Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CAS-004 Exam Dumps - CompTIA SecurityX Certification Exam

Go to page:
Question # 49

A company would like to move its payment card data to a cloud provider. Which of the following solutions will best protect account numbers from unauthorized disclosure?

A.

Storing the data in an encoded file

B.

Implementing database encryption at rest

C.

Only storing tokenized card data

D.

Implementing data field masking

Full Access
Question # 50

A web application server is running a legacy operating system with an unpatched RCE (Remote Code Execution) vulnerability. The server cannot be upgraded until the corresponding application code is updated. Which of the following compensating controls would prevent successful exploitation?

A.

Segmentation

B.

CASB

C.

HIPS

D.

UEBA

Full Access
Question # 51

A CRM company leverages a CSP PaaS service to host and publish its SaaS product. Recently, a large customer requested that all infrastructure components must meet strict regulatory requirements, including configuration management, patch management, and life-cycle management. Which of the following organizations is responsible for ensuring those regulatory requirements are met?

A.

The CRM company

B.

The CRM company's customer

C.

The CSP

D.

The regulatory body

Full Access
Question # 52

An engineer has had scaling issues with a web application hosted on premises and would like to move to a serverless architecture. Which of the following cloud benefits would be best to utilize for this project?

A.

Cost savings for hosting

B.

Automation of resource provisioning

C.

Providing geo-redundant hosting

D.

Eliminating need to patch

Full Access
Question # 53

An organization has severallegacy systemsthat are critical to testing currently deployed assets. These systems have become aserious riskto the organization's security posture, and the securitymanager must implement protection measures to preventcritical infrastructurefrom being impacted. The systems must stayinterconnectedto allow communication with the deployed assets. Which of the following designs, if implemented, woulddecrease the most risksbut still meet the requirements?

A.

Software-defined networking

B.

Containerization

C.

Air gap

D.

Screened subnet

Full Access
Question # 54

An administrator completed remediation for all the findings of a penetration test and notifies the management team that the systems are ready to be placed back into production. Which of the following steps should the management team require the analyst to perform immediately before placing the systems back into production?

A.

Rescan for corrections/changes.

B.

Conduct the entire penetration test again.

C.

Harden the targeted systems.

D.

Ensure a host-based IPS is in place.

Full Access
Question # 55

A security architect is improving a healthcare organization's security posture. Most of the software is cloud-based, but some old applications are still running on a server on-site. Medical devices using such applications require very low latency. The most important consideration isconfidentiality, followed byavailability, and thenintegrity. Which of the following is thefirst stepthe security architect should implement to protect PII?

A.

Move the application server to a network load balancing cluster.

B.

Move the application to a CSP.

C.

Enable encryption at rest on medical devices.

D.

Install FIM on the application server.

Full Access
Question # 56

A security architect examines a section of code and discovers the following:

Which of the following changes should the security architect require before approving the code for release?

A.

Allow only alphanumeric characters for the username.

B.

Make the password variable longer to support more secure passwords.

C.

Prevent more than 20 characters from being entered.

D.

Add a password parameter to the checkUserExists function.

Full Access
Go to page: