Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
CAS-004
Free trial
Verified
Question 26
A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:
(&(objectClass=)(objectClass=))(&(objectClass=void)(type=admin))
Which of the following would BEST mitigate this vulnerability?
- A: Network intrusion prevention
- B: Data encoding
- C: Input validation
- D: CAPTCHA
Question 27
A security consultant needs to protect a network of electrical relays that are used for monitoring and controlling the energy used in a manufacturing facility.
Which of the following systems should the consultant review before making a recommendation?
- A: CAN
- B: ASIC
- C: FPGA
- D: SCADA
Question 28
Company A acquired Company ׀’. During an audit, a security engineer found Company B's environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B's infrastructure could be integrated into Company A's security program.
Which of the following risk-handling techniques was used?
- A: Accept
- B: Avoid
- C: Transfer
- D: Mitigate
Question 29
An organization is prioritizing efforts to remediate or mitigate risks identified during the latest assessment. For one of the risks, a full remediation was not possible, but the organization was able to successfully apply mitigations to reduce the likelihood of impact.
Which of the following should the organization perform NEXT?
- A: Assess the residual risk.
- B: Update the organization's threat model.
- C: Move to the next risk in the register.
- D: Recalculate the magnitude of impact.
Question 30
A software house is developing a new application. The application has the following requirements:
✑ Reduce the number of credential requests as much as possible
✑ Integrate with social networks
✑ Authenticate users
Which of the following is the BEST federation method to use for the application?
- A: WS-Federation
- B: OpenID
- C: OAuth
- D: SAML
Question 31
A company is looking for a solution to hide data stored in databases. The solution must meet the following requirements:
✑ Be efficient at protecting the production environment
✑ Not require any change to the application
✑ Act at the presentation layer
Which of the following techniques should be used?
- A: Masking
- B: Tokenization
- C: Algorithmic
- D: Random substitution
Question 32
A forensic expert working on a fraud investigation for a US-based company collected a few disk images as evidence.
Which of the following offers an authoritative decision about whether the evidence was obtained legally?
- A: Lawyers
- B: Court
- C: Upper management team
- D: Police
Question 33
Technicians have determined that the current server hardware is outdated, so they have decided to throw it out.
Prior to disposal, which of the following is the BEST method to use to ensure no data remnants can be recovered?
- A: Drive wiping
- B: Degaussing
- C: Purging
- D: Physical destruction
Question 34
A penetration tester obtained root access on a Windows server and, according to the rules of engagement, is permitted to perform post-exploitation for persistence.
Which of the following techniques would BEST support this?
- A: Configuring systemd services to run automatically at startup
- B: Creating a backdoor
- C: Exploiting an arbitrary code execution exploit
- D: Moving laterally to a more authoritative server/service
Question 35
A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services.
Which of the following should be modified to prevent the issue from reoccurring?
- A: Recovery point objective
- B: Recovery time objective
- C: Mission-essential functions
- D: Recovery service level
Question 36
A security architect for a large, multinational manufacturer needs to design and implement a security solution to monitor traffic.
When designing the solution, which of the following threats should the security architect focus on to prevent attacks against the ׀׀¢ network?
- A: Packets that are the wrong size or length
- B: Use of any non-DNP3 communication on a DNP3 port
- C: Multiple solicited responses over time
- D: Application of an unsupported encryption algorithm
Question 37
A security administrator configured the account policies per security implementation guidelines. However, the accounts still appear to be susceptible to brute-force attacks. The following settings meet the existing compliance guidelines:
✑ Must have a minimum of 15 characters
✑ Must use one number
✑ Must use one capital letter
✑ Must not be one of the last 12 passwords used
Which of the following policies should be added to provide additional security?
- A: Shared accounts
- B: Password complexity
- C: Account lockout
- D: Password history
- E: Time-based logins
Question 38
A cybersecurity analyst discovered a private key that could have been exposed.
Which of the following is the BEST way for the analyst to determine if the key has been compromised?
- A: HSTS
- B: CRL
- C: CSRs
- D: OCSP
Question 39
Which of the following technologies allows CSPs to add encryption across multiple data storages?
- A: Symmetric encryption
- B: Homomorphic encryption
- C: Data dispersion
- D: Bit splitting
Question 40
A vulnerability scanner detected an obsolete version of an open-source file-sharing application on one of a company's Linux servers. While the software version is no longer supported by the OSS community, the company's Linux vendor backported fixes, applied them for all current vulnerabilities, and agrees to support the software in the future.
Based on this agreement, this finding is BEST categorized as a:
- A: true positive.
- B: true negative.
- C: false positive.
- D: false negative.
Question 41
A company's Chief Information Security Officer is concerned that the company's proposed move to the cloud could lead to a lack of visibility into network traffic flow logs within the VPC.
Which of the following compensating controls would be BEST to implement in this situation?
- A: EDR
- B: SIEM
- C: HIDS
- D: UEBA
Question 42
A security team received a regulatory notice asking for information regarding collusion and pricing from staff members who are no longer with the organization.
The legal department -
provided the security team with a list of search terms to investigate.
This is an example of:
- A: due diligence.
- B: e-discovery.
- C: due care.
- D: legal hold.
Question 43
Which of the following protocols is a low power, low data rate that allows for the creation of PAN networks?
- A: Zigbee
- B: CAN
- C: DNP3
- D: Modbus
Question 44
An organization's assessment of a third-party, non-critical vendor reveals that the vendor does not have cybersecurity insurance and IT staff turnover is high. The organization uses the vendor to move customer office equipment from one service location to another. The vendor acquires customer data and access to the business via an API.
Given this information, which of the following is a noted risk?
- A: Feature delay due to extended software development cycles
- B: Financial liability from a vendor data breach
- C: Technical impact to the API configuration
- D: The possibility of the vendor's business ceasing operations
Question 45
A company wants to quantify and communicate the effectiveness of its security controls but must establish measures. Which of the following is MOST likely to be included in an effective assessment roadmap for these controls?
- A: Create a change management process.
- B: Establish key performance indicators.
- C: Create an integrated master schedule.
- D: Develop a communication plan.
- E: Perform a security control assessment.
Question 46
A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped.
The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.
The technician will define this threat as:
- A: a decrypting RSA using obsolete and weakened encryption attack.
- B: a zero-day attack.
- C: an advanced persistent threat.
- D: an on-path attack.
Question 47
A bank is working with a security architect to find the BEST solution to detect database management system compromises. The solution should meet the following requirements:
✑ Work at the application layer
✑ Send alerts on attacks from both privileged and malicious users
✑ Have a very low false positive
Which of the following should the architect recommend?
- A: FIM
- B: WAF
- C: NIPS
- D: DAM
- E: UTM
Question 48
A business wants to migrate its workloads from an exclusively on-premises IT infrastructure to the cloud but cannot implement all the required controls. Which of the following BEST describes the risk associated with this implementation?
- A: Loss of governance
- B: Vendor lockout
- C: Compliance risk
- D: Vendor lock-in
Question 49
A security architect needs to implement a CASB solution for an organization with a highly distributed remote workforce. One of the requirements for the implementation includes the capability to discover SaaS applications and block access to those that are unapproved or identified as risky. Which of the following would BEST achieve this objective?
- A: Deploy endpoint agents that monitor local web traffic to enforce DLP and encryption policies.
- B: Implement cloud infrastructure to proxy all user web traffic to enforce DLP and encryption policies.
- C: Implement cloud infrastructure to proxy all user web traffic and control access according to centralized policy.
- D: Deploy endpoint agents that monitor local web traffic and control access according to centralized policy.
Question 50
During a phishing exercise, a few privileged users ranked high on the failure list. The enterprise would like to ensure that privileged users have an extra security- monitoring control in place. Which of the following is the MOST likely solution?
- A: A WAF to protect web traffic
- B: User and entity behavior analytics
- C: Requirements to change the local password
- D: A gap analysis
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!