Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Passed Exam Today CAS-004

Page: 42 / 46
Total 619 questions

CompTIA SecurityX Certification Exam Questions and Answers

Question 165

Which of the following provides the best solution for organizations that want to securely back up the MFA seeds for its employees in a central, offline location with minimal

management overhead?

Options:

A.

Key escrow service

B.

Secrets management

C.

Encrypted database

D.

Hardware security module

Question 166

A security technician is investigating a system that tracks inventory via a batch update each night. The technician is concerned that the system poses a risk to the business, as errors are occasionally generated and reported inventory appears incorrect. The following output log is provided:

The technician reviews the output of the batch job and discovers that the inventory was never less than zero, and the final inventory was 100 rather than 60. Which of the following should the technician do to resolve this issue?

Options:

A.

Ensure that the application is using memory-safe functions to prevent integer overflows.

B.

Recommend thread-safe processes in the code to eliminate race conditions.

C.

Require the developers to include exception handlers to accommodate out-of-bounds results.

D.

Move the batch processing from client side to server side to remove client processing inconsistencies.

Question 167

An analyst is working to address a potential compromise of a corporate endpoint and discovers the attacker accessed a user’s credentials. However, it is unclear if the system baseline was modified to achieve persistence. Which of the following would most likely support forensic activities in this scenario?

Options:

A.

Side-channel analysis

B.

Bit-level disk duplication

C.

Software composition analysis

D.

SCAP scanner

Question 168

A security administrator is setting up a virtualization solution that needs to run services from a single host. Each service should be the only one running in its environment. Each environment needs to have its own operating system as a base but share the kernel version and properties of the running host. Which of the following technologies would best meet these requirements?

Options:

A.

Containers

B.

Type 1 hypervisor

C.

Type 2 hypervisor

D.

Virtual desktop infrastructure

E.

Emulation

Page: 42 / 46
Total 619 questions