CAS-004 Exam Question 51

Company A acquired Company . During an audit, a security engineer found Company B's environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B's infrastructure could be integrated into Company A's security program.
Which of the following risk-handling techniques was used?
  • CAS-004 Exam Question 52

    A new requirement for legislators has forced a government security team to develop a validation process to verify the integrity of a downloaded file and the sender of the file Which of the following is the BEST way for the security team to comply with this requirement?
  • CAS-004 Exam Question 53

    A company has decided to purchase a license for software that is used to operate a mission-critical process.
    The third-party developer is new to the industry but is delivering what the company needs at this time.
    Which of the following BEST describes the reason why utilizing a source code escrow will reduce the operational risk to the company if the third party stops supporting the application?
  • CAS-004 Exam Question 54

    A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt the data using the keys from the website.
    Which of the following should the security analyst recommend to protect the affected data?
  • CAS-004 Exam Question 55

    Users are claiming that a web server is not accessible. A security engineer logs for the site. The engineer connects to the server and runs netstat -an and receives the following output:
    Which of the following is MOST likely happening to the server?