Free CAS-004 Exam Braindumps (page: 69)

Page 69 of 140

A software development company is building a new mobile application for its social media platform. The company wants to gain its users’ trust by reducing the risk of on-path attacks between the mobile client and its servers and by implementing stronger digital trust. To support users’ trust, the company has released the following internal guidelines:
• Mobile clients should verity the identity of all social media servers locally.
• Social media servers should improve TLS performance of their certificate status.
• Social media servers should inform the client to only use HTTPS.
Given the above requirements, which of the following should the company implement? (Choose two.)

  1. Quick UDP internet connection
  2. OCSP stapling
  3. Private CA
  4. DNSSEC
  5. CRL
  6. HSTS
  7. Distributed object model

Answer(s): B,F



Due to budget constraints, an organization created a policy that only permits vulnerabilities rated high and critical according to CVSS to be fixed or mitigated. A security analyst notices that many vulnerabilities that were previously scored as medium are now breaching higher thresholds. Upon further investigation, the analyst notices certain ratings are not aligned with the approved system categorization.
Which of the following can the analyst do to get a better picture of the risk while adhering to the organization’s policy?

  1. Align the exploitability metrics to the predetermined system categorization.
  2. Align the remediation levels to the predetermined system categorization.
  3. Align the impact subscore requirements to the predetermined system categorization.
  4. Align the attack vectors to the predetermined system categorization.

Answer(s): C



A cloud engineer is tasked with improving the responsiveness and security of a company’s cloud-based web application. The company is concerned that international users will experience increased latency.
Which of the following is the BEST technology to mitigate this concern?

  1. Caching
  2. Containerization
  3. Content delivery network
  4. Clustering

Answer(s): C



An organization thinks that its network has active, malicious activity on it.
Which of the following capabilities would BEST help to expose the adversary?

  1. Installing a honeypot and other decoys
  2. Expanding SOC functions to include hunting
  3. Enumerating asset configurations
  4. Performing a penetration test

Answer(s): B



Page 69 of 140



Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

michrle23 commented on November 08, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
PAKISTAN
upvote

Fatima commented on June 17, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
EUROPEAN UNION
upvote

Sysadmin commented on April 22, 2024
How can you report incorrect answers? #27 is incorrect. First and foremost is always stop the spread, and then access the damage.
UNITED STATES
upvote

Gord commented on March 19, 2024
I hardly submit reivews... but the team at Xcerts.com really deserve one. They are super professional and the quality of their study guides are good. I highly recommend it anyone preparing for their exams.
UNITED KINGDOM
upvote

9eagles commented on April 07, 2023
on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous
upvote

Change commented on December 11, 2023
Are some answers wrong
UNITED STATES
upvote

makeel commented on December 10, 2023
the questions are the same exist of another website
Anonymous
upvote

SecPro commented on October 29, 2023
Great dumps, helped me pass the exam.
Anonymous
upvote