Free CAS-004 Exam Braindumps (page: 76)

Page 76 of 140

A company processes sensitive cardholder information that is stored in an internal production database and accessed by internet-facing web servers. The company's Chief Information Security Officer (CISO) is concerned with the risks related to sensitive data exposure and wants to implement tokenization of sensitive information at the record level. The company implements a one-to-many mapping of primary credit card numbers to temporary credit card numbers.
Which of the following should the CISO consider in a tokenization system?

  1. Data field watermarking
  2. Field tagging
  3. Single-use translation
  4. Salted hashing

Answer(s): C



A network administrator receives a ticket regarding an error from a remote worker who is trying to reboot a laptop. The laptop has not yet loaded the operating system, and the user is unable to continue the boot process. The administrator is able to provide the user with a recovery PIN, and the user is able to reboot the system and access the device as needed.
Which of the following is the MOST likely cause of the error?

  1. Lockout of privileged access account
  2. Duration of the BitLocker lockout period
  3. Failure of the Kerberos time drift sync
  4. Failure of TPM authentication

Answer(s): D



A security engineer is concerned about the threat of side-channel attacks. The company experienced a past attack that degraded parts of a SCADA system, causing a fluctuation to 20,000rpm from its normal operating range. As a result, the part deteriorated more quickly than the mean time to failure. A further investigation revealed the attacker was able to determine the acceptable rpm range, and the malware would then fluctuate the rpm until the part failed.
Which of the following solutions would be BEST to prevent a side-channel attack in the future?

  1. Installing online hardware sensors
  2. Air gapping important ICS and machines
  3. Implementing a HIDS
  4. Installing a SIEM agent on the endpoint

Answer(s): B



Which of the following is the primary reason that a risk practitioner determines the security boundary prior to conducting a risk assessment?

  1. To determine the scope of the risk assessment
  2. To determine the business owner(s) of the system
  3. To decide between conducting a quantitative or qualitative analysis
  4. To determine which laws and regulations apply

Answer(s): A



Page 76 of 140



Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

michrle23 commented on November 08, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
PAKISTAN
upvote

Fatima commented on June 17, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
EUROPEAN UNION
upvote

Sysadmin commented on April 22, 2024
How can you report incorrect answers? #27 is incorrect. First and foremost is always stop the spread, and then access the damage.
UNITED STATES
upvote

Gord commented on March 19, 2024
I hardly submit reivews... but the team at Xcerts.com really deserve one. They are super professional and the quality of their study guides are good. I highly recommend it anyone preparing for their exams.
UNITED KINGDOM
upvote

9eagles commented on April 07, 2023
on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous
upvote

Change commented on December 11, 2023
Are some answers wrong
UNITED STATES
upvote

makeel commented on December 10, 2023
the questions are the same exist of another website
Anonymous
upvote

SecPro commented on October 29, 2023
Great dumps, helped me pass the exam.
Anonymous
upvote