[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 281-290

Ensurepass

QUESTION 281

Due to cost and implementation time pressures, a security architect has allowed a NAS to be used instead of a SAN for a non-critical, low volume database. Which of the following would make a NAS unsuitable for a business critical, high volume database application that required a high degree of data confidentiality and data availability? (Select THREE).

 

A.

File level transfer of data

B.

Zoning and LUN security

C.

Block level transfer of data

D.

Multipath

E.

Broadcast storms

F.

File level encryption

G.

Latency

 

Correct Answer: AEG

 

 

QUESTION 282

A security administrator is conducting network forensic analysis of a recent defacement of the company’s secure web payment server (HTTPS). The server was compromised around the New Year’s holiday when all the company employees were off. The company’s network diagram is summarized below:

 

clip_image002Internet

clip_image002[1]Gateway Firewall

clip_image002[2]IDS

clip_image002[3]Web SSL Accelerator

clip_image002[4]Web Server Farm

clip_image002[5]Internal Firewall

clip_image002[6]Company Internal Network

 

The security administrator discovers that all the local web server logs have been deleted. Additionally, the Internal Firewall logs are intact but show no activity from the internal network to the web server farm during the holiday.

 

Which of the following is true?

 

A.

The security administrator should review the IDS logs to determine the source of the attack and the attack vector used to compromise the web server.

B.

The security administrator must correlate the external firewall logs with the intrusion detection system logs to determine what specific attack led to the web server compromise.

C.

The security administrator must reconfigure the network and place the IDS between the SSL accelerator and the server farm to be able to determine the cause of future attacks.

D.

The security administrator must correlate logs from all the devices in the network diagram to determine what specific attack led to the web server compromise.

 

Correct Answer: C

 

 

 

 

 

 

QUESTION 283

A team of security engineers has applied regulatory and corporate guidance to the design of a corporate network. The engineers have generated an SRTM based on their work and a thorough analysis of the complete set of functional and performance requirements in the network specification. Which of the following BEST describes the purpose of an SRTM in this scenario?

 

A.

To ensure the security of the network is documented prior to customer delivery

B.

To document the source of all functional requirements applicable to the network

C.

To facilitate the creation of performance testing metrics and test plans

D.

To allow certifiers to verify the network meets applicable security requirements

 

Correct Answer: D

 

 

QUESTION 284

An architect has been engaged to write the security viewpoint of a new initiative. Which of the following BEST describes a repeatable process that can be used for establishing the security architecture?

 

A.

Inspect a previous architectural document. Based on the historical decisions made, consult the architectural control and pattern library within the organization and select the controls that appear to best fit this new architectural need.

B.

Implement controls based on the system needs. Perform a risk analysis of the system. For any remaining risks, perform continuous monitoring.

C.

Classify information types used within the system into levels of confidentiality, integrity, and availability. Determine minimum required security controls. Conduct a risk analysis. Decide on which security controls to implement.

D.

Perform a risk analysis of the system. Avoid extreme risks. Mitigate high risks. Transfer medium risks and accept low risks. Perform continuous monitoring to ensure that the system remains at an adequate security posture.

 

Correct Answer: C

 

 

QUESTION 285

The security administrator at a company has received a subpoena for the release of all the email received and sent by the company Chief Information Officer (CIO) for the past three years. The security administrator is only able to find one year’s worth of email records on the server and is now concerned about the possible legal implications of not complying with the request. Which of the following should the security administrator check BEFORE responding to the request?

 

A.

The company data privacy policies

B.

The company backup logs and archives

C.

The company data retention policies and guidelines

D.

The company data retention procedures

 

Correct Answer: B

 

 

 

 

 

 

 

QUESTION 286

An administrator is notified that contract workers will be onsite assisting with a new project. The administrator wants each worker to be aware of the corporate policy pertaining to USB storage devices. Which of the following should each worker review and understand before beginning work?

 

A.

Interconnection Security Agreement

B.

Memorandum of Understanding

C.

Business Partnership Agreement

D.

Non-Disclosure Agreement

 

Correct Answer: C

 

 

QUESTION 287

Staff from the sales department have administrator rights to their corporate standard operating environment, and often connect their work laptop to customer networks when onsite during meetings and presentations. This increases the risk and likelihood of a security incident when the sales staff reconnects to the corporate LAN. Which of the following controls would BEST protect the corporate network?

 

A.

Implement a network access control (NAC) solution that assesses the posture of the laptop before granting network access.

B.

Use an independent consulting firm to provide regular network vulnerability assessments and biannually qualitative risk assessments.

C.

Provide sales staff with a separate laptop with no administrator access just for sales visits.

D.

Update the acceptable use policy and ensure sales staff read and acknowledge the policy.

 

Correct Answer: A

 

 

QUESTION 288

As part of the ongoing information security plan in a large software development company, the Chief Information officer (CIO) has decided to review and update the company’s privacy policies and procedures to reflect the changing business environment and business requirements. Training and awareness of the new policies and procedures has been incorporated into the security awareness program which should be:

 

A.

presented by top level management to only data handling staff.

B.

customized for the various departments and staff roles.

C.

technical in nature to ensure all development staff understand the procedures.

D.

used to promote the importance of the security department.

 

Correct Answer: B

 

 

 

 

 

 

 

 

 

 

QUESTION
289

The security administrator is responsible for the confidentiality of all corporate data. The company’s servers are located in a datacenter run by a different vendor. The vendor datacenter hosts servers for many different clients, all of whom have access to the datacenter. None of the racks are physically secured. Recently, the company has been the victim of several attacks involving data injection and exfiltatration. The security administrator suspects these attacks are due to several new network based attacks facilitated by having physical access to a system. Which of the following BEST describes how to adapt to the threat?

 

A.

Apply port security to all switches, switch to SCP, and implement IPSec tunnels between devices.

B.

Apply two factor authentication, require point to point VPNs, and enable log auditing on all devices.

C.

Apply port security to all routers, switch to telnet, and implement point to point VPNs on all servers.

D.

Apply three factor authentication, implement IPSec, and enable SNMP.

 

Correct Answer: A

 

 

QUESTION 290

A startup company offering software on demand has hired a security consultant to provide expertise on data security. The company’s clients are concerned about data confidentiality. The security consultant must design an environment with data confidentiality as the top priority, over availability and integrity. Which of the following designs is BEST suited for this purpose?

 

A.

All of the company servers are virtualized in a highly available environment sharing common hardware and redundant virtual storage. Clients use terminal service access to the shared environment to access the virtualized applications. A secret key kept by the startup encrypts the application virtual memory and data store.

B.

All of the company servers are virtualized in a highly available environment sharing common hardware and redundant virtual storage. Clients use terminal service access to the shared environment and to access the virtualized applications. Each client has a common shared key, which encrypts the application virtual memory and data store.

C.

Each client is assigned a set of virtual hosts running shared hardware. Physical storage is partitioned into LUNS and assigned to each client. MPLS technology is used to segment and encrypt each of the client’s networks. PKI based remote desktop with hardware tokens is used by the client to connect to the application.

D.

Each client is assigned a set of virtual hosts running shared hardware. Virtual storage is partitioned and assigned to each client. VLAN technology is used to segment each of the client’s networks. PKI based remote desktop access is used by the client to connect to the application.

 

Correct Answer: C

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …