Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CAS-004 CompTIA SecurityX Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CAS-004 Practice Questions

CompTIA SecurityX Certification Exam

Last Update 1 day ago
Total Questions : 619

Dive into our fully updated and stable CAS-004 practice test platform, featuring all the latest CompTIA CASP exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free CompTIA CASP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CAS-004. Use this test to pinpoint which areas you need to focus your study on.

CAS-004 PDF

CAS-004 PDF (Printable)
$43.75
$124.99

CAS-004 Testing Engine

CAS-004 PDF (Printable)
$50.75
$144.99

CAS-004 PDF + Testing Engine

CAS-004 PDF (Printable)
$63.7
$181.99
Question # 31

A security analyst is researching containerization concepts for an organization. The analyst is concerned about potential resource exhaustion scenarios on the Docker host due to a single application that is overconsuming available resources.

Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?

Options:

A.  

Union filesystem overlay

B.  

Cgroups

C.  

Linux namespaces

D.  

Device mapper

Discussion 0
Question # 32

A security analyst is investigating a possible buffer overflow attack. The following output was found on a user’s workstation:

graphic.linux_randomization.prg

Which of the following technologies would mitigate the manipulation of memory segments?

Options:

A.  

NX bit

B.  

ASLR

C.  

DEP

D.  

HSM

Discussion 0
Question # 33

A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.

Options:

A.  

Impalement application whitelisting and add only the email client to the whitelist for laptop in the claims processing department.

B.  

Required all laptops to connect to the VPN before accessing email.

C.  

Implement cloud-based content filtering with sandboxing capabilities.

D.  

Install a mail gateway to scan incoming messages and strip attachments before they reach the mailbox.

Discussion 0
Question # 34

An IT administrator is reviewing all the servers in an organization and notices that a server is missing crucial practice against a recent exploit that could gain root access.

Which of the following describes the administrator’s discovery?

Options:

A.  

A vulnerability

B.  

A threat

C.  

A breach

D.  

A risk

Discussion 0
Question # 35

A new web server must comply with new secure-by-design principles and PCI DSS. This includes mitigating the risk of an on-path attack. A security analyst is reviewing the following web server configuration:

Question # 35

Which of the following ciphers should the security analyst remove to support the business requirements?

Options:

A.  

TLS_AES_128_CCM_8_SHA256

B.  

TLS_DHE_DSS_WITH_RC4_128_SHA

C.  

TLS_CHACHA20_POLY1305_SHA256

D.  

TLS_AES_128_GCM_SHA256

Discussion 0
Question # 36

A satellite communications ISP frequently experiences outages and degraded modes of operation over one of its legacy satellite links due to the use of deprecated hardware and software. Three days per week, on average, a contracted company must follow a checklist of 16 different high-latency commands that must be run in serial to restore nominal performance. The ISP wants this process to be automated.

Which of the following techniques would be BEST suited for this requirement?

Options:

A.  

Deploy SOAR utilities and runbooks.

B.  

Replace the associated hardware.

C.  

Provide the contractors with direct access to satellite telemetry data.

D.  

Reduce link latency on the affected ground and satellite segments.

Discussion 0
Question # 37

A security architect works for a manufacturing organization that has many different branch offices. The architect is looking for a way to reduce traffic and ensure the branch offices receive the latest copy of revoked certificates issued by the CA at the organization’s headquarters location. The solution must also have the lowest power requirement on the C

A.  

Which of the following is the BEST solution?

Options:

A.  

Deploy an RA on each branch office.

B.  

Use Delta CRLs at the branches.

C.  

Configure clients to use OCSP.

D.  

Send the new CRLs by using GPO.

Discussion 0
Question # 38

A shipping company that is trying to eliminate entire classes of threats is developing an SELinux policy to ensure its custom Android devices are used exclusively for package tracking.

After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to run?

Options:

A.  

Protecting

B.  

Permissive

C.  

Enforcing

D.  

Mandatory

Discussion 0
Question # 39

A company has decided to purchase a license for software that is used to operate a mission-critical process. The third-party developer is new to the industry but is delivering what the company needs at this time.

Which of the following BEST describes the reason why utilizing a source code escrow will reduce the operational risk to the company if the third party stops supporting the application?

Options:

A.  

The company will have access to the latest version to continue development.

B.  

The company will be able to force the third-party developer to continue support.

C.  

The company will be able to manage the third-party developer’s development process.

D.  

The company will be paid by the third-party developer to hire a new development team.

Discussion 0
Question # 40

An energy company is required to report the average pressure of natural gas used over the past quarter. A PLC sends data to a historian server that creates the required reports.

Which of the following historian server locations will allow the business to get the required reports in an ОТ and IT environment?

Options:

A.  

In the ОТ environment, use a VPN from the IT environment into the ОТ environment.

B.  

In the ОТ environment, allow IT traffic into the ОТ environment.

C.  

In the IT environment, allow PLCs to send data from the ОТ environment to the IT environment.

D.  

Use a screened subnet between the ОТ and IT environments.

Discussion 0
Question # 41

An enterprise is deploying APIs that utilize a private key and a public key to ensure the connection string is protected. To connect to the API, customers must use the private key.

Which of the following would BEST secure the REST API connection to the database while preventing the use of a hard-coded string in the request string?

Options:

A.  

Implement a VPN for all APIs.

B.  

Sign the key with DS

A.  

C.  

Deploy MFA for the service accounts.

D.  

Utilize HMAC for the keys.

Discussion 0
Question # 42

A company wants to protect its intellectual property from theft. The company has already applied ACLs and DACs.

Which of the following should the company use to prevent data theft?

Options:

A.  

Watermarking

B.  

DRM

C.  

NDA

D.  

Access logging

Discussion 0
Question # 43

A security analyst notices a number of SIEM events that show the following activity:

Question # 43

Which of the following response actions should the analyst take FIRST?

Options:

A.  

Disable powershell.exe on all Microsoft Windows endpoints.

B.  

Restart Microsoft Windows Defender.

C.  

Configure the forward proxy to block 40.90.23.154.

D.  

Disable local administrator privileges on the endpoints.

Discussion 0
Question # 44

A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:

Unauthorized insertions into application development environments

Authorized insiders making unauthorized changes to environment configurations

Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)

Options:

A.  

Perform static code analysis of committed code and generate summary reports.

B.  

Implement an XML gateway and monitor for policy violations.

C.  

Monitor dependency management tools and report on susceptible third-party libraries.

D.  

Install an IDS on the development subnet and passively monitor for vulnerable services.

E.  

Model user behavior and monitor for deviations from normal.

F.  

Continuously monitor code commits to repositories and generate summary logs.

Discussion 0
Question # 45

After a security incident, a network security engineer discovers that a portion of the company’s sensitive external traffic has been redirected through a secondary ISP that is not normally used.

Which of the following would BEST secure the routes while allowing the network to function in the event of a single provider failure?

Options:

A.  

Disable BGP and implement a single static route for each internal network.

B.  

Implement a BGP route reflector.

C.  

Implement an inbound BGP prefix list.

D.  

Disable BGP and implement OSP

F.  

Discussion 0
Get CAS-004 dumps and pass your exam in 24 hours!

Free Exams Sample Questions