最新的CompTIA Advanced Security Practitioner (CASP+) - CAS-004免費考試真題

問題1
A security architect works for a manufacturing organization that has many different branch offices. The architect is looking for a way to reduce traffic and ensure the branch offices receive the latest copy of revoked certificates issued by the CA at the organization's headquarters location. The solution must also have the lowest power requirement on the CA.
Which of the following is the BEST solution?

正確答案: A
說明:(僅 PDFExamDumps 成員可見)
問題2
Which of the following processes involves searching and collecting evidence during an investigation or lawsuit?

正確答案: B
說明:(僅 PDFExamDumps 成員可見)
問題3
An analyst determined that the current process for manually handling phishing attacks within the company is ineffective. The analyst is developing a new process to ensure phishing attempts are handled internally in an appropriate and timely manner. One of the analyst's requirements is that a blocklist be updated automatically when phishing attempts are identified. Which of the following would help satisfy this requirement?

正確答案: A
說明:(僅 PDFExamDumps 成員可見)
問題4
Which of the following are risks associated with vendor lock-in? (Choose two.)

正確答案: B,E
說明:(僅 PDFExamDumps 成員可見)
問題5
An application server was recently upgraded to prefer TLS 1.3, and now users are unable to connect their clients to the server. Attempts to reproduce the error are confirmed, and clients are reporting the following:
ERR_SSL_VERSION_OR_CIPHER_MISMATCH
Which of the following is MOST likely the root cause?

正確答案: A
說明:(僅 PDFExamDumps 成員可見)
問題6
A help desk technician is troubleshooting an issue with an employee's laptop that will not boot into its operating system. The employee reported the laptop had been stolen but then found it one day later. The employee has asked the technician for help recovering important data. The technician has identified the following:
* The laptop operating system was not configured with BitLocker.
* The hard drive has no hardware failures.
* Data is present and readable on the hard drive, although it appears to be illegible.
Which of the following is the most likely reason the technician is unable to retrieve legible data from the hard drive?

正確答案: B
問題7
A mobile device hardware manufacturer receives the following requirements from a company that wants to produce and sell a new mobile platform:
*The platform should store biometric data.
*The platform should prevent unapproved firmware from being loaded.
* A tamper-resistant, hardware-based counter should track if unapproved firmware was loaded.
Which of the following should the hardware manufacturer implement? (Select three).

正確答案: B,C,D
說明:(僅 PDFExamDumps 成員可見)
問題8
Which of the following technologies would need to be in an unmanaged state to perform forensic analysis on a laptop with an unknown encryption key?

正確答案: C
說明:(僅 PDFExamDumps 成員可見)
問題9
A recent security assessment generated a recommendation to transition Wi-Fi to WPA2/WPA3 Enterprise requiring EAP-TLS. Which of the following conditions must be met for the organization's mobile devices to be able to successfully join the corporate wireless network?

正確答案: A
說明:(僅 PDFExamDumps 成員可見)
問題10
The IT team suggests the company would save money by using self-signed certificates, but the security team indicates the company must use digitally signed third-party certificates. Which of the following is a valid reason to pursue the security team's recommendation?

正確答案: C
說明:(僅 PDFExamDumps 成員可見)
問題11
An organization wants to perform a scan of all its systems against best practice security configurations.
Which of the following SCAP standards, when combined, will enable the organization to view each of the configuration checks in a machine-readable checklist format for fill automation? (Choose two.)

正確答案: B,F
說明:(僅 PDFExamDumps 成員可見)
問題12
A security technician is investigating a system that tracks inventory via a batch update each night. The technician is concerned that the system poses a risk to the business, as errors are occasionally generated and reported inventory appears incorrect. The following output log is provided:

The technician reviews the output of the batch job and discovers that the inventory was never less than zero, and the final inventory was 100 rather than 60. Which of the following should the technician do to resolve this issue?

正確答案: B
問題13
A security engineer would like to control configurations on mobile devices while fulfilling the following requirements:
* Support and control Apple and Android devices.
* The device must be corporate-owned.
Which of the following would enable the engineer to meet these requirements? (Select two).

正確答案: B,F
問題14
A control systems analyst is reviewing the defensive posture of engineering workstations on the shop floor.
Upon evaluation, the analyst makes the following observations:
* Unsupported, end-of-life operating systems were still prevalent on the shop floor.
* There are no security controls for systems with supported operating systems.
* There is little uniformity of installed software among the workstations.
Which of the following would have the greatest impact on the attack surface?

正確答案: B
說明:(僅 PDFExamDumps 成員可見)
問題15
Due to internal resource constraints, the management team has asked the principal security architect to recommend a solution that shifts most of the responsibility for application-level controls to the cloud provider. In the shared responsibility model, which of the following levels of service meets this requirement?

正確答案: D
問題16
Which of the following is the reason why security engineers often cannot upgrade the security of embedded facility automation systems?

正確答案: B
說明:(僅 PDFExamDumps 成員可見)
問題17
A company plans to build an entirely remote workforce that utilizes a cloud-based infrastructure. The Chief Information Security Officer asks the security engineer to design connectivity to meet the following requirements:
Only users with corporate-owned devices can directly access servers hosted by the cloud provider.
The company can control what SaaS applications each individual user can access.
User browser activity can be monitored.
Which of the following solutions would BEST meet these requirements?

正確答案: A
說明:(僅 PDFExamDumps 成員可見)

專業認證

PDFExamDumps模擬測試題具有最高的專業技術含量,只供具有相關專業知識的專家和學者學習和研究之用。

品質保證

該測試已取得試題持有者和第三方的授權,我們深信IT業的專業人員和經理人有能力保證被授權産品的質量。

輕松通過

如果妳使用PDFExamDumps題庫,您參加考試我們保證96%以上的通過率,壹次不過,退還購買費用!

免費試用

PDFExamDumps提供每種産品免費測試。在您決定購買之前,請試用DEMO,檢測可能存在的問題及試題質量和適用性。