Free CAS-004 Exam Braindumps (page: 2)

Page 2 of 99

During a remodel, a company’s computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The company wants to be able to identify any unauthorized individuals who enter the storage room by following an authorized employee.

Which of the following processes would BEST satisfy this requirement?

  1. Monitor camera footage corresponding to a valid access request.
  2. Require both security and management to open the door.
  3. Require department managers to review denied-access requests.
  4. Issue new entry badges on a weekly basis.

Answer(s): A


Reference:

https://www.getkisi.com/access-control



A company is preparing to deploy a global service.
Which of the following must the company do to ensure GDPR compliance? (Choose two.)

  1. Inform users regarding what data is stored.
  2. Provide opt-in/out for marketing messages.
  3. Provide data deletion capabilities.
  4. Provide optional data encryption.
  5. Grant data access to third parties.
  6. Provide alternative authentication techniques.

Answer(s): A,C

Explanation:


Reference:

https://gdpr.eu/compliance-checklist-us-companies/



A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application.

Which of the following is the MOST likely cause?

  1. The user agent client is not compatible with the WAF.
  2. A certificate on the WAF is expired.
  3. HTTP traffic is not forwarding to HTTPS to decrypt.
  4. Old, vulnerable cipher suites are still being used.

Answer(s): B

Explanation:


Reference:

https://aws.amazon.com/premiumsupport/knowledge-center/waf-block-http-requests-no-user-agent/



A security analyst is reviewing the following output:


Which of the following would BEST mitigate this type of attack?

  1. Installing a network firewall
  2. Placing a WAF inline
  3. Implementing an IDS
  4. Deploying a honeypot

Answer(s): B



Page 2 of 99



Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

Sysadmin 4/22/2024 3:30:17 PM
How can you report incorrect answers? #27 is incorrect. First and foremost is always stop the spread, and then access the damage.
UNITED STATES
upvote

Gord 3/19/2024 9:44:01 AM
I hardly submit reivews... but the team at Xcerts.com really deserve one. They are super professional and the quality of their study guides are good. I highly recommend it anyone preparing for their exams.
UNITED KINGDOM
upvote

9eagles 4/7/2023 10:04:00 AM
on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous
upvote

Change 12/11/2023 5:07:09 PM
Are some answers wrong
UNITED STATES
upvote

makeel 12/10/2023 2:13:20 PM
the questions are the same exist of another website
Anonymous
upvote