CAS-004 Free Exam Study Guide! (Updated 173 Questions) [Q18-Q36]

Rate this post

CAS-004 Free Exam Study Guide! (Updated 173 Questions)

CAS-004 Dumps for CompTIA CASP Certified Exam Questions and Answer

CompTIA CASP+ Exam Certification Details:

Exam Name CompTIA Advanced Security Practitioner (CASP+)
Books / Training CASP+ CAS-004
Exam Price $466 (USD)
Number of Questions 90
Schedule Exam CompTIA Marketplace
Pearson VUE
Exam Code CAS-004

 

NEW QUESTION 18
An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented.
Which of the following processes can be used to identify potential prevention recommendations?

 
 
 
 

NEW QUESTION 19
A satellite communications ISP frequently experiences outages and degraded modes of operation over one of its legacy satellite links due to the use of deprecated hardware and software. Three days per week, on average, a contracted company must follow a checklist of 16 different high-latency commands that must be run in serial to restore nominal performance. The ISP wants this process to be automated.
Which of the following techniques would be BEST suited for this requirement?

 
 
 
 

NEW QUESTION 20
While investigating a security event, an analyst finds evidence that a user opened an email attachment from an unknown source. Shortly after the user opened the attachment, a group of servers experienced a large amount of network and resource activity. Upon investigating the servers, the analyst discovers the servers were encrypted by ransomware that is demanding payment within 48 hours or all data will be destroyed. The company has no response plans for ransomware.
Which of the following is the NEXT step the analyst should take after reporting the incident to the management team?

 
 
 
 

NEW QUESTION 21
Technicians have determined that the current server hardware is outdated, so they have decided to throw it out.
Prior to disposal, which of the following is the BEST method to use to ensure no data remnants can be recovered?

 
 
 
 

NEW QUESTION 22
A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Which of the following would be BEST for the developer to perform? (Choose two.)

 
 
 
 
 
 

NEW QUESTION 23
A security administrator configured the account policies per security implementation guidelines. However, the accounts still appear to be susceptible to brute-force attacks. The following settings meet the existing compliance guidelines:
Must have a minimum of 15 characters
Must use one number
Must use one capital letter
Must not be one of the last 12 passwords used
Which of the following policies should be added to provide additional security?

 
 
 
 
 

NEW QUESTION 24
A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.

 
 
 
 

NEW QUESTION 25
An organization is developing a disaster recovery plan that requires data to be backed up and available at a moment’s notice.
Which of the following should the organization consider FIRST to address this requirement?

 
 
 
 

NEW QUESTION 26
A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application.
Which of the following is the MOST likely cause?

 
 
 
 

NEW QUESTION 27
Ransomware encrypted the entire human resources fileshare for a large financial institution. Security operations personnel were unaware of the activity until it was too late to stop it. The restoration will take approximately four hours, and the last backup occurred 48 hours ago. The management team has indicated that the RPO for a disaster recovery event for this data classification is 24 hours.
Based on RPO requirements, which of the following recommendations should the management team make?

 
 
 
 

NEW QUESTION 28
In preparation for the holiday season, a company redesigned the system that manages retail sales and moved it to a cloud service provider. The new infrastructure did not meet the company’s availability requirements. During a postmortem analysis, the following issues were highlighted:
1. International users reported latency when images on the web page were initially loading.
2. During times of report processing, users reported issues with inventory when attempting to place orders.
3. Despite the fact that ten new API servers were added, the load across servers was heavy at peak times.
Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?

 
 
 
 

NEW QUESTION 29
A systems administrator is preparing to run a vulnerability scan on a set of information systems in the organization. The systems administrator wants to ensure that the targeted systems produce accurate information especially regarding configuration settings.
Which of the following scan types will provide the systems administrator with the MOST accurate information?

 
 
 
 

NEW QUESTION 30
As part of the customer registration process to access a new bank account, customers are required to upload a number of documents, including their passports and driver’s licenses. The process also requires customers to take a current photo of themselves to be compared against provided documentation.
Which of the following BEST describes this process?

 
 
 
 

NEW QUESTION 31
A company undergoing digital transformation is reviewing the resiliency of a CSP and is concerned about meeting SLA requirements in the event of a CSP incident.
Which of the following would be BEST to proceed with the transformation?

 
 
 
 

NEW QUESTION 32
A security analyst is validating the MAC policy on a set of Android devices. The policy was written to ensure non-critical applications are unable to access certain resources. When reviewing dmesg, the analyst notes many entries such as:
Despite the deny message, this action was still permit following is the MOST likely fix for this issue?

 
 
 
 

NEW QUESTION 33
A networking team asked a security administrator to enable Flash on its web browser. The networking team explained that an important legacy embedded system gathers SNMP information from various devices. The system can only be managed through a web browser running Flash. The embedded system will be replaced within the year but is still critical at the moment.
Which of the following should the security administrator do to mitigate the risk?

 
 
 
 

NEW QUESTION 34
An organization is implementing a new identity and access management architecture with the following objectives:
Supporting MFA against on-premises infrastructure
Improving the user experience by integrating with SaaS applications
Applying risk-based policies based on location
Performing just-in-time provisioning
Which of the following authentication protocols should the organization implement to support these requirements?

 
 
 
 

NEW QUESTION 35
A security engineer at a company is designing a system to mitigate recent setbacks caused competitors that are beating the company to market with the new products. Several of the products incorporate propriety enhancements developed by the engineer’s company. The network already includes a SEIM and a NIPS and requires 2FA for all user access. Which of the following system should the engineer consider NEXT to mitigate the associated risks?

 
 
 
 

NEW QUESTION 36
A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:
Unauthorized insertions into application development environments
Authorized insiders making unauthorized changes to environment configurations Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)

 
 
 
 
 
 

CompTIA CAS-004 Exam Syllabus Topics:

Topic Details
Topic 1
  • Explain how cloud technology adoption impacts organizational security
  • Explain the importance of business continuity and disaster recovery concepts
Topic 2
  • Given a scenario, troubleshoot issues with cryptographic implementations
  • Given a scenario, analyze the security requirements and objectives to ensure an appropriate
Topic 3
  • Given a scenario, integrate software applications securely into an enterprise architecture
  • Given a set of requirements, implement secure cloud and virtualization solutions
Topic 4
  • Explain the importance of forensic concepts
  • Explain security considerations impacting specific sectors and operational technologies
  • Given a business requirement, implement the appropriate cryptographic protocols and algorithms
Topic 5
  • Explain the impact of emerging technologies on enterprise security and privacy
  • Given a scenario, analyze vulnerabilities and recommend risk mitigations
Topic 6
  • Given a scenario, use the appropriate vulnerability assessment and penetration testing methods and tools
  • Explain the importance of managing and mitigating vendor risk
Topic 7
  • Explain compliance frameworks and legal considerations, and their organizational impact
  • Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements

 

Use Real CAS-004 Dumps – 100% Free CAS-004 Exam Dumps: https://www.passtestking.com/CompTIA/CAS-004-practice-exam-dumps.html

admin

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter the text from the image below
 

Post comment