Free CAS-004 Exam Braindumps (page: 60)

Page 60 of 140

A network administrator for a completely air-gapped and closed system has noticed that anomalous external files have been uploaded to one of the critical servers. The administrator has reviewed logs in the SIEM that were collected from security appliances, network infrastructure devices, and endpoints.
Which of the following processes, if executed, would be MOST likely to expose an attacker?

  1. Reviewing video from IP cameras within the facility
  2. Reconfiguring the SIEM connectors to collect data from the perimeter network hosts
  3. Implementing integrity checks on endpoint computing devices
  4. Looking for privileged credential reuse on the network

Answer(s): A



A network administrator for a completely air-gapped and closed system has noticed that anomalous external files have been uploaded to one of the critical servers. The administrator has reviewed logs in the SIEM that were collected from security appliances, network infrastructure devices, and endpoints.
Which of the following processes, if executed, would be MOST likely to expose an attacker?

  1. Reviewing video from IP cameras within the facility
  2. Reconfiguring the SIEM connectors to collect data from the perimeter network hosts
  3. Implementing integrity checks on endpoint computing devices
  4. Looking for privileged credential reuse on the network

Answer(s): A



A security engineer is implementing a server-side TLS configuration that provides forward secrecy and authenticated encryption with associated data.
Which of the following algorithms, when combined into a cipher suite, will meet these requirements? (Choose three.)

  1. EDE
  2. CBC
  3. GCM
  4. AES
  5. RSA
  6. RC4
  7. ECDSA
  8. DH

Answer(s): C,D,G



A security architect is advising the application team to implement the following controls in the application before it is released:
• Least privilege
• Blocklist input validation for the following characters: \<>;, ="#+
Based on the requirements, which of the following attacks is the security architect trying to prevent?

  1. XML injection
  2. LDAP injection
  3. CSRF
  4. XSS

Answer(s): B



Page 60 of 140



Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

michrle23 commented on November 08, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
PAKISTAN
upvote

Fatima commented on June 17, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
EUROPEAN UNION
upvote

Sysadmin commented on April 22, 2024
How can you report incorrect answers? #27 is incorrect. First and foremost is always stop the spread, and then access the damage.
UNITED STATES
upvote

Gord commented on March 19, 2024
I hardly submit reivews... but the team at Xcerts.com really deserve one. They are super professional and the quality of their study guides are good. I highly recommend it anyone preparing for their exams.
UNITED KINGDOM
upvote

9eagles commented on April 07, 2023
on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous
upvote

Change commented on December 11, 2023
Are some answers wrong
UNITED STATES
upvote

makeel commented on December 10, 2023
the questions are the same exist of another website
Anonymous
upvote

SecPro commented on October 29, 2023
Great dumps, helped me pass the exam.
Anonymous
upvote