Free CAS-004 Exam Braindumps (page: 17)

Page 17 of 140

An e-commerce company is running a web server on premises, and the resource utilization is usually less than 30%. During the last two holiday seasons, the server experienced performance issues because of too many connections, and several customers were not able to finalize purchase orders. The company is looking to change the server configuration to avoid this kind of performance issue.
Which of the following is the MOST cost-effective solution?

  1. Move the server to a cloud provider.
  2. Change the operating system.
  3. Buy a new server and create an active-active cluster.
  4. Upgrade the server with a new one.

Answer(s): A



A company has decided to purchase a license for software that is used to operate a mission-critical process. The third-party developer is new to the industry but is delivering what the company needs at this time.
Which of the following BEST describes the reason why utilizing a source code escrow will reduce the operational risk to the company if the third party stops supporting the application?

  1. The company will have access to the latest version to continue development.
  2. The company will be able to force the third-party developer to continue support.
  3. The company will be able to manage the third-party developer's development process.
  4. The company will be paid by the third-party developer to hire a new development team.

Answer(s): A



A security analyst is researching containerization concepts for an organization. The analyst is concerned about potential resource exhaustion scenarios on the
Docker host due to a single application that is overconsuming available resources.
Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?

  1. Union filesystem overlay
  2. Cgroups
  3. Linux namespaces
  4. Device mapper

Answer(s): B


Reference:

https://www.ibm.com/support/pages/deep-dive-yarn-cgroups-hadoop-dev



A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Which of the following would be BEST for the developer to perform? (Choose two.)

  1. Utilize code signing by a trusted third party.
  2. Implement certificate-based authentication.
  3. Verify MD5 hashes.
  4. Compress the program with a password.
  5. Encrypt with 3DES.
  6. Make the DACL read-only.

Answer(s): A,C



Page 17 of 140



Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

michrle23 commented on November 08, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
PAKISTAN
upvote

Fatima commented on June 17, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
EUROPEAN UNION
upvote

Sysadmin commented on April 22, 2024
How can you report incorrect answers? #27 is incorrect. First and foremost is always stop the spread, and then access the damage.
UNITED STATES
upvote

Gord commented on March 19, 2024
I hardly submit reivews... but the team at Xcerts.com really deserve one. They are super professional and the quality of their study guides are good. I highly recommend it anyone preparing for their exams.
UNITED KINGDOM
upvote

9eagles commented on April 07, 2023
on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous
upvote

Change commented on December 11, 2023
Are some answers wrong
UNITED STATES
upvote

makeel commented on December 10, 2023
the questions are the same exist of another website
Anonymous
upvote

SecPro commented on October 29, 2023
Great dumps, helped me pass the exam.
Anonymous
upvote