CAS-004復習対策 & CAS-004無料試験楽な気持ちでCompTIAのCAS-004試験に合格したい?Xhs1991のCompTIAのCAS-004問題集は良い選択になるかもしれません。Xhs1991のCompTIAのCAS-004問題集は君には必要な試験内容と答えを含まれます。君は最も早い時間で試験に関する重点を身につけられますし、一回だけでテストに合格できるように、職業技能を増強られる。君は成功の道にもっと近くなります。 CompTIA Advanced Security Practitioner (CASP+) Exam 認定 CAS-004 試験問題 (Q476-Q481):質問 # 476
A forensic investigator would use the foremostcommand for:
A. cloning disks.
B. recovering lost files.
C. extracting features such as email addresses.
D. analyzing network-captured packets.
正解:B
解説:
Foremost is a forensic program to recover lost files based on their headers, footers, and internal data structures.
質問 # 477
A small company recently developed prototype technology for a military program. The company's security engineer is concerned about potential theft of the newly developed, proprietary information.
Which of the following should the security engineer do to BEST manage the threats proactively?
A. Leverage the MITRE ATT&CK framework to map the TTR.
B. Join an information-sharing community that is relevant to the company.
C. Use OSINT techniques to evaluate and analyze the threats.
D. Update security awareness training to address new threats, such as best practices for data security.
正解:A
質問 # 478
An auditor Is reviewing the logs from a web application to determine the source of an Incident.
The web application architecture Includes an Internet-accessible application load balancer, a number of web servers In a private subnet, application servers, and one database server In a tiered configuration. The application load balancer cannot store the logs. The following are sample log snippets:
Which of the following should the auditor recommend to ensure future incidents can be traced back to the sources?
A. Store the value of the $_SERVER['REMOTE_ADDR'] received by the web servers.
B. Install a certificate signed by a trusted CA.
C. Enable the x-Forwarded-For header al the load balancer.
D. Install a software-based HIDS on the application servers.
E. Use stored procedures on the database server.
正解:C
解説:
The X-Forwarded-For (XFF) HTTP header field is a common method for identifying the originating IP address of a client connecting to a web server through an HTTP proxy or load balancer.
質問 # 479
A company processes data subject to NDAs with partners that define the processing and storage constraints for the covered dat
a. The agreements currently do not permit moving the covered data to the cloud, and the company would like to renegotiate the terms of the agreements.
Which of the following would MOST likely help the company gain consensus to move the data to the cloud?
A. Designing data protection schemes to mitigate the risk of loss due to multitenancy
B. Implementing redundant stores and services across diverse CSPs for high availability
C. Purchasing managed FIM services to alert on detected modifications to covered data
D. Emulating OS and hardware architectures to blur operations from CSP view
正解:C
質問 # 480
You are an information security analyst tasked to provide feedback and remediation guidance to an organization that is working to comply with a prescriptive framework.
The framework includes the following controls related to network design:
. Network hosts must be segmented into security domains.
. A screened subnet must be used for all externally available assets.
. A shared services zone must be present for internal servers and should not contain workstations.
INSTRUCTIONS
Based on the stated requirements, place each resource in the appropriate network location. All resources must be used, and all network zones will be filled. 正解:
解説:
See the solution in explanation part.
Explanation:
LAN:
Workstation
Workstation
Shared Services Zone:
File server
Authentication server
Database server
Screened Subnet (DMZ):
Web server
Email proxy
VPN concentrator
Let's Map Them by Zone
#LAN (Top Right, 2 boxes) - Workstations only
Workstation
Workstation
#Shared Services Zone (Middle Row) - Internal-use servers
File server
Authentication server
Database server
#Screened Subnet / DMZ (Bottom Row) - Public-facing services
Web server
Email proxy
VPN concentrator
#Remaining Workstations:
Go in theLAN(you'll have two more slots)
#Final Assignment:
LAN (Top Right)
Workstation
Workstation
Shared Services Zone (Middle Row)
File server
Authentication server
Shared Services Zone (Middle Row)
Database server
Workstation##This is not allowed!(Needs to go elsewhere)
So we must placeall 4 workstationsinto theLAN, and all 3 internal servers into themiddlerow.
Corrected Mapping:
LAN (Top Right - 2 slots)
Workstation
Workstation
Middle Row (Shared Services Zone - 2 boxes)
File server
Authentication server
Bottom Row (Shared Services or DMZ - 3 boxes)
Database server
Web server
Email proxy / VPN concentrator