Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CAS-004 Exam Dumps - CompTIA SecurityX Certification Exam

Go to page:
Question # 57

Which of the following is record-level encryption commonly used to do?

A.

Protect database fields

B.

Protect individual files

C.

Encrypt individual packets

D.

Encrypt the master boot record

Full Access
Question # 58

Which of the following technologies would benefit the most from the use of biometric readers proximity badge entry systems, and the use of hardware security tokens to access various environments and data entry systems?

A.

Deep learning

B.

Machine learning

C.

Nanotechnology

D.

Passwordless authentication

E.

Biometric impersonation

Full Access
Question # 59

A software development company wants to ensure that users can confirm the software is legitimate when installing it. Which of the following is the best way for the company to achieve this security objective?

A.

Code signing

B.

Non-repudiation

C.

Key escrow

D.

Private keys

Full Access
Question # 60

A Chief Information Security Officer (CISO) reviewed data from a cyber exercise that examined all aspects of the company's response plan. Which of the following best describes what the CISO reviewed?

A.

An after-action report

B.

A tabletop exercise

C.

A system security plan

D.

A disaster recovery plan

Full Access
Question # 61

An organization develops a social media application that is used by customers in multiple remote geographic locations around the world. The organization's headquarters and only data center are located in New York City. The Chief Information Security Officer wants to ensure the following requirements are met for the social media application:

Low latencyfor all mobile users to improve the users' experience

SSL offloadingto improve web server performance

Protection against DoS and DDoS attacks

High availability

Which of the following should the organization implement tobestensure all requirements are met?

A.

A cache server farm in its data center

B.

A load-balanced group of reverse proxy servers with SSL acceleration

C.

A CDN with the origin set to its data center

D.

Dual gigabit-speed internet connections with managed DDoS prevention

Full Access
Question # 62

A security technician is trying to connect a remote site to the central office over a site-to-site VPN. The technician has verified the source and destination IP addresses are correct, but the technician is unable to get the remote site to connect. The following error message keeps repeating:

"An error has occurred during Phase 1 handshake. Deleting keys and retrying..."

Which of the following is most likely the reason the connection is failing?

A.

The IKE hashing algorithm uses different key lengths on each VPN device.

B.

The IPSec settings allow more than one cipher suite on both devices.

C.

The Diffie-Hellman group on both sides matches but is a legacy group.

D.

The remote VPN is attempting to connect with a protocol other than SSL/TLS.

Full Access
Question # 63

A security analyst is configuring an IPSec tunnel to use the strongest encryption currently available. Which of the following algorithms should be deployed to provide the most secure initial key exchange?

A.

3DES

B.

ECDSA

C.

ECDH

D.

AES

Full Access
Question # 64

A recent security assessment generated a recommendation to transition Wi-Fi to WPA2/WPA3 Enterprise requiring EAP-TLS. Which of the following conditions must be met for the organization's mobile devices to be able to successfully join the corporate wireless network?

A.

Client computer X.509 certificates have been installed.

B.

Supplicants are configured to provide a 64-bit authenticator.

C.

A hardware TOTP token has been issued to mobile users.

D.

The device's IPSec configuration matches the VPN concentrator.

Full Access
Go to page: