Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA CAS-004 - CompTIA SecurityX Certification Exam

Page: 8 / 13
Total 619 questions

A mobile application developer is creating a global, highly scalable, secure chat application. The developer would like to ensure the application is not susceptible to on-path attacks while the user is traveling in potentially hostile regions. Which of the following would BEST achieve that goal?

A.

Utilize the SAN certificate to enable a single certificate for all regions.

B.

Deploy client certificates to all devices in the network.

C.

Configure certificate pinning inside the application.

D.

Enable HSTS on the application's server side for all communication.

A DNS forward lookup zone named complia.org must:

• Ensure the DNS is protected from on-path attacks.

• Ensure zone transfers use mutual authentication and are authenticated and negotiated.

Which of the following should the security architect configure to meet these requirements? (Select two).

A.

Public keys

B.

Conditional forwarders

C.

Root hints

D.

DNSSEC

E.

CNAME records

F.

SRV records

A company recently deployed a SIEM and began importing logs from a firewall, a file server, a domain controller a web server, and a laptop. A security analyst receives a series of SIEM alerts and prepares to respond. The following is the alert information:

Which of the following should the security analyst do FIRST?

A.

Disable Administrator on abc-uaa-fsl, the local account is compromised

B.

Shut down the abc-usa-fsl server, a plaintext credential is being used

C.

Disable the jdoe account, it is likely compromised

D.

Shut down abc-usa-fw01; the remote access VPN vulnerability is exploited

The primary advantage of an organization creating and maintaining a vendor risk registry is to:

A.

define the risk assessment methodology.

B.

study a variety of risks and review the threat landscape.

C.

ensure that inventory of potential risk is maintained.

D.

ensure that all assets have low residual risk.

A technology company developed an in-house chat application that is used only by developers. An open-source library within the application has been deprecated. The facts below are provided:

The cost of replacing this system is nominal.

The system provides no revenue to the business.

The system is not a critical part of the business.

Which of the following is the best risk mitigation strategy?

A.

Transfer the risk, since developers prefer using this chat application over alternatives.

B.

Accept the risk, since any system disruption will only impact developers.

C.

Avoid the risk by shutting down this application and migrating to another chat platform.

D.

Mitigate the risk by purchasing an EDR and configuring network ACLs.

A customer requires secure communication of subscribed web services at all times, but the company currently signs its own certificate requests to an internal CA. Which of the following approaches will best meet the customer's requirements?

A.

Generate a CSR to the local CA for email encryption.

B.

Submit a CSR for a wildcard certificate to a public CA.

C.

Request a software signing certificate from a public CA.

D.

Process a CSR for a server authentication certificate.

A security administrator is setting up a virtualization solution that needs to run services from a single host. Each service should be the only one running in its environment. Each environment needs to have its own operating system as a base but share the kernel version and properties of the running host. Which of the following technologies would best meet these requirements?

A.

Containers

B.

Type 1 hypervisor

C.

Type 2 hypervisor

D.

Virtual desktop infrastructure

E.

Emulation

A new requirement for legislators has forced a government security team to develop a validation process to verify the integrity of a downloaded file and the sender of the file Which of the following is the BEST way for the security team to comply with this requirement?

A.

Digital signature

B.

Message hash

C.

Message digest

D.

Message authentication code

When managing and mitigating SaaS cloud vendor risk, which of the following responsibilities belongs to the client?

A.

Data

B.

Storage

C.

Physical security

D.

Network

A regulated company is in the process of refreshing its entire infrastructure. The company has a business-critical process running on an old 2008 Windows server. If this server fails, the company would lose millions of dollars in revenue. Which of the following actions should the company take?

A.

Accept the risk as the cost of doing business.

B.

Create an organizational risk register for project prioritization.

C.

Implement network compensating controls.

D.

Purchase insurance to offset the cost if a failure occurred.

A PKI engineer is defining certificate templates for an organization's CA and would like to ensure at least two of the possible SAN certificate extension fields populate for documentation purposes. Which of the following are explicit options within this extension? (Select two).

A.

Type

B.

Email

C.

OCSP responder

D.

Registration authority

E.

Common Name

F.

DNS name

Based on a recent security audit, a company discovered the perimeter strategy is inadequate for its recent growth. To address this issue, the company is looking for a solution that

includes the following requirements:

• Collapse of multiple network security technologies into a single footprint

• Support for multiple VPNs with different security contexts

• Support for application layer security (Layer 7 of the OSI Model)

Which of the following technologies would be the most appropriate solution given these requirements?

A.

NAT gateway

B.

Reverse proxy

C.

NGFW

D.

NIDS

A security engineer is concerned about the threat of side-channel attacks The company experienced a past attack that degraded parts of a SCADA system, causing a fluctuation to 20,000rpm from its normal operating range As a result, the part deteriorated more quickly than the mean time to failure A further investigation revealed the attacker was able to determine the acceptable rpm range, and the malware would then fluctuate the rpm until the pan failed Which of the following solutions would be best to prevent a side-channel attack in the future?

A.

Installing online hardware sensors

B.

Air gapping important ICS and machines

C.

Implementing a HIDS

D.

Installing a SIEM agent on the endpoint

In support of disaster recovery objectives, a third party agreed to provide 99.999% uptime. Recently, a hardware failure impacted a firewall without service degradation. Which of the following resiliency concepts was most likely in place?

A.

Clustering

B.

High availability

C.

Redundancy

D.

Replication

To save on device life-cycle costs, a company is transitioning to a BYOD deployment scheme for enterprise mobility. Local laws protect users from corporate-initiated wiping or manipulation of data not owned by the company. Which of the following techniques would best protect corporate data while ensuring the integrity of private data?

A.

Wrap and/or containerize corporate applications.

B.

Configuration of full device encryption and MFA.

C.

Implementation of an always-on. split-tunnel VPN

D.

Enroll users into an MDM with an option for selective wipe.