CAS-004 Exam Question 16

An organization recently started processing, transmitting, and storing its customers' credit card information.
Within a week of doing so, the organization suffered a massive breach that resulted in the exposure of the customers' information.
Which of the following provides the BEST guidance for protecting such information while it is at rest and in transit?
  • CAS-004 Exam Question 17

    A security engineer was auditing an organization's current software development practice and discovered that multiple open-source libraries were Integrated into the organization's software. The organization currently performs SAST and DAST on the software it develops.
    Which of the following should the organization incorporate into the SDLC to ensure the security of the open-source libraries?
  • CAS-004 Exam Question 18

    A web service provider has just taken on a very large contract that comes with requirements that are currently not being implemented in order to meet contractual requirements, the company must achieve the following thresholds
    * 99 99% uptime
    * Load time in 3 seconds
    * Response time = <1 0 seconds
    Starting with the computing environment, which of the following should a security engineer recommend to BEST meet the requirements? (Select THREE)
  • CAS-004 Exam Question 19

    An attacker infiltrated an electricity-generation site and disabled the safety instrumented system. Ransomware was also deployed on the engineering workstation. The environment has back-to-back firewalls separating the corporate and OT systems. Which of the following is the MOST likely security consequence of this attack?
  • CAS-004 Exam Question 20

    A security analyst is reviewing a new IOC in which data is injected into an online process. The IOC shows the data injection could happen in the following ways:
    * Five numerical digits followed by a dash, followed by four numerical digits; or
    * Five numerical digits
    When one of these IOCs is identified, the online process stops working. Which of the following regular expressions should be implemented in the NIPS?