Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CAS-004 CompTIA SecurityX Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CAS-004 Practice Questions

CompTIA SecurityX Certification Exam

Last Update 1 day ago
Total Questions : 619

Dive into our fully updated and stable CAS-004 practice test platform, featuring all the latest CompTIA CASP exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free CompTIA CASP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CAS-004. Use this test to pinpoint which areas you need to focus your study on.

CAS-004 PDF

CAS-004 PDF (Printable)
$43.75
$124.99

CAS-004 Testing Engine

CAS-004 PDF (Printable)
$50.75
$144.99

CAS-004 PDF + Testing Engine

CAS-004 PDF (Printable)
$63.7
$181.99
Question # 76

A security engineer receives reports through the organization's bug bounty program about remote code execution in a specific component in a custom application. Management wants to properly secure the component and proactively avoid similar issues. Which of the following is the best approach to uncover additional vulnerable paths in the application?

Options:

A.  

Implement fuzz testing focused on the component and inputs uncovered by the bug bounty program.

B.  

Leverage a software composition analysis tool to find all known vulnerabilities in dependencies.

C.  

Use a vulnerability scanner to perform multiple types of network scans to look for vulnerabilities.

D.  

Utilize a network traffic analyzer to find malicious packet combinations that lead to remote code execution.

E.  

Run an exploit framework with all payloads against the application to see if it is able to gain access.

Discussion 0
Question # 77

A DNS forward lookup zone named complia.org must:

• Ensure the DNS is protected from on-path attacks.

• Ensure zone transfers use mutual authentication and are authenticated and negotiated.

Which of the following should the security architect configure to meet these requirements? (Select two).

Options:

A.  

Public keys

B.  

Conditional forwarders

C.  

Root hints

D.  

DNSSEC

E.  

CNAME records

F.  

SRV records

Discussion 0
Question # 78

A recent security assessment generated a recommendation to transition Wi-Fi to WPA2/WPA3 Enterprise requiring EAP-TLS. Which of the following conditions must be met for the organization's mobile devices to be able to successfully join the corporate wireless network?

Options:

A.  

Client computer X.509 certificates have been installed.

B.  

Supplicants are configured to provide a 64-bit authenticator.

C.  

A hardware TOTP token has been issued to mobile users.

D.  

The device's IPSec configuration matches the VPN concentrator.

Discussion 0
Question # 79

A company has been the target of LDAP injections, as well as brute-force, whaling, and spear-phishing attacks. The company is concerned about ensuring continued system access. The company has already implemented a SSO system with strong passwords. Which of the following additional controls should the company deploy?

Options:

A.  

Two-factor authentication

B.  

Identity proofing

C.  

Challenge questions

D.  

Live identity verification

Discussion 0
Question # 80

A user forwarded a suspicious email to a security analyst for review. The analyst examined the email and found that neither the URL nor the attachment showed any indication of malicious activities. Which of the following intelligence collection methods should the analyst use to confirm the legitimacy of the email?

Options:

A.  

HUMINT

B.  

UEBA

C.  

OSINT

D.  

RACE

Discussion 0
Question # 81

An organization wants to implement an access control system based on its data classification policy that includes the following data types:

Confidential

Restricted

Internal

Public

The access control system should support SSO federation to map users into groups. Each group should only access systems that process and store data at the classification assigned to the group. Which of the following should the organization implement to enforce its requirements with minimal impact to systems and resources?

Options:

A.  

A tagging strategy in which all resources are assigned a tag based on the data classification type, and a system that enforces attribute-based access control.

B.  

Role-based access control that maps data types to internal roles, which are defined in the human resources department's source of truth system.

C.  

Network microsegmentation based on data types, and a network access control system enforcing mandatory access control based on the user principal.

D.  

A rule-based access control strategy enforced by the SSO system with rules managed by the internal LDAP and applied on a per-system basis.

Discussion 0
Question # 82

A security engineer is working for a service provider and analyzing logs and reports from a new EDR solution, which is installed on a small group of workstations. Later that day, another security engineer receives an email from two developers reporting the software being used for development activities is now blocked. The developers have not made any changes to the software being used. Which of the following is the EDR reporting?

Options:

A.  

True positive

B.  

False negative

C.  

False positive

D.  

True negative

Discussion 0
Question # 83

A new requirement for legislators has forced a government security team to develop a validation process to verify the integrity of a downloaded file and the sender of the file Which of the following is the BEST way for the security team to comply with this requirement?

Options:

A.  

Digital signature

B.  

Message hash

C.  

Message digest

D.  

Message authentication code

Discussion 0
Question # 84

An loT device implements an encryption module built within its SoC where the asymmetric private key has been defined in a write-once read-many portion of the SoC hardware Which of the following should the loT manufacture do if the private key is compromised?

Options:

A.  

Use over-the-air updates to replace the private key

B.  

Manufacture a new loT device with a redesigned SoC

C.  

Replace the public portion of the loT key on its servers

D.  

Release a patch for the SoC software

Discussion 0
Question # 85

An incident response team completed recovery from offline backup for several workstations. The workstations were subjected to a ransomware attack after users fell victim to a spear-phishing campaign, despite a robust training program. Which of the following questions should be considered during the lessons-learned phase to most likely reduce the risk of reoccurrence? (Select two).

Options:

A.  

Are there opportunities for legal recourse against the originators of the spear-phishing campaign?

B.  

What internal and external stakeholders need to be notified of the breach?

C.  

Which methods can be implemented to increase speed of offline backup recovery?

D.  

What measurable user behaviors were exhibited that contributed to the compromise?

E.  

Which technical controls, if implemented, would provide defense when user training fails?

F.  

Which user roles are most often targeted by spear phishing attacks?

Discussion 0
Question # 86

A PKI engineer is defining certificate templates for an organization's CA and would like to ensure at least two of the possible SAN certificate extension fields populate for documentation purposes. Which of the following are explicit options within this extension? (Select two).

Options:

A.  

Type

B.  

Email

C.  

OCSP responder

D.  

Registration authority

E.  

Common Name

F.  

DNS name

Discussion 0
Question # 87

Which of the following security features do email signatures provide?

Options:

A.  

Non-repudiation

B.  

Body encryption

C.  

Code signing

D.  

Sender authentication

E.  

Chain of custody

Discussion 0
Question # 88

A company recently acquired a SaaS company and performed a gap analysis. The results of the gap analysis indicate security controls are absent throughout the SDLC and have led to several vulnerable production releases. Which of the following security tools best reduces the risk of vulnerable code being pushed to production in the future?

Options:

A.  

Static application security testing

B.  

Regression testing

C.  

Code signing

D.  

Sandboxing

Discussion 0
Question # 89

An employee's device was missing for 96 hours before being reported. The employee called the help desk to ask for another device Which of the following phases of the incident response cycle needs improvement?

Options:

A.  

Containment

B.  

Preparation

C.  

Resolution

D.  

Investigation

Discussion 0
Question # 90

Application owners are reporting performance issues with traffic using port 1433 from the cloud environment. A security administrator has various pcap files to analyze the data between the related source and destination servers. Which of the following tools should be used to help troubleshoot the issue?

Options:

A.  

Fuzz testing

B.  

Wireless vulnerability scan

C.  

Exploit framework

D.  

Password cracker

E.  

Protocol analyzer

Discussion 0
Get CAS-004 dumps and pass your exam in 24 hours!

Free Exams Sample Questions