Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Test Free

CAS-004 Practice Test Free

Table of Contents

Toggle
  • CAS-004 Practice Test Free – 50 Real Exam Questions to Boost Your Confidence
  • Free Access Full CAS-004 Practice Test Free Questions

CAS-004 Practice Test Free – 50 Real Exam Questions to Boost Your Confidence

Preparing for the CAS-004 exam? Start with our CAS-004 Practice Test Free – a set of 50 high-quality, exam-style questions crafted to help you assess your knowledge and improve your chances of passing on the first try.

Taking a CAS-004 practice test free is one of the smartest ways to:

  • Get familiar with the real exam format and question types
  • Evaluate your strengths and spot knowledge gaps
  • Gain the confidence you need to succeed on exam day

Below, you will find 50 free CAS-004 practice questions to help you prepare for the exam. These questions are designed to reflect the real exam structure and difficulty level. You can click on each Question to explore the details.

Question 1

Ransomware encrypted the entire human resources fileshare for a large financial institution. Security operations personnel were unaware of the activity until it was too late to stop it. The restoration will take approximately four hours, and the last backup occurred 48 hours ago. The management team has indicated that the
RPO for a disaster recovery event for this data classification is 24 hours.
Based on RPO requirements, which of the following recommendations should the management team make?

A. Leave the current backup schedule intact and pay the ransom to decrypt the data.

B. Leave the current backup schedule intact and make the human resources fileshare read-only.

C. Increase the frequency of backups and create SIEM alerts for IOCs.

D. Decrease the frequency of backups and pay the ransom to decrypt the data.

 


Suggested Answer: C

Community Answer: C

 

Question 2

A vulnerability analyst identified a zero-day vulnerability in a company's internally developed software. Since the current vulnerability management system does not have any checks for this vulnerability, an engineer has been asked to create one.
Which of the following would be BEST suited to meet these requirements?

A. ARF

B. ISACs

C. Node.js

D. OVAL

 


Suggested Answer: D

Community Answer: D

 

Question 3

A cyberanalyst has been tasked with recovering PDF files from a provided image file. Which of the following is the BEST file-carving tool for PDF recovery?

A. objdump

B. Strings

C. dd

D. Foremost

 


Suggested Answer: D

Community Answer: D

 

Question 4

Which of the following industrial protocols is most likely to be found in public utility applications, such as water or electric?

A. CIP

B. Zigbee

C. Modbus

D. DNP3

 


Suggested Answer: D

Community Answer: D

 

Question 5

A security analyst is investigating unapproved cloud services that are being used in the organization. Which of the following would best allow for discovery of shadow IT?

A. Monitoring for sign-up emails of cloud services

B. Centralizing WAF deployment in the data center

C. Setting up a reverse proxy and web filtering software

D. Performing attack surface analysis

 


Suggested Answer: A

Community Answer: C

 

Question 6

A DevOps team has deployed databases, event-driven services, and an API gateway as PaaS solution that will support a new billing system.
Which of the following security responsibilities will the DevOps team need to perform?

A. Securely configure the authentication mechanisms.

B. Patch the infrastructure at the operating system.

C. Execute port scanning against the services.

D. Upgrade the service as part of life-cycle management.

 


Suggested Answer: A

Community Answer: A

 

Question 7

A systems administrator was given the following IOC to detect the presence of a malicious piece of software communicating with its command-and-control server:
POST /malicious.php -
User-Agent: Malicious Tool V 1.0
Host: www.malicious.com -
The IOC documentation suggests the URL is the only part that could change. Which of the following regular expressions would allow the systems administrator to determine if any of the company hosts are compromised, while reducing false positives?

A. User-Agent: Malicious Tool.*

B. www.malicious.com/malicious.php

C. Post /malicious.php

D. Host: [a-z]*.malicious.com

E. malicious.*

 


Suggested Answer: D

Community Answer: A

 

Question 8

Users are reporting intermittent access issues with a new cloud application that was recently added to the network. Upon investigation, the security administrator notices the human resources department is able to run required queries with the new application, but the marketing department is unable to pull any needed reports on various resources using the new application. Which of the following MOST likely needs to be done to avoid this in the future?

A. Modify the ACLs.

B. Review the Active Directory.

C. Update the marketing department’s browser.

D. Reconfigure the WAF.

 


Suggested Answer: A

Community Answer: A

 

Question 9

A vulnerability scanner detected an obsolete version of an open-source file-sharing application on one of a company's Linux servers. While the software version is no longer supported by the OSS community, the company's Linux vendor backported fixes, applied them for all current vulnerabilities, and agrees to support the software in the future.
Based on this agreement, this finding is BEST categorized as a:

A. true positive.

B. true negative.

C. false positive.

D. false negative.

 


Suggested Answer: C

Community Answer: C

 

Question 10

A security compliance requirement states that specific environments that handle sensitive data must be protected by need-to-know restrictions and can only connect to authorized endpoints. The requirement also states that a DLP solution within the environment must be used to control the data from leaving the environment.
Which of the following should be implemented for privileged users so they can support the environment from their workstations while remaining compliant?

A. NAC to control authorized endpoints

B. FIM on the servers storing the data

C. A jump box in the screened subnet

D. A general VPN solution to the primary network

 


Suggested Answer: D

Community Answer: C

 

Question 11

An organization needs to disable TLS 1.0 on a retail website. Which of the following best explains the reason for this action?

A. Payment card industry compliance requires the change.

B. Digital certificates are dependent on a newer protocol.

C. Most browser manufacturers are ending legacy support.

D. The application software no longer supports TLS 1.0.

 


Suggested Answer: A

Community Answer: A

 

Question 12

Which of the following is the best reason for obtaining file hashes from a confiscated laptop?

A. To prevent metadata tampering on each file

B. To later validate the integrity of each file

C. To generate unique identifiers for each file

D. To preserve the chain of custody of files

 


Suggested Answer: B

 

Question 13

A security analyst received a report that a suspicious flash drive was picked up in the office's waiting area, located beyond the secured door. The analyst investigated the drive and found malware designed to harvest and transmit credentials. Security cameras in the area where the flash drive was discovered showed a vendor representative dropping the drive. Which of the following should the analyst recommend as an additional way to identify anyone who enters the building, in the event the camera system fails?

A. Employee badge logs

B. Phone call logs

C. Vehicle registration logs

D. Visitor logs

 


Suggested Answer: D

Community Answer: D

 

Question 14

A network administrator for a completely air-gapped and closed system has noticed that anomalous external files have been uploaded to one of the critical servers. The administrator has reviewed logs in the SIEM that were collected from security appliances, network infrastructure devices, and endpoints. Which of the following processes, if executed, would be MOST likely to expose an attacker?

A. Reviewing video from IP cameras within the facility

B. Reconfiguring the SIEM connectors to collect data from the perimeter network hosts

C. Implementing integrity checks on endpoint computing devices

D. Looking for privileged credential reuse on the network

 


Suggested Answer: D

Community Answer: A

 

Question 15

A security researcher identified the following messages while testing a web application:
/file/admin/myprofile.php ERROR file does not exist.
/file/admin/userinfo.php ERROR file does not exist.
/file/admin/adminprofile.php ERROR file does not exist.
/file/admin/admininfo.php ERROR file does not exist.
/file/admin/universalprofile.php ERROR file does not exist.
/file/admin/universalinfo.php ERROR file does not exist.
/file/admin/restrictedprofile.php ACCESS is denied.
/file/admin/restrictedinfo.php ERROR file does not exist.
Which of the following should the researcher recommend to remediate the issue?

A. Software composition analysis

B. Packet inspection

C. Proper error handling

D. Elimination of the use of unsafe functions

 


Suggested Answer: C

Community Answer: C

 

Question 16

A local government that is investigating a data exfiltration claim was asked to review the fingerprint of the malicious user's actions. An investigator took a forensic image of the VM and downloaded the image to a secured USB drive to share with the government.
Which of the following should be taken into consideration during the process of releasing the drive to the government?

A. Encryption in transit

B. Legal issues

C. Chain of custody

D. Order of volatility

E. Key exchange

 


Suggested Answer: C

Community Answer: C

 

Question 17

After the latest risk assessment, the Chief Information Security Officer (CISO) decides to meet with the development and security teams to find a way to reduce the security task workload. The CISO would like to:
•	Have a solution that uses API to communicate with other security tools.
•	Use the latest technology possible.
•	Have the highest controls possible on the solution.
Which of following is the BEST option to meet these requirements?

A. EDR

B. CSP

C. SOAR

D. CASB

 


Suggested Answer: C

Community Answer: C

 

Question 18

A BIA of a popular online retailer identified several mission-essential functions that would take more than seven days to recover in the event of an outage. Which of the following should be considered when setting priorities for the restoration of these functions?

A. Supply chain issues

B. Revenue generation

C. Warm-site operations

D. Scheduled impacts to future projects

 


Suggested Answer: C

Community Answer: B

 

Question 19

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Which of the following would be BEST for the developer to perform? (Choose two.)

A. Utilize code signing by a trusted third party.

B. Implement certificate-based authentication.

C. Verify MD5 hashes.

D. Compress the program with a password.

E. Encrypt with 3DES.

F. Make the DACL read-only.

 


Suggested Answer: AB

Community Answer: AC

 

Question 20

A bank hired a security architect to improve its security measures against the latest threats. The solution must meet the following requirements:
•	Recognize and block fake websites.
•	Decrypt and scan encrypted traffic on standard and non-standard ports.
•	Use multiple engines for detection and prevention.
•	Have central reporting.
Which of the following is the BEST solution the security architect can propose?

A. CASB

B. Web filtering

C. NGFW

D. EDR

 


Suggested Answer: C

Community Answer: C

 

Question 21

The results of an internal audit indicate several employees reused passwords that were previously included in a published list of compromised passwords.
The company has the following employee password policy:
 Image
Which of the following should be implemented to best address the password reuse issue? (Choose two.)

A. Increase the minimum age to two days.

B. Increase the history to 20.

C. Increase the character length to 12.

D. Add case-sensitive requirements to character class.

E. Decrease the maximum age to 30 days.

F. Remove the complexity requirements.

G. Increase the maximum age to 120 days.

 


Suggested Answer: BC

Community Answer: AB

 

Question 22

A small company recently developed prototype technology for a military program. The company's security engineer is concerned about potential theft of the newly developed, proprietary information.
Which of the following should the security engineer do to BEST manage the threats proactively?

A. Join an information-sharing community that is relevant to the company.

B. Leverage the MITRE ATT&CK framework to map the TTP.

C. Use OSINT techniques to evaluate and analyze the threats.

D. Update security awareness training to address new threats, such as best practices for data security.

 


Suggested Answer: B

Community Answer: D

 

Question 23

An internal security audit determines that Telnet is currently being used within the environment to manage network switches. Which of the following tools should be utilized to identify credentials in plaintext that are used to log in to these devices?

A. Fuzzer

B. Network traffic analyzer

C. HTTP interceptor

D. Port scanner

E. Password cracker

 


Suggested Answer: B

Community Answer: B

 

Question 24

A cloud security architect has been tasked with finding a solution for hardening VMs. The solution must meet the following requirements:
•	Data needs to be stored outside of the VMs.
•	No unauthorized modifications to the VMs are allowed.
•	If a change needs to be done, a new VM needs to be deployed.
Which of the following is the best solution?

A. Immutable system

B. Data loss prevention

C. Storage area network

D. Baseline template

 


Suggested Answer: A

Community Answer: A

 

Question 25

A security architect is reviewing the following proposed corporate firewall architecture and configuration:
 Image
Both firewalls are stateful and provide Layer 7 filtering and routing. The company has the following requirements:
✑ Web servers must receive all updates via HTTP/S from the corporate network.
Web servers should not initiate communication with the Internet.
 Image
✑ Web servers should only connect to preapproved corporate database servers.
✑ Employees' computing devices should only connect to web services over ports 80 and 443.
Which of the following should the architect recommend to ensure all requirements are met in the MOST secure manner? (Choose two.)

A. Add the following to Firewall_A: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0/0 TCP 80,443

B. Add the following to Firewall_A: 15 PERMIT FROM 192.168.1.0/24 TO 0.0.0.0 TCP 80,443

C. Add the following to Firewall_A: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0/0 TCP/UDP 0-65535

D. Add the following to Firewall_B: 15 PERMIT FROM 0.0.0.0/0 TO 10.0.0.0/16 TCP/UDP 0-65535

E. Add the following to Firewall_B: 15 PERMIT FROM 10.0.0.0/16 TO 0.0.0.0 TCP/UDP 0-65535

F. Add the following to Firewall_B: 15 PERMIT FROM 192.168.1.0/24 TO 10.0.2.10/32 TCP 80,443

 


Suggested Answer: BD

Community Answer: AF

 

Question 26

A software development company needs to mitigate third-party risks to its software supply chain. Which of the following techniques should the company use in the development environment to best meet this objective?

A. Performing software composition analysis

B. Requiring multifactor authentication

C. Establishing coding standards and monitoring for compliance

D. Implementing a robust unit and regression-testing scheme

 


Suggested Answer: A

Community Answer: A

 

Question 27

A cloud security architect has been tasked with selecting the appropriate solution given the following:
•	The solution must allow the lowest RTO possible.
•	The solution must have the least shared responsibility possible.
•	Patching should be a responsibility of the CSP.
Which of the following solutions can BEST fulfil the requirements?

A. PaaS

B. IaaS

C. Private

D. SaaS

 


Suggested Answer: D

Community Answer: D

 

Question 28

A company's Chief Information Security Officer is concerned that the company's proposed move to the cloud could lead to a lack of visibility into network traffic flow logs within the VPC.
Which of the following compensating controls would be BEST to implement in this situation?

A. EDR

B. SIEM

C. HIDS

D. UEBA

 


Suggested Answer: B

Community Answer: B

Reference:
https://runpanther.io/cyber-explained/cloud-based-siem-explained/

Question 29

A managed security provider (MSP) is engaging with a customer who was working through a complete digital transformation. Part of this transformation involves a move to cloud servers to ensure a scalable, high-performance, online user experience. The current architecture includes:
• Directory servers
• Web servers
• Database servers
• Load balancers
• Cloud-native VPN concentrator
• Remote access server
The MSP must secure this environment similarly to the infrastructure on premises. Which of the following should the MSP put in place to BEST meet this objective? (Choose three.)

A. Content delivery network

B. Virtual next-generation firewall

C. Web application firewall

D. Software-defined WAN

E. External vulnerability scans

F. Containers

 


Suggested Answer: BCE

Community Answer: BCE

 

Question 30

The following messages are displayed when a VPN client is attempting to connect to an OpenVPN server:
OpenSSL: error: 140760FC:SSL routines: SSL23_GET_CLIENT_HELLO: unknown protocol'
TLS_ERROR: BIO read tls_read_plaintext error'
TLS_ERROR: TLS object->incoming plaintext read error'
TLS_ERROR: TLS handshake failed'
SIGUSR1 [soft, tls_error] received, client_instance restarting'
Which of the following best explains the cause of these messages?

A. The client is attempting to establish an unencrypted connection with the server.

B. The server is unreachable to the client and a connection cannot be established.

C. The client is using LibreSSL libraries while the server is using OpenSSL libraries.

D. A TLS version mismatch exists between the client and the server.

 


Suggested Answer: D

Community Answer: D

 

Question 31

A corporation discovered its internet connection is saturated with traffic originating from multiple IP addresses across the internet. A security analyst needs to find a solution to address future occurrences of this type of attack.
Which of the following would be the BEST solution to meet this goal?

A. Implementing cloud-scrubbing services

B. Upgrading the internet link

C. Deploying a web application firewall

D. Provisioning a reverse proxy

 


Suggested Answer: A

Community Answer: A

 

Question 32

A networking team was asked to provide secure remote access to all company employees. The team decided to use client-to-site VPN as a solution. During a discussion, the Chief Information Security Officer raised a security concern and asked the networking team to route the Internet traffic of remote users through the main office infrastructure. Doing this would prevent remote users from accessing the Internet through their local networks while connected to the VPN.
Which of the following solutions does this describe?

A. Full tunneling

B. Asymmetric routing

C. SSH tunneling

D. Split tunneling

 


Suggested Answer: D

Community Answer: A

 

Question 33

A company processes sensitive cardholder information that is stored in an internal production database and accessed by internet-facing web servers. The company's Chief Information Security Officer (CISO) is concerned with the risks related to sensitive data exposure and wants to implement tokenization of sensitive information at the record level. The company implements a one-to-many mapping of primary credit card numbers to temporary credit card numbers.
Which of the following should the CISO consider in a tokenization system?

A. Data field watermarking

B. Field tagging

C. Single-use translation

D. Salted hashing

 


Suggested Answer: C

Community Answer: C

 

Question 34

Company A acquired Company B. During an initial assessment, the companies discover they are using the same SSO system. To help users with the transition. Company A is requiring the following:
•	Before the merger is complete, users from both companies should use a single set of usernames and passwords.
•	Users in the same departments should have the same set of rights and privileges, but they should have different sets of rights and privileges if they have different IPs.
•	Users from Company B should be able to access Company A's available resources.
Which of the following are the BEST solutions? (Choose two.)

A. Installing new Group Policy Object policies

B. Establishing one-way trust from Company B to Company A

C. Enabling SAML

D. Implementing attribute-based access control

E. Installing Company A’s Kerberos systems in Company B’s network

F. Updating login scripts

 


Suggested Answer: BC

Community Answer: BD

 

Question 35

When a remote employee traveled overseas, the employee’s laptop and several mobile devices with proprietary tools were stolen. The security team requires technical controls be in place to ensure no electronic data is compromised or changed. Which of the following BEST meets this requirement?

A. Mobile device management with remote wipe capabilities

B. Passwordless smart card authorization with biometrics

C. Next-generation endpoint detection and response agent

D. Full disk encryption with centralized key management

 


Suggested Answer: D

Community Answer: D

 

Question 36

A security engineer is implementing a server-side TLS configuration that provides forward secrecy and authenticated encryption with associated data. Which of the following algorithms, when combined into a cipher suite, will meet these requirements? (Choose three.)

A. EDE

B. CBC

C. GCM

D. AES

E. RSA

F. RC4

G. ECDSA

H. DH

 


Suggested Answer: CDH

Community Answer: CDG

 

Question 37

A security analyst for a managed service provider wants to implement the most up-to-date and effective security methodologies to provide clients with the best offerings. Which of the following resources would the analyst MOST likely adopt?

A. OSINT

B. ISO

C. MITRE ATT&CK

D. OWASP

 


Suggested Answer: C

Community Answer: C

 

Question 38

A security operations center analyst is investigating anomalous activity between a database server and an unknown external IP address and gathered the following data:
•	dbadmin last logged in at 7:30 a.m. and logged out at 8:05 a.m.
•	A persistent TCP/6667 connection to the external address was established at 7:55 a.m. The connection is still active.
•	Other than bytes transferred to keep the connection alive, only a few kilobytes of data transfer every hour since the start of the connection.
•	A sample outbound request payload from PCAP showed the ASCII content: "JOIN #community".
Which of the following is the MOST likely root cause?

A. A SQL injection was used to exfiltrate data from the database server.

B. The system has been hijacked for cryptocurrency mining.

C. A botnet Trojan is installed on the database server.

D. The dbadmin user is consulting the community for help via Internet Relay Chat.

 


Suggested Answer: C

Community Answer: C

 

Question 39

An organization recently completed a security controls assessment. The results highlighted the following vulnerabilities:
•	Out-of-date definitions
•	Misconfigured operating systems
•	An inability to detect active attacks
•	Unimpeded access to critical servers’ USB ports
Which of the following will most likely reduce the risks that were identified by the assessment team?

A. Install EDR on endpoints, configure group policy, lock server room doors, and install a camera system with guards watching 24/7.

B. Create an information security program that addresses user training, perform weekly audits of user workstations, and utilize a centralized configuration management program.

C. Update antivirus definitions, install NGFW with logging enabled, use USB port lockers, and run SCAP scans weekly.

D. Implement a vulnerability management program and a SIEM tool with alerting, install a badge system with zones, and restrict privileged access.

 


Suggested Answer: C

Community Answer: C

 

Question 40

A user experiences an HTTPS connection error when trying to access an Internet banking website from a corporate laptop. The user then opens a browser on a mobile phone and is able to access the same Internet banking website without issue. Which of the following security configurations is MOST likely the cause of the error?

A. HSTS

B. TLS 1.2

C. Certificate pinning

D. Client authentication

 


Suggested Answer: C

Community Answer: C

 

Question 41

In comparison with traditional on-premises infrastructure configurations, defining ACLs in a CSP relies on:

A. cloud-native applications.

B. containerization.

C. serverless configurations.

D. software-defined networking.

E. secure access service edge.

 


Suggested Answer: D

Community Answer: D

 

Question 42

A mobile application developer is creating a global, highly scalable, secure chat application. The developer would like to ensure the application is not susceptible to on-path attacks while the user is traveling in potentially hostile regions. Which of the following would BEST achieve that goal?

A. Utilize the SAN certificate to enable a single certificate for all regions.

B. Deploy client certificates to all devices in the network.

C. Configure certificate pinning inside the application.

D. Enable HSTS on the application’s server side for all communication.

 


Suggested Answer: C

Community Answer: C

 

Question 43

An organization needs to classify its systems and data in accordance with external requirements. Which of the following roles is best qualified to perform this task?

A. Systems administrator

B. Data owner

C. Data processor

D. Data custodian

E. Data steward

 


Suggested Answer: B

Community Answer: B

 

Question 44

A penetration tester obtained root access on a Windows server and, according to the rules of engagement, is permitted to perform post-exploitation for persistence.
Which of the following techniques would BEST support this?

A. Configuring systemd services to run automatically at startup

B. Creating a backdoor

C. Exploiting an arbitrary code execution exploit

D. Moving laterally to a more authoritative server/service

 


Suggested Answer: B

Community Answer: B

 

Question 45

A security team received a regulatory notice asking for information regarding collusion and pricing from staff members who are no longer with the organization.
The legal department -
provided the security team with a list of search terms to investigate.
This is an example of:

A. due diligence.

B. e-discovery.

C. due care.

D. legal hold.

 


Suggested Answer: A

Community Answer: B

Reference:
https://www.ansarada.com/due-diligence/hr

Question 46

An organization is looking to establish more robust security measures by implementing PKI. Which of the following should the security analyst implement when considering mutual authentication?

A. Perfect forward secrecy on both endpoints

B. Shared secret for both endpoints

C. Public keys on both endpoints

D. A common public key on each endpoint

E. A common private key on each endpoint

 


Suggested Answer: C

Community Answer: C

 

Question 47

A security assessor identified an internet-facing web service API provider that was deemed vulnerable. Execution of testssl provided the following insight:
 Image
Which of the following configuration changes would BEST mitigate chosen ciphertext attacks?

A. Enable 3DES ciphers IDEA.

B. Enable export ciphers.

C. Enable PFS ciphers.

D. Enable AEAD.

 


Suggested Answer: D

Community Answer: C

 

Question 48

A security architect must mitigate the risks from what is suspected to be an exposed, private cryptographic key. Which of the following is the BEST step to take?

A. Revoke the certificate.

B. Inform all the users of the certificate.

C. Contact the company’s Chief Information Security Officer.

D. Disable the website using the suspected certificate.

E. Alert the root CA.

 


Suggested Answer: A

Community Answer: A

 

Question 49

A company wants to improve the security of its web applications that are running on in-house servers. A risk assessment has been performed, and the following capabilities are desired:
•	Terminate SSL connections at a central location
•	Manage both authentication and authorization for incoming and outgoing web service calls
•	Advertise the web service API
•	Implement DLP and anti-malware features
Which of the following technologies will be the BEST option?

A. WAF

B. XML gateway

C. ESB gateway

D. API gateway

 


Suggested Answer: D

Community Answer: D

 

Question 50

When implementing serverless computing, an organization must still account for:

A. the underlying computing network infrastructure.

B. hardware compatibility.

C. the security of its data.

D. patching the service.

 


Suggested Answer: C

Community Answer: C

 

Free Access Full CAS-004 Practice Test Free Questions

If you’re looking for more CAS-004 practice test free questions, click here to access the full CAS-004 practice test.

We regularly update this page with new practice questions, so be sure to check back frequently.

Good luck with your CAS-004 certification journey!

Share18Tweet11
Previous Post

CAS-003 Practice Test Free

Next Post

CCAK Practice Test Free

Next Post

CCAK Practice Test Free

CCNA Practice Test Free

CCSP Practice Test Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.