CompTIA CAS-004 Exam (page: 21)
CompTIA Advanced Security Practitioner (CASP+) CAS-004
Updated on: 12-Jan-2026

Viewing Page 21 of 112

Which of the following is the MOST important cloud-specific risk from the CSP's viewpoint?

  1. Isolation control failure
  2. Management plane breach
  3. Insecure data deletion
  4. Resource exhaustion

Answer(s): B



An organization is developing a disaster recovery plan that requires data to be backed up and available at a moment's notice.
Which of the following should the organization consider FIRST to address this requirement?

  1. Implement a change management plan to ensure systems are using the appropriate versions.
  2. Hire additional on-call staff to be deployed if an event occurs.
  3. Design an appropriate warm site for business continuity.
  4. Identify critical business processes and determine associated software and hardware requirements.

Answer(s): D


Reference:

https://searchdisasterrecovery.techtarget.com/definition/warm-site



Leveraging cryptographic solutions to protect data that is in use ensures the data is encrypted:

  1. when it is passed across a local network.
  2. in memory during processing
  3. when it is written to a system's solid-state drive.
  4. by an enterprise hardware security module.

Answer(s): B



A Chief Information Officer (CIO) wants to implement a cloud solution that will satisfy the following requirements:
-Support all phases of the SDLC.
-Use tailored website portal software.
-Allow the company to build and use its own gateway software.
-Utilize its own data management platform.
-Continue using agent-based security tools.
Which of the following cloud-computing models should the CIO implement?

  1. SaaS
  2. PaaS
  3. MaaS
  4. IaaS

Answer(s): B


Reference:

https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/



A security analyst detected a malicious PowerShell attack on a single server. The malware used the Invoke-Expression function to execute an external malicious script. The security analyst scanned the disk with an antivirus application and did not find any IOCs. The security analyst now needs to deploy a protection solution against this type of malware.
Which of the following BEST describes the type of malware the solution should protect against?

  1. Worm
  2. Logic bomb
  3. Fileless
  4. Rootkit

Answer(s): C



Viewing Page 21 of 112



Share your comments for CompTIA CAS-004 exam with other users:

9eagles 4/7/2023 10:04:00 AM

on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous