Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Exactprep CAS-004 Questions

Page: 21 / 43
Total 571 questions

CompTIA SecurityX Certification Exam Questions and Answers

Question 81

A security engineer is working for a service provider and analyzing logs and reports from a new EDR solution, which is installed on a small group of workstations. Later that day, another security engineer receives an email from two developers reporting the software being used for development activities is now blocked. The developers have not made any changes to the software being used. Which of the following is the EDR reporting?

Options:

A.

True positive

B.

False negative

C.

False positive

D.

True negative

Question 82

A company that provides services to clients who work with highly sensitive data would like to provide assurance that the data’s confidentiality is maintained in a dynamic, low-risk environment. Which of the following would best achieve this goal? (Select two).

Options:

A.

Install a SOAR on all endpoints.

B.

Hash all files.

C.

Install SIEM within a SOC.

D.

Encrypt all data and files at rest, in transit, and in use.

E.

Configure SOAR to monitor and intercept files and data leaving the network.

F.

Implement file integrity monitoring.

Question 83

The information security manager at a 24-hour manufacturing facility is reviewing a contract for potential risks to the organization. The contract pertains to the support of printers and multifunction devices during non-standard business hours. Which of the following will the security manager most likely identify as a risk?

Options:

A.

Print configurations settings for locked print jobs

B.

The lack of an NDA with the company that supports its devices

C.

The lack of an MSA to govern other services provided by the service provider

D.

The lack of chain of custody for devices prior to deployment at the company

Question 84

A user logged in to a web application. Later, a SOC analyst noticed the user logged in to systems after normal business hours. The end user confirms the log-ins after hours were unauthorized. Following an investigation, the SOC analyst determined that the web server was running an outdated version of OpenSSL. No other suspicious user log-ins were found. Which of the following describes what happened and how to fix it?

Options:

A.

A downgrade attack occurred. Any use of old, outdated software should be disallowed.

B.

The attacker obtained the systems' private keys. New key pairs must be generated.

C.

Malware is present on the client machine. A full OS needs to be reinstalled.

D.

The user fell for a phishing attack. The end user must attend security training.

Page: 21 / 43
Total 571 questions