A systems administrator at a web-hosting provider has been tasked with renewing the public certificates of all customer sites. Which of the following would BEST support multiple domain names while minimizing the amount of certificates needed?
A. ocsp
B. CRL
C. SAN
D. CA
A security architect is tasked with securing a new cloud-based videoconferencing and collaboration platform to support a new distributed workforce. The security architect's key objectives are to:
1.
Maintain customer trust
2.
Minimize data leakage
3.
Ensure non-repudiation
Which of the following would be the BEST set of recommendations from the security architect?
A. Enable the user authentication requirement, enable end-to-end encryption, and enable waiting rooms.
B. Disable file exchange, enable watermarking, and enable the user authentication requirement.
C. Enable end-to-end encryption, disable video recording, and disable file exchange.
D. Enable watermarking, enable the user authentication requirement, and disable video recording.
Which of the following objectives BEST supports leveraging tabletop exercises in business continuity planning?
A. Determine the optimal placement of hot/warm sites within the enterprise architecture.
B. Create new processes for identified gaps in continuity planning.
C. Establish new staff roles and responsibilities for continuity of operations.
D. Assess the effectiveness of documented processes against a realistic scenario.
A security researcher detonated some malware in a lab environment and identified the following commands running from the EDR tool:
With which of the following MITRE ATTandCK TTPs is the command associated? (Select TWO).
A. Indirect command execution
B. OS credential dumping
C. Inhibit system recovery
D. External remote services
E. System information discovery
F. Network denial of service
A cloud security engineer is setting up a cloud-hosted WAF. The engineer needs to implement a solution to protect the multiple websites the organization hosts. The organization websites are:
1.
www.mycompany.org
2.
www.mycompany.com
3.
campus.mycompany.com
4.
wiki. mycompany.org
The solution must save costs and be able to protect all websites. Users should be able to notify the cloud security engineer of any on-path attacks. Which of the following is the BEST solution?
A. Purchase one SAN certificate.
B. Implement self-signed certificates.
C. Purchase one certificate for each website.
D. Purchase one wildcard certificate.
A developer needs to implement PKI in an autonomous vehicle's software in the most efficient and labor-effective way possible. Which of the following will the developer MOST likely implement?
A. Certificate chain
B. Root CA
C. Certificate pinning
D. CRL
E. OCSP
The Chief Information Security Officer (CISO) is working with a new company and needs a legal "document to ensure all parties understand their roles during an assessment. Which of the following should the CISO have each party sign?
A. SLA
B. ISA
C. Permissions and access
D. Rules of engagement
An organization mat provides a SaaS solution recently experienced an incident involving customer data loss. The system has a level of sell-healing that includes monitoring performance and available resources. When me system detects an issue, the self-healing process is supposed to restart pans of me software.
During the incident, when me self-healing system attempted to restart the services, available disk space on the data drive to restart all the services was inadequate. The self- healing system did not detect that some services did not fully restart and declared me system as fully operational. Which of the following BEST describes me reason why the silent failure occurred?
A. The system logs rotated prematurely.
B. The disk utilization alarms are higher than what me service restarts require.
C. The number of nodes in me self-healing cluster was healthy,
D. Conditional checks prior to the service restart succeeded.
A security analyst is reviewing a new IOC in which data is injected into an online process. The IOC shows the data injection could happen in the following ways:
1.
Five numerical digits followed by a dash, followed by four numerical digits; or
2.
Five numerical digits
When one of these IOCs is identified, the online process stops working. Which of the following regular expressions should be implemented in the NIPS?
A. ^\d{4}(-\d{5})?$
B. ^\d{5}(-\d{4})?$
C. ^\d{5-4}$
D. ^\d{9}$
A cloud security architect has been tasked with finding a solution for hardening VMS. The solution must meet the following requirements:
1.
Data needs to be stored outside of the VMS.
2.
No unauthorized modifications to the VMS are allowed
3.
If a change needs to be done, a new VM needs to be deployed.
Which of the following is the BEST solution?
A. Immutable system
B. Data loss prevention
C. Storage area network
D. Baseline template
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-004 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.