Discount Offer
Go Back on CAS-004 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

CAS-004 Practice Test


Page 9 out of 40 Pages

A company in the financial sector receives a substantial number of customer transaction
requests via email. While doing a root-cause analysis conceding a security breach, the
CIRT correlates an unusual spike in port 80 traffic from the IP address of a desktop used
by a customer relations employee who has access to several of the compromised
accounts. Subsequent antivirus scans of the device do not return an findings, but the CIRT
finds undocumented services running on the device. Which of the following controls would reduce the discovery time for similar in the future.


A.

Implementing application blacklisting


B.

Configuring the mall to quarantine incoming attachment automatically


C.

Deploying host-based firewalls and shipping the logs to the SIEM


D.

Increasing the cadence for antivirus DAT updates to twice daily





C.
  

Deploying host-based firewalls and shipping the logs to the SIEM



A cybersecurity analyst created the following tables to help determine the maximum budget amount the business can justify spending on an improved email filtering system:

Which of the following meets the budget needs of the business?


A.

Filter ABC


B.

Filter XYZ


C.

Filter GHI


D.

Filter TUV





C.
  

Filter GHI



A security analyst is reviewing network connectivity on a Linux workstation and examining the active TCP connections using the command line.Which of the following commands would be the BEST to run to view only active Internet
connections?


A.

sudo netstat -antu | grep “LISTEN” | awk ‘{print$5}’


B.

sudo netstat -nlt -p | grep “ESTABLISHED”


C.

sudo netstat -plntu | grep -v “Foreign Address”


D.

sudo netstat -pnut -w | column -t -s $’\w’


E.

sudo netstat -pnut | grep -P ^tcp





B.
  

sudo netstat -nlt -p | grep “ESTABLISHED”



Reference: https://www.codegrepper.com/code-examples/shell/netstat+find+port

A security analyst is reviewing the following output:

Which of the following would BEST mitigate this type of attack?


A.

Installing a network firewall


B.

Placing a WAF inline


C.

Implementing an IDS


D.

Deploying a honeypot





A.
  

Installing a network firewall



An organization recently started processing, transmitting, and storing its customers’ credit
card information. Within a week of doing so, the organization suffered a massive breach
that resulted in the exposure of the customers’ information.
Which of the following provides the BEST guidance for protecting such information while it is at rest and in transit?


A.

NIST


B.

GDPR


C.

PCI DSS


D.

ISO





C.
  

PCI DSS



Reference: https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard


Page 9 out of 40 Pages
Previous