Free CAS-004 Exam Braindumps (page: 21)

Page 21 of 159

A company undergoing digital transformation is reviewing the resiliency of a CSP and is concerned about meeting SLA requirements in the event of a CSP incident.
Which of the following would be BEST to proceed with the transformation?

  1. An on-premises solution as a backup
  2. A load balancer with a round-robin configuration
  3. A multicloud provider solution
  4. An active-active solution within the same tenant

Answer(s): C



A company has hired a security architect to address several service outages on the endpoints due to new malware. The Chief Executive Officer's laptop was impacted while working from home. The goal is to prevent further endpoint disruption. The edge network is protected by a web proxy.
Which of the following solutions should the security architect recommend?

  1. Replace the current antivirus with an EDR solution.
  2. Remove the web proxy and install a UTM appliance.
  3. Implement a deny list feature on the endpoints.
  4. Add a firewall module on the current antivirus solution.

Answer(s): A



All staff at a company have started working remotely due to a global pandemic. To transition to remote work, the company has migrated to SaaS collaboration tools. The human resources department wants to use these tools to process sensitive information but is concerned the data could be:
-Leaked to the media via printing of the documents
-Sent to a personal email address
Accessed and viewed by systems administrators
-Uploaded to a file storage site
Which of the following would mitigate the department's concerns?

  1. Data loss detection, reverse proxy, EDR, and PGP
  2. VDI, proxy, CASB, and DRM
  3. Watermarking, forward proxy, DLP, and MFA
  4. Proxy, secure VPN, endpoint encryption, and AV

Answer(s): C



A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:
-Unauthorized insertions into application development environments
-Authorized insiders making unauthorized changes to environment configurations
Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)

  1. Perform static code analysis of committed code and generate summary reports.
  2. Implement an XML gateway and monitor for policy violations.
  3. Monitor dependency management tools and report on susceptible third-party libraries.
  4. Install an IDS on the development subnet and passively monitor for vulnerable services.
  5. Model user behavior and monitor for deviations from normal.
  6. Continuously monitor code commits to repositories and generate summary logs.

Answer(s): A,F






Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

CAS-004 Exam Discussions & Posts