Question # 1 An energy company is required to report the average pressure of natural gas used over the past quarter. A PLC sends data to a historian server that creates the required reports. Which of the following historian server locations will allow the business to get the required reports in an and IT environment?
A. In the environment, use a VPN from the IT environment into the environment.
B. In the environment, allow IT traffic into the environment.
C. In the IT environment, allow PLCs to send data from the environment to the IT environment.
D. Use a screened subnet between the and IT environments
Click for Answer
A. In the environment, use a VPN from the IT environment into the environment.
Question # 2 A security engineer thinks the development team has been hard-coding sensitive
environment variables in its code.
Which of the following would BEST secure the company’s CI/CD pipeline? A. Utilizing a trusted secrets managerB. Performing DAST on a weekly basisC. Introducing the use of container orchestrationD. Deploying instance tagging
Click for Answer
A. Utilizing a trusted secrets manager
Answer Description Reference: https://about.gitlab.com/blog/2021/04/09/demystifying-ci-cd-variables/
A trusted secrets manager is a tool or service that securely stores and manages sensitive
information, such as passwords, API keys, tokens, certificates, etc. A trusted secrets
manager can help secure the company’s CI/CD (Continuous Integration/Continuous
Delivery) pipeline by preventing hard-coding sensitive environment variables in the code,
which can expose them to unauthorized access or leakage. A trusted secrets manager can
also enable encryption, rotation, auditing, and access control for the secrets. References:
https://www.hashicorp.com/resources/what-is-a-secret-manager
https://dzone.com/articles/how-to-securely-manage-secrets-in-a-ci-cd-pipeline
Question # 3 A network architect is designing a new SD-WAN architecture to connect all local sites to a central hub site. The hub is then responsible for redirecting traffic to public cloud and datacenter applications. The SD-WAN routers are managed through a SaaS, and the same security policy is applied to staff whether working in the office or at a remote location. The main requirements are the following: 1. The network supports core applications that have 99.99% uptime. 2. Configuration updates to the SD-WAN routers can only be initiated from the management service. 3. Documents downloaded from websites must be scanned for malware. Which of the following solutions should the network architect implement to meet the requirements?
A. Reverse proxy, stateful firewalls, and VPNs at the local sites
B. IDSs, WAFs, and forward proxy IDS
C. DoS protection at the hub site, mutual certificate authentication, and cloud proxy
D. IPSs at the hub, Layer 4 firewalls, and DLP
Click for Answer
B. IDSs, WAFs, and forward proxy IDS
Question # 4 A company’s SOC has received threat intelligence about an active campaign utilizing a specific vulnerability. The company would like to determine whether it is vulnerable to this active campaign. Which of the following should the company use to make this determination?
A. Threat hunting
B. A system penetration test
C. Log analysis within the SIEM tool
D. The Cyber Kill Chain
Click for Answer
B. A system penetration test
Question # 5 A home automation company just purchased and installed tools for its SOC to enable
incident identification and response on software the company develops. The company
would like to prioritize defenses against the following attack scenarios:
Unauthorized insertions into application development environments
Authorized insiders making unauthorized changes to environment configurations
Which of the following actions will enable the data feeds needed to detect these types of
attacks on development environments? (Choose two.) A. Perform static code analysis of committed code and generate summary reports.
B. Implement an XML gateway and monitor for policy violations.C. Monitor dependency management tools and report on susceptible third-party libraries.D. Install an IDS on the development subnet and passively monitor for vulnerable services.E. Model user behavior and monitor for deviations from normal.
Click for Answer
E. Model user behavior and monitor for deviations from normal.
Answer Description Explanation: Modeling user behavior and monitoring for deviations from normal and
continuously monitoring code commits to repositories and generating summary logs are
actions that will enable the data feeds needed to detect unauthorized insertions into
application development environments and authorized insiders making unauthorized
changes to environment configurations. Modeling user behavior and monitoring for
deviations from normal is a technique that uses baselines, analytics, machine learning, or
other methods to establish normal patterns of user activity and identify anomalies or
outliers that could indicate malicious or suspicious behavior. Modeling user behavior and
monitoring for deviations from normal can help detect unauthorized insertions into
application development environments, as it can alert on unusual or unauthorized access
attempts, commands, actions, or transactions by users. Continuously monitoring code
commits to repositories and generating summary logs is a technique that uses tools,
scripts, automation, or other methods to track and record changes made to code
repositories by developers, testers, reviewers, or other parties involved in the software
development process. Continuously monitoring code commits to repositories and
generating summary logs can help detect authorized insiders making unauthorized
changes to environment configurations, as it can audit and verify the source, time, reason,
and impact of code changes made by authorized users. Performing static code analysis of
committed code and generate summary reports is not an action that will enable the data
feeds needed to detect unauthorized insertions into application development environments
and authorized insiders making unauthorized changes to environment configurations, but
an action that will enable the data feeds needed to detect vulnerabilities, errors, bugs, or
quality issues in committed code. Implementing an XML gateway and monitor for policy
violations is not an action that will enable the data feeds needed to detect unauthorized
insertions into application development environments and authorized insiders making
unauthorized changes to environment configurations, but an action that will enable the data
feeds needed to protect XML-based web services from threats or attacks by validating XML
messages against predefined policies. Monitoring dependency management tools and
report on susceptible third-party libraries is not an action that will enable the data feeds
needed to detect unauthorized insertions into application development environments and
authorized insiders making unauthorized changes to environment configurations, but an
action that will enable the data feeds needed to identify outdated or vulnerable third-party
libraries used in software development projects. Installing an IDS (intrusion detection
system) on the development subnet and passively monitor for vulnerable services is not an
action that will enable the data feeds needed to detect unauthorized insertions into
application development environments and authorized insiders making unauthorized
changes
Question # 6 An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items. Which of the following phases establishes the identification and prioritization of critical systems and functions?
A. Review a recent gap analysis.
B. Perform a cost-benefit analysis.
C. Conduct a business impact analysis.
D. Develop an exposure factor matrix
Click for Answer
C. Conduct a business impact analysis.
Answer Description Reference: https://itsm.ucsf.edu/business-impact-analysis-bia-0
Question # 7 A small company needs to reduce its operating costs. vendors have proposed solutions, which all focus on management of the company’s website and services. The Chief information Security Officer (CISO) insist all available resources in the proposal must be dedicated, but managing a private cloud is not an option. Which of the following is the BEST solution for this company?
A. Community cloud service model
B. Multinency SaaS
C. Single-tenancy SaaS
D. On-premises cloud service model
Click for Answer
A. Community cloud service model
Question # 8 A security analyst is reviewing network connectivity on a Linux workstation and examining the active TCP connections using the command line.Which of the following commands would be the BEST to run to view only active Internet connections?
A. sudo netstat -antu | grep “LISTEN” | awk ‘{print$5}’
B. sudo netstat -nlt -p | grep “ESTABLISHED”
C. sudo netstat -plntu | grep -v “Foreign Address”
D. sudo netstat -pnut -w | column -t -s $’\w’
E. sudo netstat -pnut | grep -P ^tcp
Click for Answer
B. sudo netstat -nlt -p | grep “ESTABLISHED”
Answer Description Reference: https://www.codegrepper.com/code-examples/shell/netstat+find+port
Up-to-Date
We always provide up-to-date CAS-004 exam dumps to our clients. Keep checking website for updates and download.
Excellence
Quality and excellence of our CompTIA Advanced Security Practitioner (CASP+) Exam practice questions are above customers expectations. Contact live chat to know more.
Success
Your SUCCESS is assured with the CAS-004 exam questions of passin1day.com. Just Buy, Prepare and PASS!
Quality
All our braindumps are verified with their correct answers. Download CompTIA CASP Practice tests in a printable PDF format.
Basic
$80
Any 3 Exams of Your Choice
3 Exams PDF + Online Test Engine
Buy Now
Premium
$100
Any 4 Exams of Your Choice
4 Exams PDF + Online Test Engine
Buy Now
Gold
$125
Any 5 Exams of Your Choice
5 Exams PDF + Online Test Engine
Buy Now
Passin1Day has a big success story in last 12 years with a long list of satisfied customers.
We are UK based company, selling CAS-004 practice test questions answers. We have a team of 34 people in Research, Writing, QA, Sales, Support and Marketing departments and helping people get success in their life.
We dont have a single unsatisfied CompTIA customer in this time. Our customers are our asset and precious to us more than their money.
CAS-004 Dumps
We have recently updated CompTIA CAS-004 dumps study guide. You can use our CompTIA CASP braindumps and pass your exam in just 24 hours. Our CompTIA Advanced Security Practitioner (CASP+) Exam real exam contains latest questions. We are providing CompTIA CAS-004 dumps with updates for 3 months. You can purchase in advance and start studying. Whenever CompTIA update CompTIA Advanced Security Practitioner (CASP+) Exam exam, we also update our file with new questions. Passin1day is here to provide real CAS-004 exam questions to people who find it difficult to pass exam
CompTIA CASP can advance your marketability and prove to be a key to differentiating you from those who have no certification and Passin1day is there to help you pass exam with CAS-004 dumps. CompTIA Certifications demonstrate your competence and make your discerning employers recognize that CompTIA Advanced Security Practitioner (CASP+) Exam certified employees are more valuable to their organizations and customers. We have helped thousands of customers so far in achieving their goals. Our excellent comprehensive CompTIA exam dumps will enable you to pass your certification CompTIA CASP exam in just a single try. Passin1day is offering CAS-004 braindumps which are accurate and of high-quality verified by the IT professionals. Candidates can instantly download CompTIA CASP dumps and access them at any device after purchase. Online CompTIA Advanced Security Practitioner (CASP+) Exam practice tests are planned and designed to prepare you completely for the real CompTIA exam condition. Free CAS-004 dumps demos can be available on customer’s demand to check before placing an order.
What Our Customers Say
Jeff Brown
Thanks you so much passin1day.com team for all the help that you have provided me in my CompTIA exam. I will use your dumps for next certification as well.
Mareena Frederick
You guys are awesome. Even 1 day is too much. I prepared my exam in just 3 hours with your CAS-004 exam dumps and passed it in first attempt :)
Ralph Donald
I am the fully satisfied customer of passin1day.com. I have passed my exam using your CompTIA Advanced Security Practitioner (CASP+) Exam braindumps in first attempt. You guys are the secret behind my success ;)
Lilly Solomon
I was so depressed when I get failed in my Cisco exam but thanks GOD you guys exist and helped me in passing my exams. I am nothing without you.