[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 331-340

Ensurepass

QUESTION 331

New zero-day attacks are announced on a regular basis against a broad range of technology systems. Which of the following best practices should a security manager do to manage the risks of these attack vectors? (Select TWO).

 

A.

Establish an emergency response call tree.

B.

Create an inventory of applications.

C.

Backup the router and firewall configurations.

D.

Maintain a list of critical systems.

E.

Update all network diagrams.

 

Correct Answer: BD

 

 

QUESTION 332

A process allows a LUN to be available to some hosts and unavailable to others. Which of the following causes such a process to become vulnerable?

 

A.

LUN masking

B.

Data injection

C.

Data fragmentation

D.

Moving the HBA

 

Correct Answer: D

 

 

 

 

 

 

QUESTION 333

After three vendors submit their requested documentation, the CPO and the SPM can better understand what each vendor does and what solutions that they can provide. But now they want to see the intricacies of how these solutions can adequately match the requirements needed by the firm. Upon the directive of the CPO, the CISO should submit which of the following to the three submitting firms?

 

A.

A T&M contract

B.

An RFP

C.

A FFP agreement

D.

A new RFQ

 

Correct Answer: < font style="font-size: 10pt">B

 

 

QUESTION 334

A data processing server uses a Linux based file system to remotely mount physical disks on a shared SAN. The server administrator reports problems related to processing of files where the file appears to be incompletely written to the disk. The network administration team has conducted a thorough review of all network infrastructure and devices and found everything running at optimal performance. Other SAN customers are unaffected. The data being processed consists of millions of small files being written to disk from a network source one file at a time. These files are then accessed by a local Java program for processing before being transferred over the network to a SE Linux host for processing. Which of the following is the MOST likely cause of the processing problem?

 

A.

The administrator has a PERL script running which disrupts the NIC by restarting the CRON process every 65 seconds.

B.

The Java developers accounted for network latency only for the read portion of the processing and not the write process.

C.

The virtual file system on the SAN is experiencing a race condition between the reads and writes of network files.

D.

The Linux file system in use cannot write files as fast as they can be read by the Java program resulting in the errors.

 

Correct Answer: D

 

 

QUESTION 335

An organization determined that each of its remote sales representatives must use a smartphone for email access. The organization provides the same centrally manageable model to each person. Which of the following mechanisms BEST protects the confidentiality of the resident data?

 

A.

Require dual factor authentication when connecting to the organization’s email server.

B.

Require each sales representative to establish a PIN to access the smartphone and limit email storage to two weeks.

C.

Require encrypted communications when connecting to the organization’s email server.

D.

Require a PIN and automatic wiping of the smartphone if someone enters a specific number of incorrect PINs.

 

Correct Answer: D

 

 

QUESTION 336

A developer is coding the crypto routine of an application that will be installed on a standard headless and diskless server connected to a NAS housed in the datacenter. The developer has written the following six lines of code to add entropy to the routine:

 

1. If VIDEO input exists, use video data for entropy

2. If AUDIO input exists, use audio data for entropy

3. If MOUSE input exists, use mouse data for entropy

4. IF KEYBOARD input exists, use keyboard data for entropy

5. IF IDE input exists, use IDE data for entropy

6. IF NETWORK input exists, use network data for entropy

 

Which of the following lines of code will result in the STRONGEST seed when combined?

 

A.

2 and 1

B.

3 and 5

C.

5 and 2

D.

6 and 4

 

Correct Answer: D

 

 

QUESTION 337

The <nameID> element in SAML can be provided in which of the following predefined formats? (Select TWO).

 

A.

X.509 subject name

B.

PTR DNS record

C.

EV certificate OID extension

D.

Kerberos principal name

E.

WWN record name

 

Correct Answer: AD

 

 

QUESTION 338

Company A is purchasing Company B. Company A uses a change management system for all IT processes while Company B does not have one in place. Company B’s IT staff needs to purchase a third party product to enhance production. Which of the following NEXT steps should be implemented to address the security impacts this product may cause?

 

A.

Purchase the product and test it in a lab environment before installing it on any live system.

B.

Allow Company A and B’s IT staff to evaluate the new product prior to purchasing it.

C.

Purchase the product and test it on a few systems before installing it throughout the entire company.

D.

Use Company A’s change management process during the evaluation of the new product.

 

Correct Answer: D

 

 

 

 

 

 

QUESTION 339

In single sign-on, the secondary domain needs to trust the primary domain to do which of the following? (Select TWO).

 

A.

Correctly assert the identity and authorization credentials of the end user.

B.

Correctly assert the authentication and authorization credentials of the end user.

C.

Protect the authentication credentials used to verify the end user identity to the secondary domain for unauthorized use.

D.

Protect the authentication credentials used to verify the end user identity to the secondary domain for authorized use.

E.

Protect the accounting credentials used to verify the end user identity to the secondary domain for unauthorized use.

F.

Correctly assert the identity and authentication credentials of the end user.

 

Correct Answer: DF

 

 

QUESTION 340

An administrator has four virtual guests on a host server. Two of the servers are corporate SQL servers, one is a corporate mail server, and one is a testing web server for a small group of developers. The administrator is experiencing difficulty connecting to the host server during peak network usage times. Which of the following would allow the administrator to securely connect to and manage the host server during peak usage times?

 

A.

Increase the virtual RAM allocation to high I/O servers.

B.

Install a management NIC and dedicated virtual switch.

C.

Configure the high I/O virtual servers to use FCoE rather than iSCSI.

D.

Move the guest web server to another dedicated host.

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …