exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 292 discussion

Actual exam question from CompTIA's CAS-004
Question #: 292
Topic #: 1
[All CAS-004 Questions]

A security analyst has been tasked with providing key information in the risk register. Which of the following outputs or results would be used to BEST provide the information needed to determine the security posture for a risk decision? (Choose two.)

  • A. Password cracker
  • B. SCAP scanner
  • C. Network traffic analyzer
  • D. Vulnerability scanner
  • E. Port scanner
  • F. Protocol analyzer
Show Suggested Answer Hide Answer
Suggested Answer: BD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
32d799a
Highly Voted 1 year, 7 months ago
Selected Answer: BD
B. SCAP scanner - The Security Content Automation Protocol (SCAP) scanner is used to automate the scanning of systems for vulnerabilities, configuration issues, and patch verification. D. Vulnerability scanner - Vulnerability scanners detect and classify system weaknesses in computers, networks, and communications equipment; Network traffic analyzer - While useful for monitoring and understanding network traffic (such as identifying malicious activity), it wouldn't directly provide information for the risk register unless the traffic indicates vulnerabilities.
upvoted 9 times
...
CoolCat22
Highly Voted 1 year, 8 months ago
Selected Answer: BD
given is correct SCAP can export metrics of a compliance scan
upvoted 5 times
...
Steel16
Most Recent 2 months, 2 weeks ago
Selected Answer: BD
o Vulnerability scanner: This tool identifies potential weaknesses in systems, applications, and networks, allowing the security analyst to assess the organization's exposure to various threats and prioritize remediation efforts. o SCAP scanner: This tool uses standardized benchmarks to evaluate an organization's security posture against compliance requirements, providing a structured overview of its security controls and potential vulnerabilities.
upvoted 2 times
...
rice3cooker
10 months ago
Selected Answer: CD
should be C and D SCAP scanner just does surface level or a vuln scanner and you need to can the network identify suspicious activity
upvoted 1 times
...
hb0011
1 year, 4 months ago
Selected Answer: CD
It's Vuln scanner and Network analyzer
upvoted 2 times
...
CXSSP
1 year, 8 months ago
Selected Answer: CD
D. Vulnerability scanner: A vulnerability scanner is a tool that assesses computer systems, networks, or applications for known vulnerabilities. It provides a detailed list of vulnerabilities that may exist in the environment. This information is crucial for determining the security posture and prioritizing risk mitigation efforts. C. Network traffic analyzer: A network traffic analyzer monitors and analyzes network traffic to provide insights into the communication patterns, protocols used, and potential security issues. It helps in understanding the network's behavior and identifying any anomalies or potential threats. While the other options may be useful in specific contexts, for the purpose of determining the security posture and making risk decisions, vulnerability scanning and network traffic analysis are the most relevant outputs or results.
upvoted 2 times
...
Alizadeh
1 year, 8 months ago
Selected Answer: CD
The correct answer is C. Network traffic analyzer. and D. Vulnerability scanner.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago