Free CompTIA CAS-004 Exam Braindumps (page: 33)

A security consultant needs to set up wireless security for a small office that does not have Active Directory. Despite the lack of central account management, the office manager wants to ensure a high level of defense to prevent brute-force attacks against wireless authentication.
Which of the following technologies would BEST meet this need?

  1. Faraday cage
  2. WPA2 PSK
  3. WPA3 SAE
  4. WEP 128 bit

Answer(s): C



An attack team performed a penetration test on a new smart card system. The team demonstrated that by subjecting the smart card to high temperatures, the secret key could be revealed.
Which of the following side-channel attacks did the team use?

  1. Differential power analysis
  2. Differential fault analysis
  3. Differential temperature analysis
  4. Differential timing analysis

Answer(s): B


Reference:

https://www.hitachi-hightech.com/global/products/science/tech/ana/thermal/descriptions/dta.html



A security compliance requirement states that specific environments that handle sensitive data must be protected by need-to-know restrictions and can only connect to authorized endpoints. The requirement also states that a DLP solution within the environment must be used to control the data from leaving the environment.
Which of the following should be implemented for privileged users so they can support the environment from their workstations while remaining compliant?

  1. NAC to control authorized endpoints
  2. FIM on the servers storing the data
  3. A jump box in the screened subnet
  4. A general VPN solution to the primary network

Answer(s): C



A networking team was asked to provide secure remote access to all company employees. The team decided to use client-to-site VPN as a solution. During a discussion, the Chief Information Security Officer raised a security concern and asked the networking team to route the Internet traffic of remote users through the main office infrastructure. Doing this would prevent remote users from accessing the Internet through their local networks while connected to the VPN.
Which of the following solutions does this describe?

  1. Full tunneling
  2. Asymmetric routing
  3. SSH tunneling
  4. Split tunneling

Answer(s): A






Post your Comments and Discuss CompTIA CAS-004 exam prep with other Community members:

CAS-004 Exam Discussions & Posts