The Most Update CompTIA CASP+ CAS-004 Dumps Questions

The Most Update CompTIA CASP+ CAS-004 Dumps Questions

The latest CompTIA CASP+ CAS-004 Dumps Questions are new updated for your best preparation. FreeTestShare has put up a comprehensive collection of CAS-004 Dumps Questions to guide you through real questions and answers to help you prepare for the CompTIA CASP+ Exam. We have updated our CompTIA CASP+ CAS-004 Dumps Questions to include new practice test questions and answers that will ensure you prepare the CompTIA Advanced Security Practitioner (CASP+) Exam easily. All of the new CompTIA CASP+ CAS-004 Dumps Questions can assist you in determining your proficiency. You can easily learn everything to ensure that you pass the CompTIA CASP+ CAS-004 test.

These free CAS-004 test questions are just a sample of what we have to offer.

Page 1 of 5

1. A systems administrator is preparing to run a vulnerability scan on a set of information systems in the organization. The systems administrator wants to ensure that the targeted systems produce accurate information especially regarding configuration settings.

Which of the following scan types will provide the systems administrator with the MOST accurate information?

2. A security engineer at a company is designing a system to mitigate recent setbacks caused competitors that are beating the company to market with the new products. Several of the products incorporate propriety enhancements developed by the engineer’s company. The network already includes a SEIM and a NIPS and requires 2FA for all user access.

Which of the following system should the engineer consider NEXT to mitigate the associated risks?

3. A security architect is reviewing the following proposed corporate firewall architecture and configuration:





Both firewalls are stateful and provide Layer 7 filtering and routing.

The company has the following requirements:

Web servers must receive all updates via HTTP/S from the corporate network.

Web servers should not initiate communication with the Internet.

Web servers should only connect to preapproved corporate database servers.

Employees’ computing devices should only connect to web services over ports 80 and 443.

Which of the following should the architect recommend to ensure all requirements are met in the MOST secure manner? (Choose two.)

4. Which of the following agreements includes no penalties and can be signed by two entities that are working together toward the same goal?

5. Which of the following are risks associated with vendor lock-in? (Choose two.)

6. An organization’s hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.

Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?

7. A company is repeatedly being breached by hackers who valid credentials. The company’s Chief information Security Officer (CISO) has installed multiple controls for authenticating users, including biometric and token-based factors. Each successive control has increased overhead and complexity but has failed to stop further breaches. An external consultant is evaluating the process currently in place to support the authentication controls.

Which of the following recommendation would MOST likely reduce the risk of unauthorized access?

8. During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels.

Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?

9. Device event logs sources from MDM software as follows:





Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?

10. A security engineer is hardening a company’s multihomed SFTP server.

When scanning a public-facing network interface, the engineer finds the following ports are open:

22

25

110

137

138

139

445

Internal Windows clients are used to transferring files to the server to stage them for customer download as part of the company’s distribution process.

Which of the following would be the BEST solution to harden the system?


 

Share this post

Leave a Reply

Your email address will not be published. Required fields are marked *