A security officer is requiring all personnel working on a special project to obtain a security clearance requisite with the level of all information being accessed. Data on this network must be protected at the same level of each clearance holder. The need to know must be verified by the data owner. Which of the following should the security officer do to meet these requirements?
A. Create a rule to authorize personnel only from certain IPs to access the files.
B. Assign labels to the files and require formal access authorization.
C. Assign attributes to each file and allow authorized users to share the files.
D. Assign roles to users and authorize access to files based on the roles.
A company is deploying multiple VPNs to support supplier connections into its extranet applications. The network security standard requires:
1.
All remote devices to have up-to-date antivirus
2.
A HIDS
3.
An up-to-date and patched OS
Which of the following technologies should the company deploy to meet its security objectives? (Choose two.)
A. NAC
B. WAF
C. NIDS
D. Reverse proxy
E. NGFW
F. Bastion host
The Chief Information Security Officer is concerned about the possibility of employees downloading malicious files from the internet and opening them on corporate workstations. Which of the following solutions would be BEST to reduce this risk?
A. Integrate the web proxy with threat intelligence feeds.
B. Scan all downloads using an antivirus engine on the web proxy.
C. Block known malware sites on the web proxy.
D. Execute the files in the sandbox on the web proxy.
An organization offers SaaS services through a public email and storage provider. To facilitate password resets, a simple online system is set up. During a routine check of the storage each month, a significant increase in use of storage can be seen. Which of the following techniques would remediate the attack?
A. Including input sanitization to the logon page
B. Configuring an account lockout policy
C. Implementing a new password reset system
D. Adding MFA to all accounts
A security engineer has recently become aware of a Java application that processes critical information in real time on the company's network. The Java application was scanned with SAST prior to deployment, and all vulnerabilities have been mitigated. However, some known issues within the Java runtime environment cannot be resolved. Which of the following should the security engineer recommend to the developer in order to mitigate the issue with the LEAST amount of downtime?
A. Perform software composition analysis on libraries from third parties.
B. Run the application in a sandbox and perform penetration tests.
C. Rewrite and compile the application in C++ and then reinstall it.
D. Embed the current application into a virtual machine that runs on dedicated hardware.
A small software company deployed a new web application after a network security scan found no vulnerabilities. A customer using this application reported malicious activity believed to be associated with the application. During an investigation, the company discovered that the customer closed the browser tab and connected to another application, using the same credentials on both platforms.
Which of the following detection methods should the software company implement before deploying the next version?
A. Multifactor authentication
B. Static application code scanning
C. Stronger password policy
D. A SIEM
The principal security analyst for a global manufacturer is investigating a security incident related to abnormal behavior in the ICS network. A controller was restarted as part of the troubleshooting process, and the following issue was identified
when the controller was restarted:
SECURE BOOT FAILED:
FIRMWARE MISMATCH EXPECTED 0xFDC479 ACTUAL 0x79F31B
During the investigation, this modified firmware version was identified on several other controllers at the site. The official vendor firmware versions do not have this checksum. Which of the following stages of the MITRE ATTandCK framework for
ICS includes this technique?
A. Evasion
B. Persistence
C. Collection
D. Lateral movement
A systems administrator confirms that the company's remote server is providing the following list of preferred ciphers:
1.
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
2.
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)
3.
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
4.
TLS_RSA_WITH_RC4_128_SHA (0x5)
5.
TLS_RSA_WITH_RC4_128_MD5 (0x4)
Nevertheless, when the systems administrator's browser connects to the server, it negotiates TLS_RSA_WITH_RC4_128_MD5 (0x4), while all other employees' browsers negotiate TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030).
Which of the following describes a potential attack to the systems administrator's browser?
A. A cipher mismatch
B. Key rotation
C. A downgrade attack
D. A compromised key
E. Rekeying
A consultant needs access to a customer's cloud environment. The customer wants to enforce the following engagement requirements:
1.
All customer data must remain under the control of the customer at all times.
2.
Third-party access to the customer environment must be controlled by the customer.
3.
Authentication credentials and access control must be under the customer's control.
Which of the following should the consultant do to ensure all customer requirements are satisfied when accessing the cloud environment?
A. Use the customer's SSO with read-only credentials and share data using the customer's provisioned secure network storage.
B. Use the customer-provided VDI solution to perform work on the customer's environment.
C. Provide code snippets to the customer and have the customer run code and securely deliver its output.
D. Request API credentials from the customer and only use API calls to access the customer's environment.
A security team is concerned with attacks that are taking advantage of return-oriented programming against the company's public facing applications. Which of the following should the company implement on the public-facing servers?
A. WAF
B. ASLR
C. NX
D. HSM
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-004 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.