Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the CompTIA CASP CAS-004 Questions and answers with ValidTests

Exam CAS-004 All Questions
Exam CAS-004 Premium Access

View all detail and faqs for the CAS-004 exam

Viewing page 6 out of 13 pages
Viewing questions 76-90 out of questions
Questions # 76:

While investigating a security event, an analyst finds evidence that a user opened an email attachment from an unknown source. Shortly after the user opened the attachment, a group of servers experienced a large amount of network and resource activity. Upon investigating the servers, the analyst discovers the servers were encrypted by ransomware that is demanding payment within 48 hours or all data will be destroyed. The company has no response plans for ransomware.

Which of the following is the NEXT step the analyst should take after reporting the incident to the management team?

Options:

A.

Pay the ransom within 48 hours.

B.

Isolate the servers to prevent the spread.

C.

Notify law enforcement.

D.

Request that the affected servers be restored immediately.

Expert Solution
Questions # 77:

A company is losing hundreds of mobile devices each year due to insider theft. The company wants to prevent these devices from functioning off-site to deter theft, but does not want to prevent the reuse of a device the next day if a device was accidentally taken off-site. Which of the following would best solve this issue?

Options:

A.

Remote wipe any device taken off-site.

B.

Implement full device encryption.

C.

Create a geofence around the warehouse.

D.

Enable location services to monitor the mobile devices.

Expert Solution
Questions # 78:

A security technician is trying to connect a remote site to the central office over a site-to-site VPN. The technician has verified the source and destination IP addresses are correct, but the technician is unable to get the remote site to connect. The following error message keeps repeating:

"An error has occurred during Phase 1 handshake. Deleting keys and retrying..."

Which of the following is most likely the reason the connection is failing?

Options:

A.

The IKE hashing algorithm uses different key lengths on each VPN device.

B.

The IPSec settings allow more than one cipher suite on both devices.

C.

The Diffie-Hellman group on both sides matches but is a legacy group.

D.

The remote VPN is attempting to connect with a protocol other than SSL/TLS.

Expert Solution
Questions # 79:

During a forensics investigation, a security professional needs to identify ISO images in a computer system where the ISO extension has been purposely removed or replaced with another extension. Which of the following tools will accomplish this task?

Options:

A.

file

B.

Isof

C.

ldd

D.

OllyDbg

Expert Solution
Questions # 80:

An organization is working to secure its development process to ensure developers cannot deploy artifacts directly into the production environment. Which of the following security practice recommendations would be the best to accomplish this objective?

Options:

A.

Implement least privilege access to all systems.

B.

Roll out security awareness training for all users.

C.

Set up policies and systems with separation of duties.

D.

Enforce job rotations for all developers and administrators.

E.

Utilize mandatory vacations for all developers.

F.

Review all access to production systems on a quarterly basis.

Expert Solution
Questions # 81:

An organization found a significant vulnerability associated with a commonly used package in a variety of operating systems. The organization develops a registry of software dependencies to facilitate incident response activities. As part of the registry, the organization creates hashes of packages that have been formally vetted. Which of the following attack vectors does this registry address?

Options:

A.

Supply chain attack

B.

Cipher substitution attack

C.

Side-channel analysis

D.

On-path attack

E.

Pass-the-hash attack

Expert Solution
Questions # 82:

A security architect is improving a healthcare organization's security posture. Most of the software is cloud-based, but some old applications are still running on a server on-site. Medical devices using such applications require very low latency. The most important consideration isconfidentiality, followed byavailability, and thenintegrity. Which of the following is thefirst stepthe security architect should implement to protect PII?

Options:

A.

Move the application server to a network load balancing cluster.

B.

Move the application to a CSP.

C.

Enable encryption at rest on medical devices.

D.

Install FIM on the application server.

Expert Solution
Questions # 83:

A company has been the target of LDAP injections, as well as brute-force, whaling, and spear-phishing attacks. The company is concerned about ensuring continued system access. The company has already implemented a SSO system with strong passwords. Which of the following additional controls should the company deploy?

Options:

A.

Two-factor authentication

B.

Identity proofing

C.

Challenge questions

D.

Live identity verification

Expert Solution
Questions # 84:

A security engineer is reviewing Apache web server logs and has identified the following pattern in the log:

GET https://example.com/image5/../../etc/passwd HTTP/1.1 200 OK

The engineer has also reviewed IDS and firewall logs and established a correlation to an external IP address. Which of the following can be determined regarding the vulnerability and response?

Options:

A.

A cross-site scripting attack was successful at reading the /etc/passwd file, and the system should avoid passing user-supplied input to REST API.

B.

A cross-site request forgery attack was successful at reading the /etc/passwd file, and the system should avoid passing user-supplied input to HTTP POST commands.

C.

A directory traversal attack was successful at reading the /etc/passwd file, and the system should avoid passing user-supplied input to the filesystem.

D.

A brute-force authentication attempt was successful, and the system should implement salting as part of the password hashing algorithm.

Expert Solution
Questions # 85:

A hospital has fallen behind with patching known vulnerabilities due to concerns that patches may cause disruptions in the availability of data and impact patient care. The hospital does not have a tracking solution in place to audit whether systems have been updated or to track the length of time between notification of the weakness and patch completion Since tracking is not in place the hospital lacks accountability with regard to who is responsible for these activities and the timeline of patching efforts. Which of the following should the hospital do first to mitigate this risk?

Options:

A.

Complete a vulnerability analysis

B.

Obtain guidance from the health ISAC

C.

Purchase a ticketing system for auditing efforts

D.

Ensure CVEs are current

E.

Train administrators on why patching is important

Expert Solution
Questions # 86:

A new requirement for legislators has forced a government security team to develop a validation process to verify the integrity of a downloaded file and the sender of the file Which of the following is the BEST way for the security team to comply with this requirement?

Options:

A.

Digital signature

B.

Message hash

C.

Message digest

D.

Message authentication code

Expert Solution
Questions # 87:

A company recently deployed new servers to create an additional cluster to support a new application. The corporate security policy states that all new servers must be resilient. The new cluster has a high-availability configuration for a smooth failover. The failover was successful following a recent power outage, but both clusters lost critical data, which impacted recovery time. Which of the following needs to be configured to help ensure minimal delays when power outages occur in the future?

Options:

A.

Replication

B.

Caching

C.

Containerization

D.

Redundancy

E.

High availability

Expert Solution
Questions # 88:

An organization handles sensitive information that must be displayed on call center technicians’ screens to verify the identities of remote callers. The technicians use three randomly selected fields of information to complete the identity verification. Some of the fields contain PII that are unique identifiers for the remote callers. Which of the following should be implemented to identify remote callers while also reducing the risk that technicians could improperly use the identification information?

Options:

A.

Data masking

B.

Encryption

C.

Tokenization

D.

Scrubbing

Expert Solution
Questions # 89:

In support of disaster recovery objectives, a third party agreed to provide 99.999% uptime. Recently, a hardware failure impacted a firewall without service degradation. Which of the following resiliency concepts was most likely in place?

Options:

A.

Clustering

B.

High availability

C.

Redundancy

D.

Replication

Expert Solution
Questions # 90:

A security architect discovers the following while reviewing code for a company’s website:

selection = "SELECT Item FROM Catalog WHERE ItemID * " & Request("ItemID”)

Which of the following should the security architect recommend?

Options:

A.

Client-side processing

B.

Query parameterization

C.

Data normalization

D.

Escape character blocking

E.

URL encoding

Expert Solution
Viewing page 6 out of 13 pages
Viewing questions 76-90 out of questions