Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CAS-004 CompTIA SecurityX Certification Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CompTIA CAS-004 CompTIA SecurityX Certification Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 7
Total 619 questions

An organization has deployed a cloud-based application that provides virtual event services globally to clients. During a typical event, thousands of users access various entry pages within a short period of time. The entry pages include sponsor-related content that is relatively static and is pulled from a database. When the first major event occurs, users report poor response time onthe entry pages. Which of the following features is the most appropriate for the company to implement?

A.

Horizontal scalability

B.

Vertical scalability

C.

Containerization

D.

Static code analysis

E.

Caching

A security architect wants to ensure a remote host's identity and decides that pinning the X.509 certificate to the device is the most effective solution. Which of the following must happen first?

A.

Use Distinguished Encoding Rules (DER) for the certificate.

B.

Extract the private key from the certificate.

C.

Use an out-of-band method to obtain the certificate

D.

Compare the retrieved certificate with the embedded certificate.

A security engineer investigates an incident and determines that a rogue device is on the network. Further investigation finds that an employee's personal device has been set up to access company resources and does not comply with standard security controls. Which of the following should the security engineer recommend to reduce the risk of future reoccurrence?

A.

Require device certificates to access company resources.

B.

Enable MFA at the organization's SSO portal.

C.

Encrypt all workstation hard drives.

D.

Hide the company wireless SSID.

A security analyst is configuring an IPSec tunnel to use the strongest encryption currently available. Which of the following algorithms should be deployed to provide the most secure initial key exchange?

A.

3DES

B.

ECDSA

C.

ECDH

D.

AES

Signed applications reduce risks by:

A.

encrypting the application's data on the device.

B.

requiring the developer to use code-level hardening techniques.

C.

providing assurance that the application is using unmodified source code.

D.

costing the developer money to publish, which reduces the likelihood of malicious intent.

A software developer must choose encryption algorithms to secure two parts of a mobile application. Given the following part descriptions and requirements:

•The first part of the application is used to transfer large files and must support file parts with transfer start/stop/resume. This part requires strong file encryption.

•The second part of the application uses a bit stream to continuously authenticate both ends of the connection. This part must implement confidentiality for the stream.

Which of the following encryption algorithms should the developer implement in the code to support both parts of the application? (Select two).

A.

P384

B.

ECDSA

C.

RC5

D.

ChaCha20

E.

bcrypt

F.

RIPEMD

An organization is designing a MAC scheme (or critical servers running GNU/Linux. The security engineer is investigating SELinux but is confused about how to read labeling contexts. The engineer executes the command stat ./secretfile and receives the following output:

Which of the following describes the correct order of labels shown in the output above?

A.

Role, type MLS level, and user identity

B.

Role, user identity, object, and MLS level

C.

Object MLS level, role, and type

D.

User identity, role, type, and MLS level

E.

Object, user identity, role, and MLS level

Which of the following technologies would need to be in an unmanaged state to perform forensic analysis on a laptop with an unknown encryption key?

A.

FIM

B.

ECC

C.

FTK

D.

TPM

An organization developed a containerized application. The organization wants to run the application in the cloud and automatically scale it based on demand. The security operations team would like to use container orchestration but does not want to assume patching responsibilities. Which of the following service models best meets these requirements?

A.

PaaS

B.

SaaS

C.

laaS

D.

MaaS

An IT director is working on a solution to meet the challenge of remotely managing laptop devices and securely locking them down. The solution must meet the following requirements:

• Cut down on patch management.

• Make use of standard configurations.

• Allow for custom resource configurations.

• Provide access to the enterprise system from multiple types of devices.

Which of the following would meet these requirements?

A.

MDM

B.

Emulator

C.

Hosted hypervisor

D.

VDI

A security engineer needs to select the architecture for a cloud database that will protect an organization's sensitive data. The engineer has a choice between a single-tenant or a multitenant database architecture offered by a cloud vendor. Which of the following best describes the security benefits of the single-tenant option? (Select two).

A.

Most cost-effective

B.

Ease of backup and restoration

C.

High degree of privacy

D.

Low resilience to side-channel attacks

E.

Full control and ability to customize

F.

Increased geographic diversity

A security engineer is assessing a legacy server and needs to determine if FTP is running and on which port The service cannot be turned off, as it would impact a critical application's ability to function. Which of the following commands would provide the information necessary to create a firewall rule to prevent that service from being exploited?

A.

service —status-ali I grep ftpd

B.

chkconfig --list

C.

neestat -tulpn

D.

systeactl list-unit-file —type service ftpd

E.

service ftpd. status

A security engineer is implementing DLP. Which of the following should the security engineer include in the overall DLP strategy?

A.

Tokenization

B.

Network traffic analysis

C.

Data classification

D.

Multifactor authentication

While performing mandatory monthly patch updates on a production application server, the security analyst reports an instance of buffer overflow for a new application that was migrated to the cloud and is also publicly exposed. Security policy requires that only internal users have access to the application. Which of the following should the analyst implement to mitigate the issues reported? (Select two).

A.

Configure firewall rules to block all external traffic.

B.

Enable input validation for all fields.

C.

Enable automatic updates to be installed on all servers.

D.

Configure the security group to enable external traffic.

E.

Set up a DLP policy to alert for exfiltration on all application servers.

F.

Enable nightly vulnerability scans

The Chief Information Security Officer (CISO) at a software company is trying to document the technical and security requirements needed to connect the company’s network to an external system. The additional requirements include procedural and planning information. Which of the following should the CISO use to best accomplish this objective?

A.

MOA

B.

NDA

C.

SLA

D.

ISA

Which of the following security features do email signatures provide?

A.

Non-repudiation

B.

Body encryption

C.

Code signing

D.

Sender authentication

E.

Chain of custody

A security technician is trying to connect a remote site to the central office over a site-to-site VPN. The technician has verified the source and destination IP addresses are correct, but the technician is unable to get the remote site to connect. The following error message keeps repeating:

"An error has occurred during Phase 1 handshake. Deleting keys and retrying..."

Which of the following is most likely the reason the connection is failing?

A.

The IKE hashing algorithm uses different key lengths on each VPN device.

B.

The IPSec settings allow more than one cipher suite on both devices.

C.

The Diffie-Hellman group on both sides matches but is a legacy group.

D.

The remote VPN is attempting to connect with a protocol other than SSL/TLS.

A company uses a CSP to provide a front end for its new payment system offering. The new offering is currently certified as PCI compliant. In order for the integrated solution to be

compliant, the customer:

A.

must also be PCI compliant, because the risk is transferred to the provider.

B.

still needs to perform its own PCI assessment of the provider's managed serverless service.

C.

needs to perform a penetration test of the cloud provider's environment.

D.

must ensure in-scope systems for the new offering are also PCI compliant.

To bring digital evidence in a court of law the evidence must be:

A.

material

B.

tangible

C.

consistent

D.

conserved

A company hired a third-party consultant to run a cybersecurity incident simu-lation in order to identify security gaps and prepare stakeholders for a potential incident. Which of the following best describes this activity?

A.

Tabletop exercise

B.

Walk-through review

C.

Lessons learned

D.

Business impact analysis

A SaaS startup is maturing its DevSecOps program and wants to identify weaknesses earlier in the development process in order to reduce the average time to identify serverless application vulnerabilities and the costs associated with remediation The startup began its early security testing efforts with DAST to cover public-facing application components and recently implemented a bug bounty program Which of the following will BEST accomplish the company's objectives?

A.

RASP

B.

SAST

C.

WAF

D.

CMS

A security engineer is reviewing Apache web server logs and has identified the following pattern in the log:

GET https://example.com/image5/../../etc/passwd HTTP/1.1 200 OK

The engineer has also reviewed IDS and firewall logs and established a correlation to an external IP address. Which of the following can be determined regarding the vulnerability and response?

A.

A cross-site scripting attack was successful at reading the /etc/passwd file, and the system should avoid passing user-supplied input to REST API.

B.

A cross-site request forgery attack was successful at reading the /etc/passwd file, and the system should avoid passing user-supplied input to HTTP POST commands.

C.

A directory traversal attack was successful at reading the /etc/passwd file, and the system should avoid passing user-supplied input to the filesystem.

D.

A brute-force authentication attempt was successful, and the system should implement salting as part of the password hashing algorithm.

A security architect is reviewing the following organizational specifications for a new application:

• Be sessionless and API-based

• Accept uploaded documents with Pll, so all storage must be ephemeral

• Be able to scale on-demand across multiple nodes

• Restrict all network access except for the TLS port

Which of the following ways should the architect recommend the application be deployed in order to meet security and organizational infrastructure requirements?

A.

Utilizing the cloud container service

B.

On server instances with autoscaling groups

C.

Using scripted delivery

D.

With a content delivery network

A security technician is investigating a system that tracks inventory via a batch update each night. The technician is concerned that the system poses a risk to the business, as errors are occasionally generated and reported inventory appears incorrect. The following output log is provided:

The technician reviews the output of the batch job and discovers that the inventory was never less than zero, and the final inventory was 100 rather than 60. Which of the following should the technician do to resolve this issue?

A.

Ensure that the application is using memory-safe functions to prevent integer overflows.

B.

Recommend thread-safe processes in the code to eliminate race conditions.

C.

Require the developers to include exception handlers to accommodate out-of-bounds results.

D.

Move the batch processing from client side to server side to remove client processing inconsistencies.

A company wants to prevent a partner company from denying agreement to a transaction. Which of the following is the best solution for the company?

A.

Federation

B.

Key escrow

C.

Salting hashes

D.

Digital signatures

In support of disaster recovery objectives, a third party agreed to provide 99.999% uptime. Recently, a hardware failure impacted a firewall without service degradation. Which of the following resiliency concepts was most likely in place?

A.

Clustering

B.

High availability

C.

Redundancy

D.

Replication

After investigating a recent security incident, a SOC analyst is charged with creating a reference guide for the entire team to use. Which of the following should the analyst create to address future incidents?

A.

Root cause analysis

B.

Communication plan

C.

Runbook

D.

Lessons learned

An organization wants to implement an access control system based on its data classification policy that includes the following data types:

Confidential

Restricted

Internal

Public

The access control system should support SSO federation to map users into groups. Each group should only access systems that process and store data at the classification assigned to the group. Which of the following should the organization implement to enforce its requirements with minimal impact to systems and resources?

A.

A tagging strategy in which all resources are assigned a tag based on the data classification type, and a system that enforces attribute-based access control.

B.

Role-based access control that maps data types to internal roles, which are defined in the human resources department's source of truth system.

C.

Network microsegmentation based on data types, and a network access control system enforcing mandatory access control based on the user principal.

D.

A rule-based access control strategy enforced by the SSO system with rules managed by the internal LDAP and applied on a per-system basis.

Which of the following describes how a risk assessment is performed when an organization has a critical vendor that provides multiple products?

A.

At the individual product level

B.

Through the selection of a random product

C.

Using a third-party audit report

D.

By choosing a major product

An organization needs to classify its systems and data in accordance with external requirements. Which of the following roles is best qualified to perform this task?

A.

Systems administrator

B.

Data owner

C.

Data processor

D.

Data custodian

E.

Data steward

Page: 3 / 7
Total 619 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved