Free CAS-004 Exam Braindumps (page: 67)

Page 67 of 140

A new mandate by the corporate security team requires that all endpoints must meet a security baseline before accessing the corporate network. All servers and desktop computers are scanned by the dedicated internal scanner appliance installed in each subnet. However, remote worker laptops do not access the network regularly.
Which of the following is the BEST option for the security team to ensure remote worker laptops are scanned before being granted access to the corporate network?

  1. Implement network access control to perform host validation of installed patches.
  2. Create an 802.1X implementation with certificate-based device identification.
  3. Create a vulnerability scanning subnet for remote workers to connect to on the network at headquarters.
  4. Install a vulnerability scanning agent on each remote laptop to submit scan data.

Answer(s): A



A penetration tester is testing a company’s login form for a web application using a list of known usernames and a common password list. According to a brute-force utility, the penetration tester needs to provide the tool with the proper headers, POST URL with variable names, and the error string returned with an improper login.
Which of the following would BEST help the tester to gather this information? (Choose two.)

  1. The new source feature of the web browser
  2. The logs from the web server
  3. The inspect feature from the web browser
  4. A tcpdump from the web server
  5. An HTTP interceptor
  6. The website certificate viewed via the web browser

Answer(s): C,E



A security analyst has concerns about malware on an endpoint. The malware is unable to detonate by modifying the kernel response to various system calls. As a test, the analyst modifies a Windows server to respond to system calls as if it was a Linux server. In another test, the analyst modifies the operating system to prevent the malware from identifying target files.
Which of the following techniques is the analyst MOST likely using?

  1. Honeypot
  2. Deception
  3. Simulators
  4. Sandboxing

Answer(s): B



Users are claiming that a web server is not accessible. A security engineer is unable to view the Internet Services logs for the site. The engineer connects to the server and runs netstat – an and receives the following output:
Which of the following is MOST likely happening to the server?

  1. Port scanning
  2. ARP spoofing
  3. Buffer overflow
  4. Denial of service

Answer(s): D



Page 67 of 140



Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

michrle23 commented on November 08, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
PAKISTAN
upvote

Fatima commented on June 17, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
EUROPEAN UNION
upvote

Sysadmin commented on April 22, 2024
How can you report incorrect answers? #27 is incorrect. First and foremost is always stop the spread, and then access the damage.
UNITED STATES
upvote

Gord commented on March 19, 2024
I hardly submit reivews... but the team at Xcerts.com really deserve one. They are super professional and the quality of their study guides are good. I highly recommend it anyone preparing for their exams.
UNITED KINGDOM
upvote

9eagles commented on April 07, 2023
on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous
upvote

Change commented on December 11, 2023
Are some answers wrong
UNITED STATES
upvote

makeel commented on December 10, 2023
the questions are the same exist of another website
Anonymous
upvote

SecPro commented on October 29, 2023
Great dumps, helped me pass the exam.
Anonymous
upvote