Go Back on CAS-004 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

CAS-004 Practice Test


Page 5 out of 40 Pages

A university issues badges through a homegrown identity management system to all staff
and students. Each week during the summer, temporary summer school students arrive
and need to be issued a badge to access minimal campus resources. The security team
received a report from an outside auditor indicating the homegrown system is not
consistent with best practices in the security field and leaves the institution vulnerable.
Which of the following should the security team recommend FIRST?


A.

Investigating a potential threat identified in logs related to the identity management
system


B.

Updating the identity management system to use discretionary access control


C.

Beginning research on two-factor authentication to later introduce into the identity
management system


D.

Working with procurement and creating a requirements document to select a new IAM
system/vendor





A.
  

Investigating a potential threat identified in logs related to the identity management
system



A business stores personal client data of individuals residing in the EU in order to process
requests for mortgage loan approvals.
Which of the following does the business’s IT manager need to consider?


A.

The availability of personal data


B.

The right to personal data erasure


C.

The company’s annual revenue


D.

The language of the web application





B.
  

The right to personal data erasure



Reference: https://gdpr.eu/right-to-beforgotten/#:~:
text=Also-known-as-the-right,to-delete-their-person
al-data.&text=The-General-Data-Protection-Regulation,collected%2C%2
0processed%2C-and-erased

A cybersecurity engineer analyst a system for vulnerabilities. The tool created an OVAL.
Results document as output. Which of the following would enable the engineer to interpret
the results in a human readable form? (Select TWO.)


A.

Text editor


B.

OOXML editor


C.

Event Viewer


D.

XML style sheet


E.

SCAP tool


F.

Debugging utility





A.
  

Text editor



E.
  

SCAP tool



All staff at a company have started working remotely due to a global pandemic. To
transition to remote work, the company has migrated to SaaS collaboration tools. The
human resources department wants to use these tools to process sensitive information but
is concerned the data could be:
Leaked to the media via printing of the documents
Sent to a personal email address
Accessed and viewed by systems administrators
Uploaded to a file storage site
Which of the following would mitigate the department’s concerns?


A.

Data loss detection, reverse proxy, EDR, and PGP


B.

VDI, proxy, CASB, and DRM


C.

Watermarking, forward proxy, DLP, and MFA


D.

Proxy, secure VPN, endpoint encryption, and AV





B.
  

VDI, proxy, CASB, and DRM



A company plans to build an entirely remote workforce that utilizes a cloud-based
infrastructure. The Chief Information Security Officer asks the security engineer to design
connectivity to meet the following requirements:
Only users with corporate-owned devices can directly access servers hosted by the cloud
provider.
The company can control what SaaS applications each individual user can access.
User browser activity can be monitored.
Which of the following solutions would BEST meet these requirements?


A.

IAM gateway, MDM, and reverse proxy


B.

VPN, CASB, and secure web gateway


C.

SSL tunnel, DLP, and host-based firewall


D.

API gateway, UEM, and forward proxy





B.
  

VPN, CASB, and secure web gateway




Page 5 out of 40 Pages
Previous