Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free Access CompTIA CAS-004 New Release

Page: 40 / 42
Total 564 questions

CompTIA SecurityX Certification Exam Questions and Answers

Question 157

Options:

A.

Establish a chain of custody to govern code quality.

B.

Create and proliferate framework code.

C.

Require two-person integrity for code commits.

D.

Enhance the monitoring of code coverage for unit testing.

Question 158

A company has integrated source code from a subcontractor into its security product. The subcontractor is located in an adversarial country and has informed the company of a requirement to escrow the source code with the subcontractor’s government. Which of the following is a potential security risk arising from this situation?

Options:

A.

Development of zero-day exploits based on the source code

B.

Legal action to force disclosure of the source code

C.

Sale of source code to competitors during a buyout

D.

Publication of the source code on the internet

Question 159

A security administrator wants to enable a feature that would prevent a compromised encryption key from being used to decrypt all the VPN traffic. Which of the following should the security administrator use?

Options:

A.

Salsa20 cipher

B.

TLS-based VPN

C.

PKI-based IKE IPSec negotiation

D.

Perfect forward secrecy

Question 160

A managed security provider (MSP) is engaging with a customer who was working through a complete digital transformation Part of this transformation involves a move to cloud servers to ensure a scalable, high-performance, online user experience The current architecture includes:

• Directory servers

• Web servers

• Database servers

• Load balancers

• Cloud-native VPN concentrator

• Remote access server

The MSP must secure this environment similarly to the infrastructure on premises Which of the following should the MSP put in place to BEST meet this objective? (Select THREE)

Options:

A.

Content delivery network

B.

Virtual next-generation firewall

C.

Web application firewall

D.

Software-defined WAN

E.

External vulnerability scans

F.

Containers

G.

Microsegmentation

Page: 40 / 42
Total 564 questions