CompTIA CAS-004 Exam (page: 2)
CompTIA Advanced Security Practitioner (CASP+) CAS-004
Updated on: 25-Aug-2025

Viewing Page 2 of 112

A company is preparing to deploy a global service.
Which of the following must the company do to ensure GDPR compliance? (Choose two.)

  1. Inform users regarding what data is stored.
  2. Provide opt-in/out for marketing messages.
  3. Provide data deletion capabilities.
  4. Provide optional data encryption.
  5. Grant data access to third parties.
  6. Provide alternative authentication techniques.

Answer(s): A,C


Reference:

https://gdpr.eu/compliance-checklist-us-companies/



A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application.
Which of the following is the MOST likely cause?

  1. The user agent client is not compatible with the WAF.
  2. A certificate on the WAF is expired.
  3. HTTP traffic is not forwarding to HTTPS to decrypt.
  4. Old, vulnerable cipher suites are still being used.

Answer(s): C


Reference:

https://aws.amazon.com/premiumsupport/knowledge-center/waf-block-http-requests-no-user-agent/



A security analyst is reviewing the following output:
Which of the following would BEST mitigate this type of attack?

  1. Installing a network firewall
  2. Placing a WAF inline
  3. Implementing an IDS
  4. Deploying a honeypot

Answer(s): B



Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?

  1. Key sharing
  2. Key distribution
  3. Key recovery
  4. Key escrow

Answer(s): B


Reference:

https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48322§ion=1.3



An organization is implementing a new identity and access management architecture with the following objectives:
-Supporting MFA against on-premises infrastructure
-Improving the user experience by integrating with SaaS applications
-Applying risk-based policies based on location
-Performing just-in-time provisioning
Which of the following authentication protocols should the organization implement to support these requirements?

  1. Kerberos and TACACS
  2. SAML and RADIUS
  3. OAuth and OpenID
  4. OTP and 802.1X

Answer(s): B


Reference:

https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/migrate-application-authentication-to-azure-active-directory



Viewing Page 2 of 112



Share your comments for CompTIA CAS-004 exam with other users:

9eagles 4/7/2023 10:04:00 AM

on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous