Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CAS-004 CompTIA SecurityX Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CAS-004 Practice Questions

CompTIA SecurityX Certification Exam

Last Update 1 day ago
Total Questions : 619

Dive into our fully updated and stable CAS-004 practice test platform, featuring all the latest CompTIA CASP exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free CompTIA CASP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CAS-004. Use this test to pinpoint which areas you need to focus your study on.

CAS-004 PDF

CAS-004 PDF (Printable)
$43.75
$124.99

CAS-004 Testing Engine

CAS-004 PDF (Printable)
$50.75
$144.99

CAS-004 PDF + Testing Engine

CAS-004 PDF (Printable)
$63.7
$181.99
Question # 16

A security operations center analyst is investigating anomalous activity between a database server and an unknown external IP address and gathered the following data:

• dbadmin last logged in at 7:30 a.m. and logged out at 8:05 a.m.

• A persistent TCP/6667 connection to the external address was established at 7:55 a.m. The connection is still active.

• Other than bytes transferred to keep the connection alive, only a few kilobytes of data transfer every hour since the start of the connection.

• A sample outbound request payload from PCAP showed the ASCII content: "JOIN #community".

Which of the following is the MOST likely root cause?

Options:

A.  

A SQL injection was used to exfiltrate data from the database server.

B.  

The system has been hijacked for cryptocurrency mining.

C.  

A botnet Trojan is installed on the database server.

D.  

The dbadmin user is consulting the community for help via Internet Relay Chat.

Discussion 0
Question # 17

Users are claiming that a web server is not accessible. A security engineer logs for the site. The engineer connects to the server and runs netstat -an and receives the following output:

Question # 17 Which of the following is MOST likely happening to the server?

Options:

A.  

Port scanning

B.  

ARP spoofing

C.  

Buffer overflow

D.  

Denial of service

Discussion 0
Question # 18

Due to internal resource constraints, the management team has asked the principal security architect to recommend a solution that shifts partial responsibility for application-level controls to the cloud provider. In the shared responsibility model, which of the following levels of service meets this requirement?

Options:

A.  

laaS

B.  

SaaS

C.  

FaaS

D.  

PaaS

Discussion 0
Question # 19

A software house is developing a new application. The application has the following requirements:

Reduce the number of credential requests as much as possible

Integrate with social networks

Authenticate users

Which of the following is the BEST federation method to use for the application?

Options:

A.  

WS-Federation

B.  

OpenID

C.  

OAuth

D.  

SAML

Discussion 0
Question # 20

Which of the following is the MOST important cloud-specific risk from the CSP’s viewpoint?

Options:

A.  

Isolation control failure

B.  

Management plane breach

C.  

Insecure data deletion

D.  

Resource exhaustion

Discussion 0
Question # 21

A security engineer has been asked to close all non-secure connections from the corporate network. The engineer is attempting to understand why the corporate UTM will not allow users to download email via IMAPS. The engineer formulates a theory and begins testing by creating the firewall ID 58, and users are able to download emails correctly by using IMAP instead. The network comprises three VLANs:

Question # 21

The security engineer looks at the UTM firewall rules and finds the following:

Question # 21

Which of the following should the security engineer do to ensure IMAPS functions properly on the corporate user network?

Options:

A.  

Contact the email service provider and ask if the company IP is blocked.

B.  

Confirm the email server certificate is installed on the corporate computers.

C.  

Make sure the UTM certificate is imported on the corporate computers.

D.  

Create an IMAPS firewall rule to ensure email is allowed.

Discussion 0
Question # 22

A company is preparing to deploy a global service.

Which of the following must the company do to ensure GDPR compliance? (Choose two.)

Options:

A.  

Inform users regarding what data is stored.

B.  

Provide opt-in/out for marketing messages.

C.  

Provide data deletion capabilities.

D.  

Provide optional data encryption.

E.  

Grant data access to third parties.

F.  

Provide alternative authentication techniques.

Discussion 0
Question # 23

Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext?

Options:

A.  

Lattice-based cryptography

B.  

Quantum computing

C.  

Asymmetric cryptography

D.  

Homomorphic encryption

Discussion 0
Question # 24

A business stores personal client data of individuals residing in the EU in order to process requests for mortgage loan approvals.

Which of the following does the business’s IT manager need to consider?

Options:

A.  

The availability of personal data

B.  

The right to personal data erasure

C.  

The company’s annual revenue

D.  

The language of the web application

Discussion 0
Question # 25

During a remodel, a company’s computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room.The company wants to be able to identify any unauthorized individuals who enter the storage room by following an authorized employee.

Which of the following processes would BEST satisfy this requirement?

Options:

A.  

Monitor camera footage corresponding to a valid access request.

B.  

Require both security and management to open the door.

C.  

Require department managers to review denied-access requests.

D.  

Issue new entry badges on a weekly basis.

Discussion 0
Question # 26

A threat hunting team receives a report about possible APT activity in the network.

Which of the following threat management frameworks should the team implement?

Options:

A.  

NIST SP 800-53

B.  

MITRE ATT&CK

C.  

The Cyber Kill Chain

D.  

The Diamond Model of Intrusion Analysis

Discussion 0
Question # 27

In preparation for the holiday season, a company redesigned the system that manages retail sales and moved it to a cloud service provider. The new infrastructure did not meet the company’s availability requirements. During a postmortem analysis, the following issues were highlighted:

1. International users reported latency when images on the web page were initially loading.

2. During times of report processing, users reported issues with inventory when attempting to place orders.

3. Despite the fact that ten new API servers were added, the load across servers was heavy at peak times.

Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?

Options:

A.  

Serve static content via distributed CDNs, create a read replica of the central database and pull reports from there, and auto-scale API servers based on performance.

B.  

Increase the bandwidth for the server that delivers images, use a CDN, change the database to a non-relational database, and split the ten API servers across two load balancers.

C.  

Serve images from an object storage bucket with infrequent read times, replicate the database across different regions, and dynamically create API servers based on load.

D.  

Serve static-content object storage across different regions, increase the instance size on the managed relational database, and distribute the ten API servers across multiple regions.

Discussion 0
Question # 28

A security engineer estimates the company’s popular web application experiences 100 attempted breaches per day. In the past four years, the company’s data has been breached two times.

Which of the following should the engineer report as the ARO for successful breaches?

Options:

A.  

0.5

B.  

8

C.  

50

D.  

36,500

Discussion 0
Question # 29

A junior developer is informed about the impact of new malware on an Advanced RISC Machine (ARM) CPU, and the code must be fixed accordingly. Based on the debug, the malware is able to insert itself in another process memory location.

Which of the following technologies can the developer enable on the ARM architecture to prevent this type of malware?

Options:

A.  

Execute never

B.  

No-execute

C.  

Total memory encryption

D.  

Virtual memory encryption

Discussion 0
Question # 30

A company hired a third party to develop software as part of its strategy to be quicker to market. The company’s policy outlines the following requirements:

https://i.postimg.cc/8P9sB3zx/image.png

The credentials used to publish production software to the container registry should be stored in a secure location.

Access should be restricted to the pipeline service account, without the ability for the third-party developer to read the credentials directly.

Which of the following would be the BEST recommendation for storing and monitoring access to these shared credentials?

Options:

A.  

TPM

B.  

Local secure password file

C.  

MFA

D.  

Key vault

Discussion 0
Get CAS-004 dumps and pass your exam in 24 hours!

Free Exams Sample Questions