Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CAS-004 CompTIA SecurityX Certification Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CAS-004 Practice Questions

CompTIA SecurityX Certification Exam

Last Update 1 day ago
Total Questions : 619

Dive into our fully updated and stable CAS-004 practice test platform, featuring all the latest CompTIA CASP exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free CompTIA CASP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CAS-004. Use this test to pinpoint which areas you need to focus your study on.

CAS-004 PDF

CAS-004 PDF (Printable)
$43.75
$124.99

CAS-004 Testing Engine

CAS-004 PDF (Printable)
$50.75
$144.99

CAS-004 PDF + Testing Engine

CAS-004 PDF (Printable)
$63.7
$181.99
Question # 91

During a review of events, a security analyst notes that several log entries from the FIM system identify changes to firewall rule sets. While coordinating a response to the FIM entries, the analyst receives alerts from the DLP system that indicate an employee is sending sensitive data to an external email address. Which of the following would be the most relevant to review in order to gain a better understanding of whether these events are associated with an attack?

Options:

A.  

Configuration management tool

B.  

Intrusion prevention system

C.  

Mobile device management platform

D.  

Firewall access control list

E.  

NetFlow logs

Discussion 0
Question # 92

A security engineer is re-architecting a network environment that provides regional electric distribution services. During a pretransition baseline assessment, the engineer identified the following security-relevant characteristics of the environment:

• Enterprise IT servers and supervisory industrial systems share the same subnet.

• Supervisory controllers use the 750MHz band to direct a portion of fielded PLCs.

• Command and telemetry messages from industrial control systems are unencrypted and unauthenticated.

Which of the following re-architecture approaches would be best to reduce the company's risk?

Options:

A.  

Implement a one-way guard between enterprise IT services and mission-critical systems, obfuscate legitimate RF signals by broadcasting noise, and implement modern protocols to authenticate ICS messages.

B.  

Characterize safety-critical versus non-safety-critical systems, isolate safety-critical systems from other systems, and increase the directionality of RF links in the field.

C.  

Create a new network segment for enterprise IT servers, configure NGFW to enforce a well-defined segmentation policy, and implement a WIDS to monitor the spectrum.

D.  

Segment supervisory controllers from field PLCs, disconnect the entire network from the internet, and use only the 750MHz link for controlling energy distribution services.

Discussion 0
Question # 93

An organization developed a containerized application. The organization wants to run the application in the cloud and automatically scale it based on demand. The security operations team would like to use container orchestration but does not want to assume patching responsibilities. Which of the following service models best meets these requirements?

Options:

A.  

PaaS

B.  

SaaS

C.  

laaS

D.  

MaaS

Discussion 0
Question # 94

A software development company is implementing a SaaS-based password vault for customers to use. The requirements for the password vault include:

Vault encryption using a variable block and key size

Resistance to brute-force attacks

Which of the following should be implemented to meet these requirements? (Select two.)

Options:

A.  

PBKDF2

B.  

RC5

C.  

AES

D.  

P256

E.  

ECDSA

F.  

RIPEMD

Discussion 0
Question # 95

A developer is creating a new mobile application for a company. The application usesREST APIandTLS 1.2to communicate securely with the external back-end server. Due to this configuration, the company is concerned aboutHTTPS interception attacks. Which of the following would be thebestsolution against this type of attack?

Options:

A.  

Cookies

B.  

Wildcard certificates

C.  

HSTS

D.  

Certificate pinning

Discussion 0
Question # 96

An organization is working to secure its development process to ensure developers cannot deploy artifacts directly into the production environment. Which of the following security practice recommendations would be the best to accomplish this objective?

Options:

A.  

Implement least privilege access to all systems.

B.  

Roll out security awareness training for all users.

C.  

Set up policies and systems with separation of duties.

D.  

Enforce job rotations for all developers and administrators.

E.  

Utilize mandatory vacations for all developers.

F.  

Review all access to production systems on a quarterly basis.

Discussion 0
Question # 97

A security administrator is setting up a virtualization solution that needs to run services from a single host. Each service should be the only one running in its environment. Each environment needs to have its own operating system as a base but share the kernel version and properties of the running host. Which of the following technologies would best meet these requirements?

Options:

A.  

Containers

B.  

Type 1 hypervisor

C.  

Type 2 hypervisor

D.  

Virtual desktop infrastructure

E.  

Emulation

Discussion 0
Question # 98

Signed applications reduce risks by:

Options:

A.  

encrypting the application's data on the device.

B.  

requiring the developer to use code-level hardening techniques.

C.  

providing assurance that the application is using unmodified source code.

D.  

costing the developer money to publish, which reduces the likelihood of malicious intent.

Discussion 0
Question # 99

A senior cybersecurity engineer is solving a digital certificate issue in which the CA denied certificate issuance due to failed subject identity validation. At which of the following steps within the PKI enrollment process would the denial have occurred?

Options:

A.  

RA

B.  

OCSP

C.  

CA

D.  

IdP

Discussion 0
Question # 100

Which of the followingbestdescribes a common use case for homomorphic encryption?

Options:

A.  

Processing data on a server after decrypting in order to prevent unauthorized access in transit

B.  

Maintaining the confidentiality of data both at rest and in transit to and from a CSP for processing

C.  

Transmitting confidential data to a CSP for processing on a large number of resources without revealing information

D.  

Storing proprietary data across multiple nodes in a private cloud to prevent access by unauthenticated users

Discussion 0
Question # 101

A compliance officer is responsible for selecting the right governance framework to protect individuals' data. Which of the following is the appropriate framework for the company to consult when collecting international user data for the purpose of processing credit cards?

Options:

A.  

ISO 27001

B.  

COPPA

C.  

NIST 800-53

D.  

PCI DSS

Discussion 0
Question # 102

A security engineer investigates an incident and determines that a rogue device is on the network. Further investigation finds that an employee's personal device has been set up to access company resources and does not comply with standard security controls. Which of the following should the security engineer recommend to reduce the risk of future reoccurrence?

Options:

A.  

Require device certificates to access company resources.

B.  

Enable MFA at the organization's SSO portal.

C.  

Encrypt all workstation hard drives.

D.  

Hide the company wireless SSI

D.  

Discussion 0
Question # 103

The IT team suggests the company would save money by using self-signed certificates, but the security team indicates the company must use digitally signed third-party certificates. Which of the following is a valid reason to pursue the security team's recommendation?

Options:

A.  

PKCS #10 is still preferred over PKCS #12.

B.  

Private-key CSR signage prevents on-path interception.

C.  

There is more control in using a local certificate over a third-party certificate.

D.  

There is minimal benefit in using a certificate revocation list.

Discussion 0
Question # 104

During a vendor assessment, an analyst reviews a listing of the complementary user entity controls included in the audit report. Which of the following is the most important aspect to consider when reviewing this list with the security team?

Options:

A.  

How the organization will implement and monitor the user entity controls

B.  

How the CSP performs the controls on behalf of the user entity

C.  

How the organization should monitor the CSP's execution of the user entity controls

D.  

How the user entity will audit the CSP's implementation of the user entity controls

Discussion 0
Question # 105

in a situation where the cost of anti-malware exceeds the potential loss from a malware threat, which of the following is the most cost-effective risk response?

Options:

A.  

Risk transfer

B.  

Risk mitigation

C.  

Risk acceptance

D.  

Risk avoidance

Discussion 0
Get CAS-004 dumps and pass your exam in 24 hours!

Free Exams Sample Questions