Free CAS-004 Exam Braindumps (page: 4)

Page 4 of 159

Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?

  1. Key sharing
  2. Key distribution
  3. Key recovery
  4. Key escrow

Answer(s): B


Reference:

https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48322§ion=1.3



An organization is implementing a new identity and access management architecture with the following objectives:
-Supporting MFA against on-premises infrastructure
-Improving the user experience by integrating with SaaS applications
-Applying risk-based policies based on location
-Performing just-in-time provisioning
Which of the following authentication protocols should the organization implement to support these requirements?

  1. Kerberos and TACACS
  2. SAML and RADIUS
  3. OAuth and OpenID
  4. OTP and 802.1X

Answer(s): B


Reference:

https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/migrate-application-authentication-to-azure-active-directory



Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext?

  1. Lattice-based cryptography
  2. Quantum computing
  3. Asymmetric cryptography
  4. Homomorphic encryption

Answer(s): D


Reference:

https://searchsecurity.techtarget.com/definition/cryptanalysis



A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company's services to ensure false positives do not drop legitimate traffic.
Which of the following would satisfy the requirement?

  1. NIDS
  2. NIPS
  3. WAF
  4. Reverse proxy

Answer(s): A


Reference:

https://subscription.packtpub.com/book/networking-and-servers/9781782174905/5/ch05lvl1sec38/differentiating-between-nids-and-nips






Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

CAS-004 Exam Discussions & Posts