all the files and folders before going home from work. the next morning, the user was no longer able to boot the system and was presented a screen with a phone number. The technician then tries to boot the computer using wake-on-LAN, but the system would not come up. which of the following explains why the computer would not boot?

Options:

A.  

The operating system was corrupted.

B.  

SElinux was in enforced status.

C.  

A secure boot violation occurred.

D.  

The disk was encrypted.

Discussion 0
Question # 180

A company Is adopting a new artificial-intelligence-based analytics SaaS solution. This Is the company's first attempt at using a SaaS solution, and a security architect has been asked todetermine any future risks. Which of the following would be the GREATEST risk In adopting this solution?

Options:

A.  

The inability to assign access controls to comply with company policy

B.  

The inability to require the service provider process data in a specific country

C.  

The inability to obtain company data when migrating to another service

D.  

The inability to conduct security assessments against a service provider

Discussion 0
Get CAS-004 dumps and pass your exam in 24 hours!

Free Exams Sample Questions