[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 211-220

Ensurepass

QUESTION 211

A business unit of a large enterprise has outsourced the hosting and development of a new external website which will be accessed by premium customers, in order to speed up the time to market timeline. Which of the following is the MOST appropriate?

 

A.

The external party providing the hosting and website development should be obligated under contract to provide a secure service which is regularly tested (vulnerability and penetration). SLAs should be in place for the resolution of newly identified vulnerabilities and a guaranteed uptime.

B.

The use of external organizations to provide hosting and web development services is not recommended as the costs are typically higher than what can be achieved internally. In addition, compliance with privacy regulations becomes more complex and guaranteed uptimes are difficult to track and measure.

C.

Outsourcing transfers all the risk to the third party. An SLA should be in place for the resolution of newly identified vulnerabilities and penetration / vulnerability testing should be conducted regularly.

D.

Outsourcing transfers the risk to the third party, thereby minimizing the cost and any legal obligations. An MOU should be in place for the resolution of newly identified vulnerabilities and penetration / vulnerability testing should be conducted regularly.

 

Correct Answer: A

 

 

QUESTION 212

DRAG DROP

An organization is implementing a project to simplify the management of its firewall network flows and implement security controls. The following requirements exist. Drag and drop the BEST security solution to meet the given requirements. Options may be used once or not at all. All placeholders must be filled.

 

clip_image002

 

Correct Answer:

clip_image004

QUESTION 213

An enterprise must ensure that all devices that connect to its networks have been previously approved. The solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs and administrative overhead, the security architect wants to outsource identity proofing and second factor digital delivery to the third party. Which of the following solutions will address the enterprise requirements?

 

A.

Implementing federated network access with the third party.

B.

Using a HSM at the network perimeter to handle ne
twork device access.

C.

Using a VPN concentrator which supports dual factor via hardware tokens.

D.

Implementing 802.1x with EAP-TTLS across the infrastructure.

 

Correct Answer: D

 

 

QUESTION 214

An internal development team has migrated away from Waterfall development to use Agile development. Overall, this has been viewed as a successful initiative by the stakeholders as it has improved time-to-market. However, some staff within the security team have contended that Agile development is not secure. Which of the following is the MOST accurate statement?

 

A.

Agile and Waterfall approaches have the same effective level of security posture. They both need similar amounts of security effort at the same phases of development.

B.

Agile development is fundamentally less secure than Waterfall due to the lack of formal up-front design and inability to perform security reviews.

C.

Agile development is more secure than Waterfall as it is a more modern methodology which has the advantage of having been able to incorporate security best practices of recent years.

D.

Agile development has different phases and timings compared to Waterfall. Security activities need to be adapted and performed within relevant Agile phases.

 

Correct Answer: D

 

 

QUESTION 215

Company policy requires that all unsupported operating systems be removed from the network. The security administrator is using a combination of network based tools to identify such systems for the purpose of disconnecting them from the network. Which of the following tools, or outputs from the tools in use, can be used to help the security administrator make an approximate determination of the operating system in use on the local company network? (Select THREE).

 

A.

Passive banner grabbing

B.

Password cracker

C.

http://www.company.org/documents_private/index.php?search=string#&topic=windows&tcp =packet%20capture&cookie=wokdjwalkjcnie61lkasdf2aliser4

D.

443/tcp open http

E.

dig host.company.com

F.

09:18:16.262743 IP (tos 0x0, ttl 64, id 9870, offset 0, flags [none], proto TCP (6), length 40)192.168.1.3.1051 > 10.46.3.7.80: Flags [none], cksum 0x1800 (correct), win 512, length

G.

Nmap

 

Correct Answer: AFG

 

 

 

QUESTION 216

A vulnerability scanner report shows that a client-server host monitoring solution operating in the credit card corporate environment is managing SSL sessions with a weak algorithm which does not meet corporate policy. Which of the following are true statements? (Select TWO).

 

A.

The X509 V3 certificate was issued by a non trusted public CA.

B.

The client-server handshake could not negotiate strong ciphers.

C.

The client-server handshake is configured with a wrong priority.

D.

The client-server handshake is based on TLS authentication.

E.

The X509 V3 certificate is expired.

F.

The client-server implements client-server mutual authentication with different certificates.

 

Correct Answer: BC

 

 

QUESTION 217

A security auditor suspects two employees of having devised a scheme to steal money from the company. While one employee submits purchase orders for personal items, the other employee approves these purchase orders. The auditor has contacted the human resources director with suggestions on how to detect such illegal activities. Which of the following should the human resource director implement to identify the employees involved in these activities and reduce the risk of this activity occurring in the future?

 

A.

Background checks

B.

Job rotation

C.

Least privilege

D.

Employee termination procedures

 

Correct Answer: B

 

 

QUESTION 218

A finance manager says that the company needs to ensure that the new system can “replay” data, up to the minute, for every exchange being tracked by the investment departments. The finance manager also states that the company’s transactions need to be tracked against this data for a period of five years for compliance. How would a security engineer BEST interpret the finance manager’s needs?

 

A.

Compliance standards

B.

User requirements

C.

Data elements

D.

Data storage

E.

Acceptance testing

F.

Information digest

G.

System requirements

 

Correct Answer: B

 

 

 

 

 

 

QUESTION 219

The finance department for an online shopping website has discovered that a number of customers were able to purchase goods and services without any payments. Further analysis conducted by the security investigations team indicated that the website allowed customers to update a payment amount for shipping. A specially crafted value could be entered and cause a roll over, resulting in the shipping cost being subtracted from the balance and in some instances resulted in a negative balance. As a result, the system processed the negative balance as zero dollars. Which of the following BEST describes the application issue?

 

A.

Race condition

B.

Click-jacking

C.

Integer overflow

D.

Use after free

E.

SQL injection

 

Correct Answer: C

 

 

QUESTION 220

An organization uses IP address block 203.0.113.0/24 on its internal network. At the border router, the network administrator sets up rules to deny packets with a source address in this subnet from entering the network, and to deny packets with a destination address in this subnet from leaving the network. Which of the following is the administrator attempting to prevent?

 

A.

BGP route hijacking attacks

B.

Bogon IP network traffic

C.

IP spoofing attacks

D.

Man-in-the-middle attacks

E.

Amplified DDoS attacks

 

Correct Answer: C

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …