Free CAS-004 Exam Braindumps (page: 4)

Page 4 of 108

A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services.

Which of the following should be modified to prevent the issue from reoccurring?

  1. Recovery point objective
  2. Recovery time objective
  3. Mission-essential functions
  4. Recovery service level

Answer(s): D

Explanation:


Reference:

https://www.nakivo.com/blog/disaster-recovery-in-cloud-computing/



A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.

The technician will define this threat as:

  1. a decrypting RSA using obsolete and weakened encryption attack.
  2. a zero-day attack.
  3. an advanced persistent threat.
  4. an on-path attack.

Answer(s): C

Explanation:

This question doesn't describe a DROWN, Zero-Day or on-path attack. The malicious actor was persistent over time (three months) and infiltrated the data it needed then stopped once its objective was met.



A security engineer thinks the development team has been hard-coding sensitive environment variables in its code.

Which of the following would BEST secure the company’s CI/CD pipeline?

  1. Utilizing a trusted secrets manager
  2. Performing DAST on a weekly basis
  3. Introducing the use of container orchestration
  4. Deploying instance tagging

Answer(s): A

Explanation:


Reference:

https://about.gitlab.com/blog/2021/04/09/demystifying-ci-cd-variables/



A small company recently developed prototype technology for a military program. The company’s security engineer is concerned about potential theft of the newly developed, proprietary information.

Which of the following should the security engineer do to BEST manage the threats proactively?

  1. Join an information-sharing community that is relevant to the company.
  2. Leverage the MITRE ATT&CK framework to map the TTR.
  3. Use OSINT techniques to evaluate and analyze the threats.
  4. Update security awareness training to address new threats, such as best practices for data security.

Answer(s): D



Page 4 of 108



Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

Sysadmin 4/22/2024 3:30:17 PM
How can you report incorrect answers? #27 is incorrect. First and foremost is always stop the spread, and then access the damage.
UNITED STATES
upvote

Gord 3/19/2024 9:44:01 AM
I hardly submit reivews... but the team at Xcerts.com really deserve one. They are super professional and the quality of their study guides are good. I highly recommend it anyone preparing for their exams.
UNITED KINGDOM
upvote

9eagles 4/7/2023 10:04:00 AM
on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous
upvote

Change 12/11/2023 5:07:09 PM
Are some answers wrong
UNITED STATES
upvote

makeel 12/10/2023 2:13:20 PM
the questions are the same exist of another website
Anonymous
upvote