CAS-004 免费考试学习指南!(最新 173 题)[Q18-Q36]

4/5 - (1 选票)

CAS-004 Free Exam Study Guide! (Updated 173 Questions)

CAS-004 Dumps for CompTIA CASP Certified Exam Questions and Answer

CompTIA CASP+ 考试认证详情:

考试名称 CompTIA Advanced Security Practitioner (CASP+)
书籍/培训 CASP+ CAS-004
考试价格 $466 (USD)
问题数量 90
考试时间表 CompTIA 市场
培生 VUE
考试代码 CAS-004

 

新问题 18
某组织最近遭遇了勒索软件攻击。安全团队负责人担心这种攻击会再次发生。但是,没有采取进一步的安全措施。
以下哪些程序可用于确定潜在的预防建议?

 
 
 
 

新问题 19
A satellite communications ISP frequently experiences outages and degraded modes of operation over one of its legacy satellite links due to the use of deprecated hardware and software. Three days per week, on average, a contracted company must follow a checklist of 16 different high-latency commands that must be run in serial to restore nominal performance. The ISP wants this process to be automated.
Which of the following techniques would be BEST suited for this requirement?

 
 
 
 

新问题 20
While investigating a security event, an analyst finds evidence that a user opened an email attachment from an unknown source. Shortly after the user opened the attachment, a group of servers experienced a large amount of network and resource activity. Upon investigating the servers, the analyst discovers the servers were encrypted by ransomware that is demanding payment within 48 hours or all data will be destroyed. The company has no response plans for ransomware.
Which of the following is the NEXT step the analyst should take after reporting the incident to the management team?

 
 
 
 

新问题 21
Technicians have determined that the current server hardware is outdated, so they have decided to throw it out.
Prior to disposal, which of the following is the BEST method to use to ensure no data remnants can be recovered?

 
 
 
 

新问题 22
A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Which of the following would be BEST for the developer to perform? (Choose two.)

 
 
 
 
 
 

新问题 23
A security administrator configured the account policies per security implementation guidelines. However, the accounts still appear to be susceptible to brute-force attacks. The following settings meet the existing compliance guidelines:
Must have a minimum of 15 characters
Must use one number
Must use one capital letter
Must not be one of the last 12 passwords used
Which of the following policies should be added to provide additional security?

 
 
 
 
 

新问题 24
A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.

 
 
 
 

新问题 25
某组织正在制定灾难恢复计划,要求备份数据并随时可用。
为满足这一要求,组织应首先考虑以下哪项?

 
 
 
 

新问题 26
A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application.
Which of the following is the MOST likely cause?

 
 
 
 

新问题 27
Ransomware encrypted the entire human resources fileshare for a large financial institution. Security operations personnel were unaware of the activity until it was too late to stop it. The restoration will take approximately four hours, and the last backup occurred 48 hours ago. The management team has indicated that the RPO for a disaster recovery event for this data classification is 24 hours.
Based on RPO requirements, which of the following recommendations should the management team make?

 
 
 
 

新问题 28
In preparation for the holiday season, a company redesigned the system that manages retail sales and moved it to a cloud service provider. The new infrastructure did not meet the company’s availability requirements. During a postmortem analysis, the following issues were highlighted:
1. International users reported latency when images on the web page were initially loading.
2. During times of report processing, users reported issues with inventory when attempting to place orders.
3. Despite the fact that ten new API servers were added, the load across servers was heavy at peak times.
Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?

 
 
 
 

新问题 29
A systems administrator is preparing to run a vulnerability scan on a set of information systems in the organization. The systems administrator wants to ensure that the targeted systems produce accurate information especially regarding configuration settings.
Which of the following scan types will provide the systems administrator with the MOST accurate information?

 
 
 
 

新问题 30
As part of the customer registration process to access a new bank account, customers are required to upload a number of documents, including their passports and driver’s licenses. The process also requires customers to take a current photo of themselves to be compared against provided documentation.
Which of the following BEST describes this process?

 
 
 
 

新问题 31
A company undergoing digital transformation is reviewing the resiliency of a CSP and is concerned about meeting SLA requirements in the event of a CSP incident.
Which of the following would be BEST to proceed with the transformation?

 
 
 
 

新问题 32
A security analyst is validating the MAC policy on a set of Android devices. The policy was written to ensure non-critical applications are unable to access certain resources. When reviewing dmesg, the analyst notes many entries such as:
Despite the deny message, this action was still permit following is the MOST likely fix for this issue?

 
 
 
 

新问题 33
A networking team asked a security administrator to enable Flash on its web browser. The networking team explained that an important legacy embedded system gathers SNMP information from various devices. The system can only be managed through a web browser running Flash. The embedded system will be replaced within the year but is still critical at the moment.
Which of the following should the security administrator do to mitigate the risk?

 
 
 
 

新问题 34
An organization is implementing a new identity and access management architecture with the following objectives:
Supporting MFA against on-premises infrastructure
Improving the user experience by integrating with SaaS applications
Applying risk-based policies based on location
Performing just-in-time provisioning
Which of the following authentication protocols should the organization implement to support these requirements?

 
 
 
 

新问题 35
某公司的一名安全工程师正在设计一个系统,以减轻最近竞争对手在新产品上市时对公司造成的挫折。其中几款产品采用了该工程师所在公司开发的专利增强功能。该网络已经包含一个 SEIM 和一个 NIPS,并要求所有用户访问时使用 2FA。工程师应考虑采用以下哪种系统来降低相关风险?

 
 
 
 

新问题 36
A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:
Unauthorized insertions into application development environments
Authorized insiders making unauthorized changes to environment configurations Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)

 
 
 
 
 
 

CompTIA CAS-004 考试大纲主题:

主题 详细信息
主题 1
  • Explain how cloud technology adoption impacts organizational security
  • Explain the importance of business continuity and disaster recovery concepts
主题 2
  • Given a scenario, troubleshoot issues with cryptographic implementations
  • Given a scenario, analyze the security requirements and objectives to ensure an appropriate
主题 3
  • Given a scenario, integrate software applications securely into an enterprise architecture
  • Given a set of requirements, implement secure cloud and virtualization solutions
主题 4
  • Explain the importance of forensic concepts
  • Explain security considerations impacting specific sectors and operational technologies
  • Given a business requirement, implement the appropriate cryptographic protocols and algorithms
议题 5
  • Explain the impact of emerging technologies on enterprise security and privacy
  • Given a scenario, analyze vulnerabilities and recommend risk mitigations
主题 6
  • Given a scenario, use the appropriate vulnerability assessment and penetration testing methods and tools
  • Explain the importance of managing and mitigating vendor risk
主题 7
  • Explain compliance frameworks and legal considerations, and their organizational impact
  • Explain how cryptography and public key infrastructure (PKI) support security objectives and requirements

 

Use Real CAS-004 Dumps – 100% Free CAS-004 Exam Dumps: https://www.passtestking.com/CompTIA/CAS-004-practice-exam-dumps.html

管理

發佈留言

發佈留言必須填寫的電子郵件地址不會公開。 必填欄位標示為 *

输入下图中的文字
 

发表评论

zh_TWChinese