[Free] Download New Latest (November) CompTIA CAS-001 Actual Tests 141-150

Ensurepass

QUESTION 141

A new malware spreads over UDP Port 8320 and several network hosts have been infected. A new security administrator has determined a possible cause, and the infected machines have been quarantined. Which of the following actions could a new security administrator take to further mitigate this issue?

 

A.

Limit source ports on the firewall to specific IP addresses.

B.

Add an explicit deny-all and log rule as the final entry of the firewall rulebase.

C.

Implement stateful UDP filtering on UDP ports above 1024.

D.

Configure the firewall to use IPv6 by default.

 

Correct Answer: B

 

 

QUESTION 142

A system architect has the following constraints from the customer:

 

clip_image002Confidentiality, Integrity, and Availability (CIA) are all of equal importance.

clip_image002[1]Average availability must be at least 6 nines (99.9999%).

clip_image002[2]All devices must support collaboration with every other user device.

clip_image002[3]All devices must be VoIP and teleconference ready.

 

Which of the following security controls is the BEST to apply to this architecture?

 

A.

Deployment of multiple standard images based on individual hardware configurations, employee choice of hardware and software requirements, triple redundancy of all processing equipment.

B.

Enforcement of strict network access controls and bandwidth minimization techniques, a single standard software image, high speed processing, and distributed backups of all equipment in the datacenter.

C.

Deployment of a unified VDI across all devices, SSD RAID in all servers, multiple identical hot sites, granting administrative rights to all users, backup of system critical data.

D.

Enforcement of security policies on mobile/remote devices, standard images and device hardware configurations, multiple layers of redundancy, and backup on all storage devices.

 

Correct Answer: D

 

 

QUESTION 143

A company has a legacy virtual cluster which was added to the datacenter after a small company was acquired. All VMs on the cluster use the same virtual network interface to connect to the corporate data center LAN. Some of the virtual machines on the cluster process customer data, some process company financial data, and others act as externally facing web servers. Which of the following security risks can result from the configuration in this scenario?

 

A.

Visibility on the traffic between the virtual machines can impact confidentiality

B.

NIC utilization can exceed 50 percent and impact availability

C.

Shared virtual switches can negatively impact the integrity of network packets

D.

Additional overhead from network bridging can affect availability

 

Correct Answer: A

QUESTION 144

An administrator implements a new PHP application into an existing website and discovers the newly added PHP pages do not work. The rest of the site also uses PHP and is functioningcorrectly. The administrator tested the new application on their personal workstation thoroughly before uploading to the server and did not run into any errors. Checking the Apache configuration file, the administrator verifies that the new virtual directory is added as listed:

 

<VirtualHost *:80>

 

DocumentRoot “/var/www”

 

<Directory “/home/administrator/app”>

 

AllowOveride none

 

Order allow, deny

 

Allow from all

 

</Directory>

 

</VirtualHost>

 

Which of the following is MOST likely occurring so that this application does not run properly?

 

A.

PHP is overriding the Apache security settings.

B.

SELinux is preventing HTTP access to home directories.

C.

PHP has not been restarted since the additions were added.

D.

The directory had an explicit allow statement rather than the implicit deny.

 

Correct Answer: B

 

 

QUESTION 145

A company is planning to deploy an in-house Security Operations Center (SOC).

 

One of the new requirements is to deploy a NIPS solution into the Internet facing environment.

 

The SOC highlighted the following requirements:

 

clip_image002[4]Perform fingerprinting on unfiltered inbound traffic to the company

clip_image002[5]Monitor all inbound and outbound traffic to the DMZ’s

 

In which of the following places should the NIPS be placed in the network?

 

A.

In front of the Internet firewall and in front of the DMZs

B.

In front of the Internet firewall and in front of the internal firewall

C.

In front of the Internet firewall and behind the internal firewall

D.

Behind the Internet firewall and in front of the DMZs

 

Correct Answer: A

 

 

 

QUESTION 146

The sales staff at a software development company has received the following requirements from a customer: “We need the system to notify us in advance of all software errors and report all outages”. Which of the following BEST conveys these customer requirements to the software development team to understand and implement?

 

A.

The system shall send a status message to a network monitoring console every five seconds while in an error state and the system should email the administrator when the number of input errors exceeds five.

B.

The system shall alert the administrator upon the loss of network communications and when error flags are thrown.

C.

The system shall email the administrator when processing deviates from expected conditions and the system shall send a heartbeat message to a monitoring console every second while in normal operations.

D.

The system shall email the administrator when an error condition is detected and a flag is thrown and the system shall send an email to the administrator when network communications are disrupted.

 

Correct Answer: C

 

 

QUESTION 147

There have been some failures of the company’s customer-facing website. A security engineer has analyzed the root cause to be the WAF. System logs show that the WAF has been down for 14 total hours over the past month in four separate situations. One of these situations was a two hour scheduled maintenance activity aimed to improve the stability of the WAF. Which of the following is the MTTR, based on the last month’s performance figures?

 

A.

3 hours

B.

3.5 hours

C.

4 hours

D.

4.666 hours

 

Correct Answer: C

 

 

QUESTION 148

A systems security consultant is hired by Corporation X to analyze the current enterprise network environment and make recommendations for increasing network security. It is the consultant’s first day on the job. Which of the following network design considerations should the consultant consider? (Select THREE).

 

A.

What hardware and software would work best for securing the network?

B.

What corporate assets need to be protected?

C.

What are the business needs of the organization?

D.

What outside threats are most likely to compromise network security?

E.

What is the budget for this project?

F.

What time and resources are needed to carry out the security plan?

 

Correct Answer: BCD

 

 

 

 

QUESTION 149

The Chief Information Officer (CIO) of Company XYZ has returned from a large IT conference where one of the topics was defending against zero day attacks ?specifically deploying third party patches to vulnerable software. Two months prior, the majority of the company systems were compromised because of a zero day exploit. Due to budget constraints the company only has operational systems. The CIO wants the Security Manager to research the use of these patches. Which of the following is the GREATEST concern with the use of a third party patch to mitigate another un-patched vulnerability?

 

A.

The company does not have an adequate test environment to validate the impact of the third party patch, introducing unknown risks.

B.

The third party patch may introduce additional unforeseen risks and void the software licenses for the patched applications.

C.

The company’s patch management solution only supports patches and updates released directly by the vendor.

D.

Another period of vulnerability will be introduced because of the need to remove the third party patch prior to installing any vendor patch.

 

Correct Answer: A

 

 

QUESTION 150

A corporation relies on a server running a trusted operating system to broker data transactions between different security zones on their network. Each zone is a separate domain and the only connection between the networks is via the trusted server.

 

The three zones at the corporation are as followed.

 

clip_image002[6]Zone A connects to a network, which is also connected to the Internet through a router.

clip_image002[7]Zone B to a closed research and development network.

clip_image002[8]Zone C to an intermediary switch supporting a SAN, dedicated to long-term audit log and file storage, so the corporation meets compliance requirements.

 

A firewall is deployed on the inside edge of the Internet connected router.

 

Which of the following is the BEST location to place other security equipment?

 

A.

HIPS on all hosts in
Zone A and B, and an antivirus and patch server in Zone C.

B.

A WAF on the switch in Zone C, an additional firewall in Zone A, and an antivirus server in Zone B.

C.

A NIPS on the switch in Zone C, an antivirus server in Zone A, and a patch server in Zone B.

D.

A NIDS on the switch in Zone C, a WAF in Zone A, and a firewall in Zone B.

 

Correct Answer: C

 

Free VCE & PDF File for CompTIA CAS-001 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in CAS-001 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.