Free CAS-004 Exam Braindumps (page: 63)

Page 63 of 140

A security architect is working with a new customer to find a vulnerability assessment solution that meets the following requirements:
• Fast scanning
• The least false positives possible
• Signature-based
• A low impact on servers when performing a scan
In addition, the customer has several screened subnets, VLANs, and branch offices.
Which of the following will BEST meet the customer's needs?

  1. Authenticated scanning
  2. Passive scanning
  3. Unauthenticated scanning
  4. Agent-based scanning

Answer(s): D



Real-time, safety-critical systems MOST often use serial busses that:

  1. have non-deterministic behavior and are not deployed with encryption.
  2. have non-deterministic behavior and are deployed with encryption.
  3. have deterministic behavior and are deployed with encryption.
  4. have deterministic behavior and are not deployed with encryption.

Answer(s): D



A company wants to securely manage the APIs that were developed for its in-house applications. Previous penetration tests revealed that developers were embedding unencrypted passwords in the code.
Which of the following can the company do to address this finding? (Choose two.)

  1. Implement complex, key-length API key management.
  2. Implement user session logging.
  3. Implement time-based API key management.
  4. Use SOAP instead of restful services.
  5. Incorporate a DAST into the DevSecOps process to identify the exposure of secrets.
  6. Enforce MFA on the developers’ workstations and production systems.

Answer(s): A,C



When a remote employee traveled overseas, the employee’s laptop and several mobile devices with proprietary tools were stolen. The security team requires technical controls be in place to ensure no electronic data is compromised or changed.
Which of the following BEST meets this requirement?

  1. Mobile device management with remote wipe capabilities
  2. Passwordless smart card authorization with biometrics
  3. Next-generation endpoint detection and response agent
  4. Full disk encryption with centralized key management

Answer(s): D



Page 63 of 140



Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

michrle23 commented on November 08, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
PAKISTAN
upvote

Fatima commented on June 17, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
EUROPEAN UNION
upvote

Sysadmin commented on April 22, 2024
How can you report incorrect answers? #27 is incorrect. First and foremost is always stop the spread, and then access the damage.
UNITED STATES
upvote

Gord commented on March 19, 2024
I hardly submit reivews... but the team at Xcerts.com really deserve one. They are super professional and the quality of their study guides are good. I highly recommend it anyone preparing for their exams.
UNITED KINGDOM
upvote

9eagles commented on April 07, 2023
on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous
upvote

Change commented on December 11, 2023
Are some answers wrong
UNITED STATES
upvote

makeel commented on December 10, 2023
the questions are the same exist of another website
Anonymous
upvote

SecPro commented on October 29, 2023
Great dumps, helped me pass the exam.
Anonymous
upvote