Free CAS-004 Exam Braindumps (page: 78)

Page 78 of 140

A company is designing a new system that must have high security. This new system has the following requirements:
• Permissions must be assigned based on role.
• Fraud from a single person must be prevented.
• A single entity must not have full access control.
Which of the following can the company use to meet these requirements?

  1. Dual responsibility
  2. Separation of duties
  3. Need to know
  4. Least privilege

Answer(s): B



A Chief Security Officer (CSO) is concerned about the number of successful ransomware attacks that have hit the company. The data indicates most of the attacks came through a fake email. The company has added training, and the CSO now wants to evaluate whether the training has been successful.
Which of the following should the CSO implement?

  1. Simulating a spam campaign
  2. Conducting a sanctioned vishing attack
  3. Performing a risk assessment
  4. Executing a penetration test

Answer(s): A



A company hosts a large amount of data in blob storage for its customers. The company recently had a number of issues with this data being prematurely deleted before the scheduled backup processes could be completed. The management team has asked the security architect for a recommendation that allows blobs to be deleted occasionally, but only after a successful backup.
Which of the following solutions will BEST meet this requirement?

  1. Mirror the blobs at a local data center.
  2. Enable fast recovery on the storage account.
  3. Implement soft delete for blobs.
  4. Make the blob immutable.

Answer(s): D



To save time, a company that is developing a new VPN solution has decided to use the OpenSSL library within its proprietary software.
Which of the following should the company consider to maximize risk reduction from vulnerabilities introduced by OpenSSL?

  1. Include stable, long-term releases of third-party libraries instead of using newer versions.
  2. Ensure the third-party library implements the TLS and disable weak ciphers.
  3. Compile third-party libraries into the main code statically instead of using dynamic loading.
  4. Implement an ongoing, third-party software and library review and regression testing.

Answer(s): D



Page 78 of 140



Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

michrle23 commented on November 08, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
PAKISTAN
upvote

Fatima commented on June 17, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
EUROPEAN UNION
upvote

Sysadmin commented on April 22, 2024
How can you report incorrect answers? #27 is incorrect. First and foremost is always stop the spread, and then access the damage.
UNITED STATES
upvote

Gord commented on March 19, 2024
I hardly submit reivews... but the team at Xcerts.com really deserve one. They are super professional and the quality of their study guides are good. I highly recommend it anyone preparing for their exams.
UNITED KINGDOM
upvote

9eagles commented on April 07, 2023
on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous
upvote

Change commented on December 11, 2023
Are some answers wrong
UNITED STATES
upvote

makeel commented on December 10, 2023
the questions are the same exist of another website
Anonymous
upvote

SecPro commented on October 29, 2023
Great dumps, helped me pass the exam.
Anonymous
upvote