Test Online Free CompTIA CAS-004 Exam Questions and Answers

The questions for CAS-004 were last updated On Mar.07 2024

Get CAS-004 Full Access
 / 2

Question No : 1
A security engineer needs to implement a solution to increase the security posture of user endpoints by providing more visibility and control over local administrator accounts. The endpoint security team is overwhelmed with alerts and wants a solution that has minimal operational burdens. Additionally, the solution must maintain a positive user experience after implementation.
Which of the following is the BEST solution to meet these objectives?

Answer:
Explanation:
Reference: https://www.cyberark.com/what-is/privileged-access-management/

Question No : 2
A security analyst discovered that the company’s WAF was not properly configured.
The main web server was breached, and the following payload was found in one of the malicious requests:



Which of the following would BEST mitigate this vulnerability?

Answer:
Explanation:
Reference: https://hdivsecurity.com/owasp-xml-external-entities-xxe

Question No : 3
Which of the following is required for an organization to meet the ISO 27018 standard?

Answer:

Question No : 4
A security analyst notices a number of SIEM events that show the following activity:



Which of the following response actions should the analyst take FIRST?

Answer:
Explanation:
top the data exfiltration and sever all malicious traffic first, and then clean up the internal mess.

Question No : 5
Despite the fact that ten new API servers were added, the load across servers was heavy at peak times.
Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?

Answer:

Question No : 6
A security is assisting the marketing department with ensuring the security of the organization’s social media platforms.
The two main concerns are:
The Chief marketing officer (CMO) email is being used department wide as the username
The password has been shared within the department
Which of the following controls would be BEST for the analyst to recommend?

Answer:

Question No : 7
Ann, a CIRT member, is conducting incident response activities on a network that consists of several hundred virtual servers and thousands of endpoints and users. The network generates more than 10,000 log messages per second. The enterprise belong to a large, web-based cryptocurrency startup, Ann has distilled the relevant information into an easily digestible report for executive management. However, she still needs to collect evidence of the intrusion that caused the incident .
Which of the following should Ann use to gather the required information?

Answer:

Question No : 8
An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented.
Which of the following processes can be used to identify potential prevention recommendations?

Answer:

Question No : 9
A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.
The technician will define this threat as:

Answer:
Explanation:
Reference: https://www.internetsociety.org/deploy360/tls/basics/

Question No : 10
An enterprise is undergoing an audit to review change management activities when promoting code to production.
The audit reveals the following:
• Some developers can directly publish code to the production environment.
• Static code reviews are performed adequately.
• Vulnerability scanning occurs on a regularly scheduled basis per policy.
Which of the following should be noted as a recommendation within the audit report?

Answer:

 / 2
  TOP 50 Exam Questions
Exam