Free CAS-004 Exam Braindumps (page: 5)

Page 5 of 136

A security engineer has been asked to close all non-secure connections from the corporate network. The engineer is attempting to understand why the corporate UTM will not allow users to download email via IMAPS. The engineer formulates a theory and begins testing by creating the firewall ID 58, and users are able to download emails correctly by using IMAP instead. The network comprises three VLANs:

The security engineer looks at the UTM firewall rules and finds the following:


Which of the following should the security engineer do to ensure IMAPS functions properly on the corporate user network?

  1. Contact the email service provider and ask if the company IP is blocked.
  2. Confirm the email server certificate is installed on the corporate computers.
  3. Make sure the UTM certificate is imported on the corporate computers.
  4. Create an IMAPS firewall rule to ensure email is allowed.

Answer(s): B



A security analyst is reviewing network connectivity on a Linux workstation and examining the active TCP connections using the command line.

Which of the following commands would be the BEST to run to view only active Internet connections?

  1. sudo netstat -antu | grep “LISTEN” | awk ‘{print$5}’
  2. sudo netstat -nlt -p | grep “ESTABLISHED”
  3. sudo netstat -plntu | grep -v “Foreign Address”
  4. sudo netstat -pnut -w | column -t -s $’\w’
  5. sudo netstat -pnut | grep -P ^tcp

Answer(s): E



A shipping company that is trying to eliminate entire classes of threats is developing an SELinux policy to ensure its custom Android devices are used exclusively for package tracking.

After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to run?

  1. Protecting
  2. Permissive
  3. Enforcing
  4. Mandatory

Answer(s): C



A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log:
graphic.ssh_auth_log.

Which of the following actions would BEST address the potential risks by the activity in the logs?

  1. Alerting the misconfigured service account password
  2. Modifying the AllowUsers configuration directive
  3. Restricting external port 22 access
  4. Implementing host-key preferences

Answer(s): C


Reference:

https://www.rapid7.com/blog/post/2017/10/04/how-to-secure-ssh-server-using-port-knocking-on-ubuntu-linux/



Page 5 of 136



Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

Fatima commented on June 17, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
EUROPEAN UNION
upvote

Sysadmin commented on April 22, 2024
How can you report incorrect answers? #27 is incorrect. First and foremost is always stop the spread, and then access the damage.
UNITED STATES
upvote

Gord commented on March 19, 2024
I hardly submit reivews... but the team at Xcerts.com really deserve one. They are super professional and the quality of their study guides are good. I highly recommend it anyone preparing for their exams.
UNITED KINGDOM
upvote

9eagles commented on April 07, 2023
on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous
upvote

Change commented on December 11, 2023
Are some answers wrong
UNITED STATES
upvote

makeel commented on December 10, 2023
the questions are the same exist of another website
Anonymous
upvote

SecPro commented on October 29, 2023
Great dumps, helped me pass the exam.
Anonymous
upvote