[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 241-250

Ensurepass

QUESTION 241

A newly-appointed risk management director for the IT department at Company XYZ, a major pharmaceutical manufacturer, needs to conduct a risk analysis regarding a new system which the developers plan to bring on-line in three weeks. The director begins by reviewing the thorough and well-written report from the independent contractor who performed a security assessment of the system. The report details what seem to be a manageable volume of infrequently exploited security vulnerabilities. The director decides to implement continuous monitoring and other security controls to mitigate the impact of the vulnerabilities. Which of the following should the director require from the developers before agreeing to deploy the system?

 

A.

An incident response plan which guarantees response by tier two support within 15 minutes of an incident.

B.

A definitive plan of action and milestones which lays out resolutions to all vulnerabilities within six months.

C.

Business insurance to transfer all risk from the company shareholders to the insurance company.

D.

A prudent plan of action which details how to decommission the system within 90 days of becoming operational.

 

Correct Answer: B

 

 

QUESTION 242

CORRECT TEXT

clip_image002

clip_image004

 

Correct Answer: 192.18.1.0/24 any 192.168.20.0/24 3389 any

 

 

QUESTION 243

A security administrator at a Lab Company is required to implement a solution which will provide the highest level of confidentiality possible to all data on the lab network.

 

The current infrastructure design includes:

 

clip_image006Two-factor token and biometric based authentication for all users

clip_image006[1]Attributable administrator accounts

clip_image006[2]Logging of all transactions

clip_image006[3]Full disk encryption of all HDDs

clip_image006[4]Finely granular access controls to all resources

clip_image006[5]Full virtualization of all servers

clip_image006[6]The use of LUN masking to segregate SAN data

clip_image006[7]Port security on all switches

 

The network is protected with a firewall implementing ACLs, a NIPS device, and secured wireless access points.

 

Which of the following cryptographic improvements should be made to the current architecture to achieve the stated goals?

 

A.

PKI based authorization

B.

Transport encryption

C.

Data at rest encryption

D.

Code signing

 

Correct Answer: B

 

 

QUESTION 244

A security consultant is hired by a company to determine if an internally developed web application is vulnerable to attacks. The consultant spent two weeks testing the application, and determines that no vulnerabilities are present. Based on the results of the tools and tests available, which of the following statements BEST reflects the security status of the application?

 

A.

The company’s software lifecycle management improved the security of the application.

B.

There are no vulnerabilities in the application.

C.

The company should deploy a web application firewall to ensure extra security.

D.

There are no known vulnerabilities at this time.

 

Correct Answer: D

 

 

QUESTION 245

An administrator receives reports that the network is running slow for users connected to a certain switch. Viewing the network traffic, the administrator reviews the following:

 

18:51:59.042108 IP linuxwksta.55467 > dns.company.com.domain: 39462+ PTR? 222.17.4.10.in-addr.arpa. (42)

 

18:51:59.055732 IP dns.company.com.domain > linuxwksta.55467: 39462 NXDomain 0/0/0 (42)

 

18:51:59.055842 IP linuxwksta.48287 > dns.company.com.domain: 46767+ PTR? 255.19.4.10.in-addr.arpa. (42)

 

18:51:59.069816 IP dns.company.com.domain > linuxwksta.48287: 46767 NXDomain 0/0/0 (42)

 

18:51:59.159060 IP linuxwksta.42491 > 10.4.17.72.iscsi-target: Flags [P.], seq 1989625106:1989625154, ack 2067334822, win 1525, options [nop,nop,TS val 16021424 ecr 215646227], length 48

 

18:51:59.159145 IP linuxwksta.48854 > dns.company.com.domain: 3834+ PTR? 72.17.4.10.in-addr.arpa. (41)

 

18:51:59.159314 IP 10.4.17.72.iscsi-target > linuxwksta.42491: Flags [P.], seq 1:49, ack 48, win 124, options [nop,nop,TS val 215647479 ecr 16021424], length 48

 

18:51:59.159330 IP linuxwksta.42491 > 10.4.17.72.iscsi-target: Flags [.], ack 49, win 1525, options [nop,nop,TS val 16021424 ecr 215647479], length 0

 

18:51:59.165342 IP dns.company.com.domain > linuxwksta.48854: 3834 NXDomain 0/0/0 (41)

 

18:51:59.397461 ARP, Request who-has 10.4.16.58 tell 10.4.16.1, length 46

 

18:51:59.397597 IP linuxwksta.37684 > dns.company.com.domain: 15022+ PTR? 58.16.4.10.in-addr.arpa. (41)

 

Given the traffic report, which of the following is MOST likely causing the slow traffic?

 

A.

DNS poisoning

B.

Improper network zoning

C.

ARP poisoning

D.

Improper LUN masking

 

Correct Answer: B

 

 

QUESTION 246

CORRECT TEXT

An administrator wants to install a patch to an application. Given the scenario, download, verify and install the patch in the most secure manner. Instructions The last install that is completed will be the final submission

 

clip_image008

 

Correct Answer: You need to check the hash value of download software with md5 utility.

Explanation:

Check the below images for more details:

clip_image010

clip_image012

clip_image014

 

 

QUESTION 247

A security administrator is redesigning, and implementing a service-oriented architecture to replace an old, in-house software processing system, tied to a corporate sales website. After performing the business process analysis, the administrator decides the services need to operate in a dynamic fashion. The company has also been the victim of data injection attacks in the past and needs to build in mitigation features. Based on these requirements and past vulnerabilities, which of the following needs to be incorporated into the SOA?

 

A.

Point to point VPNs for all corporate intranet users.

B.

Cryptographic hashes of all data transferred between services.

C.

Service to service authentication for all workflows.

D.

Two-factor authentication and signed code

 

Correct Answer: C

 

 

QUESTION 248

The marketing department at Company A regularly sends out emails signed by the company’s Chief Executive Officer (CEO) with announcements about the company. The CEO sends company and personal emails from a different email account. During legal proceedings against the company, the Chief Information Officer (CIO) must prove which emails came from the CEO and which came from the marketing department. The email server allows emails to be digitally signed and the corporate PKI provisioning allows for one certificate per user. The CEO did not share their password with anyone. Which of the following will allow the CIO to state which emails the CEO sent and which the marketing department sent?

 

A.

Identity proofing

B.

Non-repudiation

C.

Key escrow

D.

Digital rights management

 

Correct Answer: B

 

QUESTION 249

A manager who was attending an all-day training session was overdue entering bonus and payroll information for subordinates. The manager felt the best way to get the changes entered while in training was to log into the payroll system, and then activate desktop sharing with a trusted subordinate. The manager granted the subordinate control of the desktop thereby giving the subordinate full access to the payroll system. The subordinate did not have authorization to be in the payroll system. Another employee reported the incident to the security team. Which of the following would be the MOST appropriate method for dealing with this issue going forward?

 

A.

Provide targeted security awareness training and impose termination for repeat violators.

B.

Block desktop sharing and web conferencing applications and enable use only with approval.

C.

Actively monitor the data traffic for each employee using desktop sharing or web conferencing applications.

D.

Permanently block desktop sharing and web conferencing applications and do not allow its use at the company.

 

Correct Answer: A

 

 

QUESTION 250

The Chief Technology Officer (CTO) has decided that servers in the company datacenter should be virtualized to conserve physical space. The risk assurance officer is concerned that the project team in charge of virtualizing servers plans to co-mingle many guest operating systems with different security requirements to speed up the rollout and reduce the number of host operating systems or hypervisors required. Which of the following BEST describes the risk assurance officer’s concerns?

 

A.

Co-mingling guest operating system with different security requirements allows guest OS privilege elevation to occur within the guest OS via shared memory allocation with the host OS.

B.

Co-mingling of guest operating systems with different security requirements increases the risk of data loss if the hypervisor fails.

C.

A weakly protected guest OS combined with a host OS exploit increases the chance of a successful VMEscape attack being executed, compromising the hypervisor and other guest OS.

D.

A weakly protected host OS will allow the hypervisor to become corrupted resulting in data throughput performance issues.

 

Correct Answer: C

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …