Search Header Logo

CAS-004 - Set 7 (1of2)

Authored by Khairul Imtiyaz

Computers

University

Used 1+ times

CAS-004 - Set 7 (1of2)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

On which of the following devices and processes did the ransomware originate?

cpt-ws002, NO-AV.exe

cpt-ws026, DearCry.exe

cpt-ws018, powershell.exe

cpt-ws026, NO-AV.exe

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following solutions should the security architect recommend to reduce the time required to validate the certificate?

Implementing OCSP stapling on the server

Changing the cipher algorithm used on the web server

Upgrading to TLS 1.3

Adding more nodes to the web server clusters

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should the security analyst have followed to prevent the loss of potentially useful evidence during a security incident investigation?

Verification

Chain of custody

Secure storage

Order of volatility

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following should the security administrator implement to detect a potential forged sender claim in the envelope of an email? (Select TWO)

DMARC

SPF

S/MIME

TLS

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following will need to be implemented to achieve the transition to a zero trust architecture? (Select THREE)

Continuous validation

Policy automation

Least privilege

Firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should the security analyst implement when considering mutual authentication?

A common private key on each endpoint

A common public key on each endpoint

Public keys on both endpoints

Perfect forward secrecy on both endpoints

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes the system responsible for storing private encryption/decryption files with a third party to ensure these files are stored safely?

Code signing

Trust models

TPM

Key escrow

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?