Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Complete CAS-004 CompTIA Materials

Page: 39 / 46
Total 619 questions

CompTIA SecurityX Certification Exam Questions and Answers

Question 153

A security administrator needs to recommend an encryption protocol after a legacy stream cipher was deprecated when a security flaw was discovered. The legacy cipher excelled at maintaining strong cryptographic security and provided great performance for a streaming video service. Which of the following AES modes should the security administrator recommend given these requirements?

Options:

A.

CTR

B.

ECB

C.

OF8

D.

GCM

Question 154

An organization needs to classify its systems and data in accordance with external requirements. Which of the following roles is best qualified to perform this task?

Options:

A.

Systems administrator

B.

Data owner

C.

Data processor

D.

Data custodian

E.

Data steward

Question 155

A security analyst is examining a former employee's laptop for suspected evidence of suspicious activity. The analyst usesddduring the investigation. Which of the following best explains why the analyst is using this tool?

Options:

A.

To capture an image of the hard drive

B.

To reverse engineer binary programs

C.

To recover deleted logs from the laptop

D.

To deduplicate unnecessary data from the hard drive

Question 156

An incident response team completed recovery from offline backup for several workstations. The workstations were subjected to a ransomware attack after users fell victim to a spear-phishing campaign, despite a robust training program. Which of the following questions should be considered during the lessons-learned phase to most likely reduce the risk of reoccurrence? (Select two).

Options:

A.

Are there opportunities for legal recourse against the originators of the spear-phishing campaign?

B.

What internal and external stakeholders need to be notified of the breach?

C.

Which methods can be implemented to increase speed of offline backup recovery?

D.

What measurable user behaviors were exhibited that contributed to the compromise?

E.

Which technical controls, if implemented, would provide defense when user training fails?

F.

Which user roles are most often targeted by spear phishing attacks?

Page: 39 / 46
Total 619 questions