Logo

Win IT Exam with Last Dumps 2023


CompTIA CAS-004 Exam

Page 2/10
Viewing Questions 11 20 out of 96 Questions
20.00%

Question 11
Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext?




Question 12
A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company's services to ensure false positives do not drop legitimate traffic.
Which of the following would satisfy the requirement?




Question 13
A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services.
Which of the following should be modified to prevent the issue from reoccurring?




Question 14
A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped.
The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.
The technician will define this threat as:




Question 15
A security engineer thinks the development team has been hard-coding sensitive environment variables in its code.
Which of the following would BEST secure the company's CI/CD pipeline?




Question 16
A small company recently developed prototype technology for a military program. The company's security engineer is concerned about potential theft of the newly developed, proprietary information.
Which of the following should the security engineer do to BEST manage the threats proactively?




Question 17
A security engineer has been asked to close all non-secure connections from the corporate network. The engineer is attempting to understand why the corporateUTM will not allow users to download email via IMAPS. The engineer formulates a theory and begins testing by creating the firewall ID 58, and users are able to download emails correctly by using IMAP instead. The network comprises three VLANs:
Which of the following should the security engineer do to ensure IMAPS functions properly on the corporate user network?
Image CAS-004_17Q.png related to the CompTIA CAS-004 Exam




Question 18
A security analyst is reviewing network connectivity on a Linux workstation and examining the active TCP connections using the command line.
Which of the following commands would be the BEST to run to view only active Internet connections?




Question 19
A shipping company that is trying to eliminate entire classes of threats is developing an SELinux policy to ensure its custom Android devices are used exclusively for package tracking.
After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to run?




Question 20
A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.
log: graphic.
ssh_auth_log.
Which of the following actions would BEST address the potential risks posed by the activity in the logs?