[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 101-110

Ensurepass

QUESTION 101

There have been some failures of the company’s internal facing website. A security engineer has found the WAF to be the root cause of the failures. System logs show that the WAF has been unavailable for 14 hours over the past month, in four separate situations. One of these situations was a two hour scheduled maintenance time, aimed at improving the stability of the WAF. Using the MTTR based on the last month’s performance figures, which of the following calculations is the percentage of uptime assuming there were 722 hours in the month?

 

A.

92.24 percent

B.

98.06 percent

C.

98.34 percent

D.

99.72 percent

 

Correct Answer: C

 

 

 

 

QUESTION 102

A security administrator wants to deploy a dedicated storage solution which is inexpensive, can natively integrate with AD, allows files to be selectively encrypted and is suitable for a small number of users at a satellite office. Which of the following would BEST meet the requirement?

 

A.

SAN

B.

NAS

C.

Virtual SAN

D.

Virtual storage

 

Correct Answer: B

 

 

QUESTION 103

A small retail company recently deployed a new point of sale (POS) system to all 67 stores. The core of the POS is an extranet site, accessible only from retail stores and the corporate office over a split-tunnel VPN. An additional split-tunnel VPN provides bi-directional connectivity back to the main office, which provides voice connectivity for store VoIP phones. Each store offers guest wireless functionality, as well as employee wireless. Only the staff wireless network has access to the POS VPN. Recently, stores are reporting poor response times when accessing the POS application from store computers as well as degraded voice quality when making phone calls. Upon investigation, it is determined that three store PCs are hosting malware, which is generating excessive network traffic. After malware removal, the information security department is asked to review the configuration and suggest changes to prevent this from happening again. Which of the following denotes the BEST way to mitigate future malware risk?

 

A.

Deploy new perimeter firewalls at all stores with UTM functionality.

B.

Change antivirus vendors at the store and the corporate office.

C.

Move to a VDI solution that runs offsite from the same data center that hosts the new POS solution.

D.

Deploy a proxy server with content filtering at the corporate office and route all traffic through it.

 

Correct Answer: A

 

 

QUESTION 104

Which of the following BEST constitutes the basis for protecting VMs from attacks from other VMs hosted on the same physical platform?

 

A.

Aggressive patch management on the host and guest OSs.

B.

Host based IDS sensors on all guest OSs.

C.

Different antivirus solutions between the host and guest OSs.

D.

Unique Network Interface Card (NIC) assignment per guest OS.

 

Correct Answer: A

 

 

 

 

 

 

 

 

 

QUESTION 105

At 9:00 am each morning, all of the virtual desktops in a VDI implementation become extremely slow and/or unresponsive. The outage lasts for around 10 minutes, after which everything runs properly again. The administrator has traced the problem to a lab of thin clients that are all booted at 9:00 am each morning. Which of the following is the MOST likely cause of the problem and the BEST solution? (Select TWO).

 

A.

Add guests with more memory to increase capacity of the infrastructure.

B.

A backup is running on the thin clients at 9am every morning.

C.

Install more memory in the thin clients to handle the increased load while booting.

D.

B
ooting all the lab desktops at the same time is creating excessive I/O.

E.

Install 10-Gb uplinks between the hosts and the lab to increase network capacity.

F.

Install faster SSD drives in the storage system used in the infrastructure.

G.

The lab desktops are saturating the network while booting.

H.

The lab desktops are using more memory than is available to the host systems.

 

Correct Answer: DF

 

 

QUESTION 106

A company is in the process of implementing a new front end user interface for its customers, the goal is to provide them with more self service functionality. The application has been written by developers over the last six months and the project is currently in the test phase. Which of the following security activities should be implemented as part of the SDL in order to provide the MOST security coverage over the solution? (Select TWO).

 

A.

Perform unit testing of the binary code

B.

Perform code review over a sampling of the front end source code

C.

Perform black box penetration testing over the solution

D.

Perform grey box penetration testing over the solution

E.

Perform static code review over the front end source code

 

Correct Answer: DE

 

 

QUESTION 107

Joe, a hacker, has discovered he can specifically craft a webpage that when viewed in a browser crashes the browser and then allows him to gain remote code execution in the context of the victim’s privilege level. The browser crashes due to an e
xception error when a heap memory that is unused is accessed. Which of the following BEST describes the application issue?

 

A.

Integer overflow

B.

Click-jacking

C.

Race condition

D.

SQL injection

E.

Use after free

F.

Input validation

 

Correct Answer: E

 

 

 

 

QUESTION 108

A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important?

 

A.

Insecure direct object references, CSRF, Smurf

B.

Privilege escalation, Application DoS, Buffer overflow

C.

SQL injection, Resource exhaustion, Privilege escalation

D.

CSRF, Fault injection, Memory leaks

 

Correct Answer: A

 

 

QUESTION 109

A new web based application has been developed and deployed in production. A security engineer decides to use an HTTP interceptor for testing the application. Which of the following problems would MOST likely be uncovered by this tool?

 

A.

The tool could show that input validation was only enabled on the client side

B.

The tool could enumerate backend SQL database table and column names

C.

The tool could force HTTP methods such as DELETE that the server has denied

D.

The tool could fuzz the application to determine where memory leaks occur

 

Correct Answer: A

 

 

QUESTION 110

A user has a laptop configured with multiple operating system installations. The operating systems are all installed on a single SSD, but each has its own partition and logical volume. Which of the following is the BEST way to ensure confidentiality of individual operating system data?

 

A.

Encryption of each individual partition

B.

Encryption of the SSD at the file level

C.

FDE of each logical volume on the SSD

D.

FDE of the entire SSD as a single disk

 

Correct Answer: A

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …