Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CAS-004 Exam Dumps - CompTIA CASP Questions and Answers

Question # 139

A security engineer is creating a single CSR for the following web server hostnames:

• wwwint internal

• www company com

• home.internal

• www internal

Which of the following would meet the requirement?

Options:

A.

SAN

B.

CN

C.

CA

D.

CRL

E.

Issuer

Buy Now
Question # 140

After investigating a recent security incident, a SOC analyst is charged with creating a reference guide for the entire team to use. Which of the following should the analyst create to address future incidents?

Options:

A.

Root cause analysis

B.

Communication plan

C.

Runbook

D.

Lessons learned

Buy Now
Question # 141

A security architect is reviewing the following organizational specifications for a new application:

• Be sessionless and API-based

• Accept uploaded documents with Pll, so all storage must be ephemeral

• Be able to scale on-demand across multiple nodes

• Restrict all network access except for the TLS port

Which of the following ways should the architect recommend the application be deployed in order to meet security and organizational infrastructure requirements?

Options:

A.

Utilizing the cloud container service

B.

On server instances with autoscaling groups

C.

Using scripted delivery

D.

With a content delivery network

Buy Now
Question # 142

A security architect discovers the following while reviewing code for a company’s website:

selection = "SELECT Item FROM Catalog WHERE ItemID * " & Request("ItemID”)

Which of the following should the security architect recommend?

Options:

A.

Client-side processing

B.

Query parameterization

C.

Data normalization

D.

Escape character blocking

E.

URL encoding

Buy Now
Question # 143

A security analyst reviews network logs and notices a large number of domain name queries originating from an internal server for an unknown domain, similar to the following:

    2736287327321782.hgQ43jsi23-y.com

    0357320932922C91.hgQ43jsu23Ty.com

    4042301801399103.hgQ43jsu23Ly.com

Which of the following should the analyst do next?

Options:

A.

Check for data exfiltration.

B.

Reconfigure the server's DNS settings.

C.

Browse for a website on the requested domain.

D.

Add the host names to a block list.

Buy Now
Question # 144

A managed security provider (MSP) is engaging with a customer who was working through a complete digital transformation Part of this transformation involves a move to cloud servers to ensure a scalable, high-performance, online user experience The current architecture includes:

• Directory servers

• Web servers

• Database servers

• Load balancers

• Cloud-native VPN concentrator

• Remote access server

The MSP must secure this environment similarly to the infrastructure on premises Which of the following should the MSP put in place to BEST meet this objective? (Select THREE)

Options:

A.

Content delivery network

B.

Virtual next-generation firewall

C.

Web application firewall

D.

Software-defined WAN

E.

External vulnerability scans

F.

Containers

G.

Microsegmentation

Buy Now
Question # 145

A security technician is trying to connect a remote site to the central office over a site-to-site VPN. The technician has verified the source and destination IP addresses are correct, but the technician is unable to get the remote site to connect. The following error message keeps repeating:

"An error has occurred during Phase 1 handshake. Deleting keys and retrying..."

Which of the following is most likely the reason the connection is failing?

Options:

A.

The IKE hashing algorithm uses different key lengths on each VPN device.

B.

The IPSec settings allow more than one cipher suite on both devices.

C.

The Diffie-Hellman group on both sides matches but is a legacy group.

D.

The remote VPN is attempting to connect with a protocol other than SSL/TLS.

Buy Now
Question # 146

A security administrator is trying to securely provide public access to specific data from a web application. Clients who want to access the application will be required to:

• Only allow the POST and GET options.

• Transmit all data secured with TLS 1.2 or greater.

• Use specific URLs to access each type of data that is requested.

• Authenticate with a bearer token.

Which of the following should the security administrator recommend to meet these requirements?

Options:

A.

API gateway

B.

Application load balancer

C.

Web application firewall

D.

Reverse proxy

Buy Now
Question # 147

An organization needs to classify its systems and data in accordance with external requirements. Which of the following roles is best qualified to perform this task?

Options:

A.

Systems administrator

B.

Data owner

C.

Data processor

D.

Data custodian

E.

Data steward

Buy Now
Question # 148

The management team at a company with a large, aging server environment is conducting a server risk assessment in order to create a replacement strategy. The replacement strategy will be based upon the likelihood a server will fail, regardless of the criticality of the application running on a particular server. Which of the following should be used to prioritize the server replacements?

Options:

A.

SLE

B.

MTTR

C.

TCO

D.

MTBF

E.

MSA

Buy Now
Question # 149

A new requirement for legislators has forced a government security team to develop a validation process to verify the integrity of a downloaded file and the sender of the file Which of the following is the BEST way for the security team to comply with this requirement?

Options:

A.

Digital signature

B.

Message hash

C.

Message digest

D.

Message authentication code

Buy Now
Question # 150

A penetration tester discovers a condition that causes unexpected behavior in a web application. This results in the dump of the interpreter's debugging information, which includes the interpreter's version, full path of binary files, and the user ID running the process. Which of the following actions would best mitigate this risk?

Options:

A.

Include routines in the application for message handling

B.

Adopt a compiled programming language instead.

C.

Perform SAST vulnerability scans on every build.

D.

Validate user-generated input.

Buy Now
Question # 151

A security architect must mitigate the risks from what is suspected to be an exposed, private cryptographic key. Which of the following is the best step to take?

Options:

A.

Revoke the certificate.

B.

Inform all the users of the certificate.

C.

Contact the company's Chief Information Security Officer.

D.

Disable the website using the suspected certificate.

E.

Alert the root CA.

Buy Now
Question # 152

A company reviews the regulatory requirements associated with a new product, and then company management elects to cancel production. Which of the following risk strategies is the company using in this scenario?

Options:

A.

Avoidance

B.

Mitigation

C.

Rejection

D.

Acceptance

Buy Now
Question # 153

A security review of the architecture for an application migration was recently completed. The following observations were made:

• External inbound access is blocked.

• A large amount of storage is available.

• Memory and CPU usage are low.

• The load balancer has only a single server assigned.

• Multiple APIs are integrated.

Which of the following needs to be addressed?

Options:

A.

Scalability

B.

Automation

C.

Availability

D.

Performance

Buy Now
Exam Code: CAS-004
Exam Name: CompTIA SecurityX Certification Exam
Last Update: Feb 22, 2025
Questions: 564
CAS-004 pdf

CAS-004 PDF

$25.5  $84.99
CAS-004 Engine

CAS-004 Testing Engine

$28.5  $94.99
CAS-004 PDF + Engine

CAS-004 PDF + Testing Engine

$40.5  $134.99