Valid CAS-004 Dumps shared by ExamDiscuss.com for Helping Passing CAS-004 Exam! ExamDiscuss.com now offer the newest CAS-004 exam dumps, the ExamDiscuss.com CAS-004 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com CAS-004 dumps with Test Engine here:

Access CAS-004 Dumps Premium Version
(620 Q&As Dumps, 35%OFF Special Discount Code: freecram)

<< Prev Question Next Question >>

Question 49/199

A security engineer is hardening a company's multihomed SFTP server. When scanning a public-facing network interface, the engineer finds the following ports are open:
22
25
110
137
138
139
445
Internal Windows clients are used to transferring files to the server to stage them for customer download as part of the company's distribution process.
Which of the following would be the BEST solution to harden the system?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (199q)
Question 1: A security operations center analyst is investigating anomal...
Question 2: A security is assisting the marketing department with ensuri...
Question 3: An organization mat provides a SaaS solution recently experi...
Question 4: The information security manager at a 24-hour manufacturing ...
Question 5: A company Is adopting a new artificial-intelligence-based an...
Question 6: A security analyst receives an alert from the SIEM regarding...
Question 7: An organization is considering a BYOD standard to support re...
Question 8: An organization's assessment of a third-party, non-critical ...
Question 9: A healthcare system recently suffered from a ransomware inci...
Question 10: A forensic expert working on a fraud investigation for a US-...
Question 11: When managing and mitigating SaaS cloud vendor risk, which o...
Question 12: A security analyst has been provided the following partial S...
Question 13: A company's Chief Information Officer wants to Implement IDS...
Question 14: An auditor needs to scan documents at rest for sensitive tex...
Question 15: Which of the following is the primary reason that a risk pra...
Question 16: Which of the following is required for an organization to me...
Question 17: A local university that has a global footprint is undertakin...
Question 18: A new web server must comply with new secure-by-design princ...
Question 19: A local government that is investigating a data exfiltration...
Question 20: An organization's finance system was recently attacked. A fo...
Question 21: A security researcher detonated some malware in a lab enviro...
Question 22: A company that uses AD is migrating services from LDAP to se...
Question 23: A company is looking at sending historical backups containin...
Question 24: A user from the sales department opened a suspicious file at...
Question 25: A security team received a regulatory notice asking for info...
Question 26: A pharmaceutical company was recently compromised by ransomw...
Question 27: A company's claims processed department has a mobile workfor...
Question 28: Immediately following the report of a potential breach, a se...
Question 29: A company processes data subject to NDAs with partners that ...
Question 30: A pharmaceutical company recently experienced a security bre...
Question 31: A security architect recommends replacing the company's mono...
Question 32: A company has hired a security architect to address several ...
Question 33: A company's SOC has received threat intelligence about an ac...
Question 34: A business stores personal client data of individuals residi...
Question 35: Which of the following is the MOST important security object...
Question 36: A health company has reached the physical and computing capa...
Question 37: A software development company wants to ensure that users ca...
Question 38: A Chief information Security Officer (CISO) has launched to ...
Question 39: A company hired a third party to develop software as part of...
Question 40: A developer needs to implement PKI in an autonomous vehicle'...
Question 41: A security engineer is trying to identify instances of a vul...
Question 42: An enterprise is deploying APIs that utilize a private key a...
Question 43: A systems administrator at a web-hosting provider has been t...
Question 44: An attacker infiltrated an electricity-generation site and d...
Question 45: An organization's hunt team thinks a persistent threats exis...
Question 46: A disaster recovery team learned of several mistakes that we...
Question 47: A security analyst detected a malicious PowerShell attack on...
Question 48: The goal of a Chief information Security Officer (CISO) prov...
Question 49: A security engineer is hardening a company's multihomed SFTP...
Question 50: A company plans to build an entirely remote workforce that u...
Question 51: The principal security analyst for a global manufacturer is ...
Question 52: Law enforcement officials informed an organization that an i...
Question 53: A company wants to improve the security of its web applicati...
Question 54: A DevOps team has deployed databases, event-driven services,...
Question 55: A SOC analyst is reviewing malicious activity on an external...
Question 56: A company wants to improve Its active protection capabilitie...
Question 57: A small business would like to provide guests who are using ...
Question 58: A security analyst is using data provided from a recent pene...
Question 59: An application developer is including third-party background...
Question 60: A systems administrator was given the following IOC to detec...
Question 61: A security engineer notices the company website allows users...
Question 62: A security analyst is concerned that a malicious piece of co...
Question 63: A software development company makes Its software version av...
Question 64: A developer implement the following code snippet. (Exhibit) ...
Question 65: An organization is running its e-commerce site in the cloud....
Question 66: A security administrator configured the account policies per...
Question 67: A security review of the architecture for an application mig...
Question 68: A large telecommunications equipment manufacturer needs to e...
Question 69: A security analyst for a managed service provider wants to i...
Question 70: A company wants to use a process to embed a sign of ownershi...
Question 71: An internal security assessor identified large gaps in a com...
Question 72: A security engineer performed an assessment on a recently de...
Question 73: A financial services company wants to migrate its email serv...
Question 74: An architectural firm is working with its security team to e...
Question 75: A security engineer estimates the company's popular web appl...
Question 76: A cybersecurity analyst discovered a private key that could ...
Question 77: An organization recently recovered from an attack that featu...
Question 78: A security consultant has been asked to recommend a secure n...
Question 79: A developer wants to maintain integrity to each module of a ...
Question 80: A technician is reviewing the logs and notices a large numbe...
Question 81: A security analyst needs to recommend a remediation to the f...
Question 82: A security architect was asked to modify an existing interna...
Question 83: Which of the following allows computation and analysis of da...
Question 84: A company launched a new service and created a landing page ...
Question 85: A security architect for a large, multinational manufacturer...
Question 86: Which of the following BEST describes a common use case for ...
Question 87: A company is migrating from company-owned phones to a BYOD s...
Question 88: An organization developed a social media application that is...
Question 89: A security architect is implementing a SOAR solution in an o...
Question 90: An organization wants to perform a scan of all its systems a...
Question 91: A client is adding scope to a project. Which of the followin...
Question 92: A web service provider has just taken on a very large contra...
Question 93: A security analyst discovered that a database administrator'...
Question 94: Device event logs sources from MDM software as follows: (Exh...
Question 95: Application owners are reporting performance issues with tra...
Question 96: While investigating a security event, an analyst finds evide...
Question 97: An organization is implementing a new identity and access ma...
Question 98: A security engineer is implementing a server-side TLS config...
Question 99: An organization is in frequent litigation and has a large nu...
Question 100: A security analyst sees that a hacker has discovered some ke...
Question 101: An organization's finance system was recently attacked. A fo...
Question 102: An administrator at a software development company would lik...
Question 103: A systems administrator is in the process of hardening the h...
Question 104: A security consultant is designing an infrastructure securit...
Question 105: A review of the past year's attack patterns shows that attac...
Question 106: A security analyst is investigating a series of suspicious e...
Question 107: A large organization is planning to migrate from on premises...
Question 108: A security engineer thinks the development team has been har...
Question 109: An organization is looking to establish more robust security...
Question 110: A security engineer needs to implement a solution to increas...
Question 111: A security architect is tasked with scoping a penetration te...
Question 112: A high-severity vulnerability was found on a web application...
Question 113: Which of the following is a risk associated with SDN?...
Question 114: A Chief Information Officer (CIO) wants to implement a cloud...
Question 115: Which of the following processes involves searching and coll...
Question 116: A cybersecurity analyst created the following tables to help...
Question 117: A cybersecurity analyst receives a ticket that indicates a p...
Question 118: A Chief Information Officer is considering migrating all com...
Question 119: A security architect is implementing a web application that ...
Question 120: Given the following log snippet from a web server: (Exhibit)...
Question 121: A company's employees are not permitted to access company sy...
Question 122: A security analyst is reviewing the following output: (Exhib...
Question 123: A company is moving most of its customer-facing production s...
Question 124: A security analyst at a global financial firm was reviewing ...
Question 125: Some end users of an e-commerce website are reporting a dela...
Question 126: (Exhibit)
Question 127: As part of the customer registration process to access a new...
Question 128: SIMULATION You are a security analyst tasked with interpreti...
Question 129: A company's product site recently had failed API calls, resu...
Question 130: A business wants to migrate its workloads from an exclusivel...
Question 131: A security engineer is working for a service provider and an...
Question 132: Due to budget constraints, an organization created a policy ...
Question 133: In comparison with traditional on-premises infrastructure co...
Question 134: A penetration tester obtained root access on a Windows serve...
Question 135: During a remodel, a company's computer equipment was moved t...
Question 136: A company has moved its sensitive workloads lo the cloud and...
Question 137: A junior developer is informed about the impact of new malwa...
Question 138: A company wants to protect its intellectual property from th...
Question 139: A security analyst runs a vulnerability scan on a network ad...
Question 140: A security architect is working with a new customer to find ...
Question 141: A security analyst has been tasked with providing key inform...
Question 142: A company has decided to purchase a license for software tha...
Question 143: A company just released a new video card. Due to limited sup...
Question 144: The OS on several servers crashed around the same time for a...
Question 145: A software development company is building a new mobile appl...
Question 146: A company wants to refactor a monolithic application to take...
Question 147: A security architect updated the security policy to require ...
Question 148: Due to internal resource constraints, the management team ha...
Question 149: An HVAC contractor requested network connectivity permission...
Question 150: In preparation for the holiday season, a company redesigned ...
Question 151: A managed security provider (MSP) is engaging with a custome...
Question 152: After a cybersecurity incident, a judge found that a company...
Question 153: Which of the following controls primarily detects abuse of p...
Question 154: Ransomware encrypted the entire human resources fileshare fo...
Question 155: A security engineer is reviewing a record of events after a ...
Question 156: In a shared responsibility model for PaaS, which of the foll...
Question 157: A security engineer is troubleshooting an issue in which an ...
Question 158: A software house is developing a new application. The applic...
Question 159: A major broadcasting company that requires continuous availa...
Question 160: Which of the following should be established when configurin...
Question 161: A vulnerability analyst identified a zero-day vulnerability ...
Question 162: A company security engineer arrives at work to face the foll...
Question 163: An engineering team has deployed a new VPN service that requ...
Question 164: A security administrator wants to enable a feature that woul...
Question 165: An attacker infiltrated the code base of a hardware manufact...
Question 166: A company recently acquired a SaaS provider and needs to int...
Question 167: A user forwarded a suspicious email to a security analyst fo...
Question 168: A company wants to implement a new website that will be acce...
Question 169: A security engineer investigates an incident and determines ...
Question 170: Which of the following testing plans is used to discuss disa...
Question 171: A significant weather event caused all systems to fail over ...
Question 172: An analyst received a list of IOCs from a government agency....
Question 173: Due to internal resource constraints, the management team ha...
Question 174: An analyst execute a vulnerability scan against an internet-...
Question 175: A company suspects a web server may have been infiltrated by...
Question 176: A cloud security architect has been tasked with selecting th...
Question 177: As part of the customer registration process to access a new...
Question 178: An engineering team is developing and deploying a fleet of m...
Question 179: An organization established an agreement with a partner comp...
Question 180: A company just released a new video card. Due to limited sup...
Question 181: As part of its risk strategy, a company is considering buyin...
Question 182: A systems administrator is preparing to run a vulnerability ...
Question 183: A host on a company's network has been infected by a worm th...
Question 184: A company is preparing to deploy a global service. Which of ...
Question 185: A security engineer has been informed by the firewall team t...
Question 186: A software company wants to build a platform by integrating ...
Question 187: A mobile application developer is creating a global, highly ...
Question 188: A security architect is reviewing the following proposed cor...
Question 189: An organization is referencing NIST best practices for BCP c...
Question 190: A security architect must mitigate the risks from what is su...
Question 191: A system administrator at a medical imaging company discover...
Question 192: An IT department is currently working to implement an enterp...
Question 193: Technicians have determined that the current server hardware...
Question 194: Based on PCI DSS v3.4, One Particular database field can sto...
Question 195: Which of the following protocols is a low power, low data ra...
Question 196: A global organization's Chief Information Security Officer (...
Question 197: The Chief information Officer (CIO) wants to establish a non...
Question 198: Which of the following best describes what happens if chain ...
Question 199: A company with customers in the United States and Europe wan...