Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CAS-004 Leak Questions

Page: 12 / 43
Total 571 questions

CompTIA SecurityX Certification Exam Questions and Answers

Question 45

An organization is designing a MAC scheme (or critical servers running GNU/Linux. The security engineer is investigating SELinux but is confused about how to read labeling contexts. The engineer executes the command stat ./secretfile and receives the following output:

Which of the following describes the correct order of labels shown in the output above?

Options:

A.

Role, type MLS level, and user identity

B.

Role, user identity, object, and MLS level

C.

Object MLS level, role, and type

D.

User identity, role, type, and MLS level

E.

Object, user identity, role, and MLS level

Question 46

A security team is creating tickets to track the progress of remediation. Which of the following is used to specify the due dates for high- and critical-priority findings?

Options:

A.

MSA

B.

SLA

C.

ISA

D.

MOU

Question 47

A security analyst is reviewing the following output from a vulnerability scan of an organization's internet-facing web services:

•Line 06: Hostname sent via SNI does not match certificate.

•Line 10: Certificate not validated by OCSP.

•Line 13: Weak SHA-1 signature algorithm detected.

•Line 17: TLS 1.2 cipher suite negotiated.

•Line 18: SSL session not using forward secrecy.

Which of the following indicates a susceptibility whereby an attacker can take advantage of the trust relationship between the client and the server?

Options:

A.

Line 06

B.

Line 10

C.

Line 13

D.

Line 18

Question 48

A security architect is working with a new customer to find a vulnerability assessment solution that meets the following requirements:

• Fast scanning

• The least false positives possible

• Signature-based

• A low impact on servers when performing a scan

In addition, the customer has several screened subnets, VLANs, and branch offices. Which of the following will best meet the customer's needs?

Options:

A.

Authenticated scanning

B.

Passive scanning

C.

Unauthenticated scanning

D.

Agent-based scanning

Page: 12 / 43
Total 571 questions