Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CAS-004 CompTIA SecurityX Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CAS-004 Practice Questions

CompTIA SecurityX Certification Exam

Last Update 1 day ago
Total Questions : 619

Dive into our fully updated and stable CAS-004 practice test platform, featuring all the latest CompTIA CASP exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free CompTIA CASP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CAS-004. Use this test to pinpoint which areas you need to focus your study on.

CAS-004 PDF

CAS-004 PDF (Printable)
$43.75
$124.99

CAS-004 Testing Engine

CAS-004 PDF (Printable)
$50.75
$144.99

CAS-004 PDF + Testing Engine

CAS-004 PDF (Printable)
$63.7
$181.99
Question # 46

A company processes data subject to NDAs with partners that define the processing and storage constraints for the covered data. The agreements currently do not permit moving the covered data to the cloud, and the company would like to renegotiate the terms of the agreements.

Which of the following would MOST likely help the company gain consensus to move the data to the cloud?

Options:

A.  

Designing data protection schemes to mitigate the risk of loss due to multitenancy

B.  

Implementing redundant stores and services across diverse CSPs for high availability

C.  

Emulating OS and hardware architectures to blur operations from CSP view

D.  

Purchasing managed FIM services to alert on detected modifications to covered data

Discussion 0
Question # 47

A customer reports being unable to connect to a website at www.test.com to consume services. The customer notices the web application has the following published cipher suite:

Question # 47

Which of the following is the MOST likely cause of the customer’s inability to connect?

Options:

A.  

Weak ciphers are being used.

B.  

The public key should be using ECDS

A.  

C.  

The default should be on port 80.

D.  

The server name should be test.com.

Discussion 0
Question # 48

A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.

The technician will define this threat as:

Options:

A.  

a decrypting RSA using obsolete and weakened encryption attack.

B.  

a zero-day attack.

C.  

an advanced persistent threat.

D.  

an on-path attack.

Discussion 0
Question # 49

A security analyst is reviewing the following output:

Question # 49

Which of the following would BEST mitigate this type of attack?

Options:

A.  

Installing a network firewall

B.  

Placing a WAF inline

C.  

Implementing an IDS

D.  

Deploying a honeypot

Discussion 0
Question # 50

A small company recently developed prototype technology for a military program. The company’s security engineer is concerned about potential theft of the newly developed, proprietary information.

Which of the following should the security engineer do to BEST manage the threats proactively?

Options:

A.  

Join an information-sharing community that is relevant to the company.

B.  

Leverage the MITRE ATT&CK framework to map the TTR.

C.  

Use OSINT techniques to evaluate and analyze the threats.

D.  

Update security awareness training to address new threats, such as best practices for data security.

Discussion 0
Question # 51

An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented.

Which of the following processes can be used to identify potential prevention recommendations?

Options:

A.  

Detection

B.  

Remediation

C.  

Preparation

D.  

Recovery

Discussion 0
Question # 52

A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application.

Which of the following is the MOST likely cause?

Options:

A.  

The user agent client is not compatible with the WA

F.  

B.  

A certificate on the WAF is expired.

C.  

HTTP traffic is not forwarding to HTTPS to decrypt.

D.  

Old, vulnerable cipher suites are still being used.

Discussion 0
Question # 53

A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization.

Which of the following actions would BEST resolve the issue? (Choose two.)

Options:

A.  

Conduct input sanitization.

B.  

Deploy a SIEM.

C.  

Use containers.

D.  

Patch the OS

E.  

Deploy a WA

F.  

F.  

Deploy a reverse proxy

G.  

Deploy an IDS.

Discussion 0
Question # 54

Clients are reporting slowness when attempting to access a series of load-balanced APIs that do not require authentication. The servers that host the APIs are showing heavy CPU utilization. No alerts are found on the WAFs sitting in front of the APIs.

Which of the following should a security engineer recommend to BEST remedy the performance issues in a timely manner?

Options:

A.  

Implement rate limiting on the API.

B.  

Implement geoblocking on the WA

F.  

C.  

Implement OAuth 2.0 on the API.

D.  

Implement input validation on the API.

Discussion 0
Question # 55

A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log.

Which of the following actions would BEST address the potential risks by the activity in the logs?

Options:

A.  

Alerting the misconfigured service account password

B.  

Modifying the AllowUsers configuration directive

C.  

Restricting external port 22 access

D.  

Implementing host-key preferences

Discussion 0
Question # 56

An organization recently started processing, transmitting, and storing its customers’ credit card information. Within a week of doing so, the organization suffered a massive breach that resulted in the exposure of the customers’ information.

Which of the following provides the BEST guidance for protecting such information while it is at rest and in transit?

Options:

A.  

NIST

B.  

GDPR

C.  

PCI DSS

D.  

ISO

Discussion 0
Question # 57

A university issues badges through a homegrown identity management system to all staff and students. Each week during the summer, temporary summer school students arrive and need to be issued a badge to access minimal campus resources. The security team received a report from an outside auditor indicating the homegrown system is not consistent with best practices in the security field and leaves the institution vulnerable.

Which of the following should the security team recommend FIRST?

Options:

A.  

Investigating a potential threat identified in logs related to the identity management system

B.  

Updating the identity management system to use discretionary access control

C.  

Beginning research on two-factor authentication to later introduce into the identity management system

D.  

Working with procurement and creating a requirements document to select a new IAM system/vendor

Discussion 0
Question # 58

A company is moving most of its customer-facing production systems to the cloud-facing production systems to the cloud. IaaS is the service model being used. The Chief Executive Officer is concerned about the type of encryption available and requires the solution must have the highest level of security.

Which of the following encryption methods should the cloud security engineer select during the implementation phase?

Options:

A.  

Instance-based

B.  

Storage-based

C.  

Proxy-based

D.  

Array controller-based

Discussion 0
Question # 59

Device event logs sources from MDM software as follows:

Question # 59

Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?

Options:

A.  

Malicious installation of an application; change the MDM configuration to remove application ID 1220.

B.  

Resource leak; recover the device for analysis and clean up the local storage.

C.  

Impossible travel; disable the device’s account and access while investigating.

D.  

Falsified status reporting; remotely wipe the device.

Discussion 0
Question # 60

An organization is designing a network architecture that must meet the following requirements:

Users will only be able to access predefined services.

Each user will have a unique allow list defined for access.

The system will construct one-to-one subject/object access paths dynamically.

Which of the following architectural designs should the organization use to meet these requirements?

Options:

A.  

Peer-to-peer secure communications enabled by mobile applications

B.  

Proxied application data connections enabled by API gateways

C.  

Microsegmentation enabled by software-defined networking

D.  

VLANs enabled by network infrastructure devices

Discussion 0
Get CAS-004 dumps and pass your exam in 24 hours!

Free Exams Sample Questions