New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CAS-004 Exam Dumps - CompTIA CASP Questions and Answers

Question # 169

A user experiences an HTTPS connection error when trying to access an Internet banking website from a corporate laptop. The user then opens a browser on a mobile phone and is able to access the same Internet banking website without issue. Which of the following security configurations is MOST likely the cause of the error?

Options:

A.

HSTS

B.

TLS 1.2

C.

Certificate pinning

D.

Client authentication

Buy Now
Question # 170

An organization mat provides a SaaS solution recently experienced an incident involving customer data loss. The system has a level of sell-healing that includes monitoring performance and available resources. When me system detects an issue, the self-healing process is supposed to restart pans of me software.

During the incident, when me self-healing system attempted to restart the services, available disk space on the data drive to restart all the services was inadequate. The self-healing system did notdetect that some services did not fully restart and declared me system as fully operational. Which of the following BEST describes me reason why the silent failure occurred?

Options:

A.

The system logs rotated prematurely.

B.

The disk utilization alarms are higher than what me service restarts require.

C.

The number of nodes in me self-healing cluster was healthy,

D.

Conditional checks prior to the service restart succeeded.

Buy Now
Question # 171

An organization developed a social media application that is used by customers in multiple remote geographic locations around the world. The organization’s headquarters and only datacenter are located in New York City. The Chief Information Security Officer wants to ensure the following requirements are met for the social media application:

Low latency for all mobile users to improve the users’ experience

SSL offloading to improve web server performance

Protection against DoS and DDoS attacks

High availability

Which of the following should the organization implement to BEST ensure all requirements are met?

Options:

A.

A cache server farm in its datacenter

B.

A load-balanced group of reverse proxy servers with SSL acceleration

C.

A CDN with the origin set to its datacenter

D.

Dual gigabit-speed Internet connections with managed DDoS prevention

Buy Now
Question # 172

A security analyst detected a malicious PowerShell attack on a single server. The malware used the Invoke-Expression function to execute an external malicious script. The security analyst scanned the disk with an antivirus application and did not find any IOCs. The security analyst now needs to deploy a protection solution against this type of malware.

Which of the following BEST describes the type of malware the solution should protect against?

Options:

A.

Worm

B.

Logic bomb

C.

Fileless

D.

Rootkit

Buy Now
Question # 173

A company is looking at sending historical backups containing customer PII to a cloud service provider to save on storage costs. Which of the following is the MOST important consideration before making this decision?

Options:

A.

Availability

B.

Data sovereignty

C.

Geography

D.

Vendor lock-in

Buy Now
Question # 174

Users are reporting intermittent access issues with & new cloud application that was recently added to the network. Upon investigation, he scary administrator notices the human resources department Is able to run required queries with the new application, but the marketing department is unable to pull any needed reports on various resources using the new application. Which of the following MOST likely needs to be done to avoid this in the future?

Options:

A.

Modify the ACLs.

B.

Review the Active Directory.

C.

Update the marketing department's browser.

D.

Reconfigure the WAF.

Buy Now
Question # 175

The security team is looking into aggressive bot behavior that is resulting in performance issues on the web server After further investigation, the security engineer determines that the bot traffic is legitimate. Which of the following is the best course of action to reduce performance issues without allocating additional resources to the server?

Options:

A.

Block all bot traffic using the IPS.

B.

Monitor legitimate SEO bot traffic for abnormalities.

C.

Configure the WAF to rate-limit bot traffic.

D.

Update robots.txt to slow down the crawling speed.

Buy Now
Question # 176

A mobile device hardware manufacturer receives the following requirements from a company that wants to produce and sell a new mobile platform:

•The platform should store biometric data.

•The platform should prevent unapproved firmware from being loaded.

• A tamper-resistant, hardware-based counter should track if unapproved firmware was loaded.

Which of the following should the hardware manufacturer implement? (Select three).

Options:

A.

ASLR

B.

NX

C.

eFuse

D.

SED

E.

SELinux

F.

Secure boot

G.

Shell restriction

Buy Now
Question # 177

An application engineer is using the Swagger framework to leverage REST APIs to authenticate endpoints. The engineer is receiving HTTP 403 responses. Which of the following should the engineer do to correct this issue? (Select two).

Options:

A.

Obtain a security token.

B.

Obtain a public key.

C.

Leverage Kerberos for authentication

D.

Leverage OAuth for authentication.

E.

Leverage LDAP for authentication.

F.

Obtain a hash value.

Buy Now
Question # 178

A security consultant needs to set up wireless security for a small office that does not have Active Directory. Despite the lack of central account management, the office manager wants to ensure a high level of defense to prevent brute-force attacks against wireless authentication. Which of the following technologies wouldbestmeet this need?

Options:

A.

Faraday cage

B.

WPA2 PSK

C.

WPA3 SAE

D.

WEP 128 bit

Buy Now
Question # 179

A security architect needs to enable a container orchestrator for DevSecOps and SOAR initiatives. The engineer has discovered that several Ansible YAML files used for the automation of configuration management have the following content:

Which of the following should the engineer do to correct the security issues presented within this content?

Options:

A.

Update the kubernetes.core. k8s module to kubernetes.core.k8s_service in the main.yml file.

B.

Update the COMPTIACOI hostname to localhost using the hostnamectl command.

C.

Update the state: present module to state: absent in the main.yml file.

D.

Update or remove the ansible. cf g file.

Buy Now
Question # 180

A security analyst is examining a former employee's laptop for suspected evidence of suspicious activity. The analyst usesddduring the investigation. Which of the following best explains why the analyst is using this tool?

Options:

A.

To capture an image of the hard drive

B.

To reverse engineer binary programs

C.

To recover deleted logs from the laptop

D.

To deduplicate unnecessary data from the hard drive

Buy Now
Question # 181

During a software assurance assessment, an engineer notices the source code contains multiple instances of strcpy. which does not verify the buffer length. Which of the following solutions should be integrated into the SDLC process to reduce future risks?

Options:

A.

Require custom IDS/IPS detection signatures for each type of insecure function found.

B.

Perform a penetration test before moving to the next step of the SDLC.

C.

Update the company's secure coding policy to exclude insecure functions.

D.

Perform DAST/SAST scanning before handoff to another team.

Buy Now
Question # 182

A security administrator at a global organization wants to update password complexity rules for a system containing personally identifiable information. Which of the following would be the best resource for this information?

Options:

A.

NIST

B.

GDPR

C.

CMMI

D.

COPPA

Buy Now
Question # 183

An organization is rolling out a robust vulnerability management system to monitor SCADA devices on the network. Which of the following scan types should be used to monitor these system types?

Options:

A.

Web application

B.

Agent

C.

Passive

D.

Authenticated

Buy Now
Exam Code: CAS-004
Exam Name: CompTIA SecurityX Certification Exam
Last Update: Jan 7, 2026
Questions: 619
CAS-004 pdf

CAS-004 PDF

$25.5  $84.99
CAS-004 Engine

CAS-004 Testing Engine

$28.5  $94.99
CAS-004 PDF + Engine

CAS-004 PDF + Testing Engine

$40.5  $134.99