[Free] Download New Latest (November) CompTIA CAS-001 Actual Tests 281-290

Ensurepass

QUESTION 281

An architect has been engaged to write the security viewpoint of a new initiative. Which of the following BEST describes a repeatable process that can be used for establishing the security architecture?

 

A.

Inspect a previous architectural document. Based on the historical decisions made, consult the architectural control and pattern library within the organization and select the controls that appear to best fit this new architectural need.

B.

Implement controls based on the system needs. Perform a risk analysis of the system. For any remaining risks, perform continuous monitoring.

C.

Classify information types used within the system into levels of confidentiality, integrity, and availability. Determine minimum required security controls. Conduct a risk analysis.

Decide on which security controls to implement.

D.

Perform a risk analysis of the system. Avoid extreme risks. Mitigate high risks. Transfer medium risks and accept low risks. Perform continuous monitoring to ensure that the system remains at an adequate security posture.

 

Correct Answer: C

 

 

QUESTION 282

A helpdesk manager at a financial company has received multiple reports from employees and customers that their phone calls sound metallic on the voice system. The helpdesk has been using VoIP lines encrypted from the handset to the PBX for several years. Which of the following should be done to address this issue for the future?

 

A.

SIP session tagging and QoS

B.

A dedicated VLAN

C.

Lower encryption setting

D.

Traffic shaping

 

Correct Answer: B

 

 

QUESTION 283

The marketing department at Company A regularly sends out emails signed by the company’s Chief Executive Officer (CEO) with announcements about the company. The CEO sends company and personal emails from a different email account. During legal proceedings against the company, the Chief Information Officer (CIO) must prove which emails came from the CEO and which came from the marketing department. The email server allows emails to be digitally signed and the corporate PKI provisioning allows for one certificate per user. The CEO did not share their password with anyone. Which of the following will allow the CIO to state which emails the CEO sent and which the marketing department sent?

 

A.

Identity proofing

B.

Non-repudiation

C.

Key escrow

D.

Digital rights management

 

Correct Answer: B

 

 

QUESTION 284

A new company requirement mandates the implementation of multi-factor authentication to access network resources. The security administrator was asked to research and implement the most cost-effective solution that would allow for the authentication of both hardware and users. The company wants to leverage the PKI infrastructure which is already well established. Which of the following solutions should the security administrator implement?

 

A.

Issue individual private/public key pairs to each user, install the private key on the central authentication system, and protect the private key with the user’s credentials. Require each user to install the public key on their computer.

B.

Deploy USB fingerprint scanners on all desktops, and enable the fingerprint scanner on all laptops. Require all network users to register their fingerprint using the reader and store the information in the central authentication system.

C.

Issue each user one hardware token. Configure the token serial number in the user properties of the central authentication system for each user and require token authentication with PIN for network logon.

D.

Issue individual private/public key pairs to each user, install the public key on the central authentication system, and require each user to install the private key on their computer and protect it with a password.

 

Correct Answer: D

 

 

QUESTION 285

If a technician must take an employee’s workstation into custody in response to an investigation, which of the following can BEST reduce the likelihood of related legal issues?

 

A.

A formal letter from the company’s president approving the seizure of the workstation.

B.

A formal training and awareness program on information security for all company managers.

C.

A screen displayed at log in that informs users of the employer’s rights to seize, search, and monitor company devices.

D.

A printout of an activity log, showing that the employee has been spending substantial time on non-work related websites.

 

Correct Answer: C

 

QUESTION 286

A security administrator at a Lab Company is required to implement a solution which will provide the highest level of confidentiality possible to all data on the lab network.

 

The current infrastructure design includes:

 

clip_image002Two-factor token and biometric based authentication for all users

clip_image002[1]Attributable administrator accounts

clip_image002[2]Logging of all transactions

clip_image002[3]Full disk encryption of all HDDs

clip_image002[4]Finely granular access controls to all resources

clip_image002[5]Full virtualization of all servers

clip_image002[6]The use of LUN masking to segregate SAN data

clip_image002[7]Port security on all switches

 

The network is protected with a firewall implementing ACLs, a NIPS device, and secured wireless access points.

 

Which of the following cryptographic improvements should be made to the current architecture to achieve the stated goals?

 

A.

PKI based authorization

B.

Transport encryption

C.

Data at rest encryption

D.

Code signing

 

Correct Answer: B

 

 

QUESTION 287

Company A has a remote work force that often includes independent contractors and out of state full time employees.

 

Company A’s security engineer has been asked to implement a solution allowing these users to collaborate on projects with the following goals:

 

clip_image002[8]All communications between parties need to be encrypted in transport

clip_image002[9]Users must all have the same application sets at the same version

clip_image002[10]All data must remain at Company A’s site

clip_image002[11]All users must not access the system between 12:00 and 1:00 as that is the maintenance window

clip_image002[12]Easy to maintain, patch and change application environment

 

Which of the following solutions should the security engineer recommend to meet the MOST goals?

 

A.

Create an SSL reverse proxy to a collaboration workspace. Use remote installation service to maintain application version. Have users use full desktop encryption. Schedule server downtime from 12:00 to 1:00 PM.

B.

Install an SSL VPN to Company A’s datacenter, have users connect to a standard virtual workstation image, set workstation time of day restrictions.

C.

Create an extranet web portal using third party web based office applications. Ensure that Company A maintains the administrative access.

D.

Schedule server downtime from 12:00 to 1:00 PM, implement a Terminal Server Gateway, use remote installation services to standardize application on user’s laptops.

 

Correct Answer: B

 

 

QUESTION 288

CORRECT TEXT

clip_image004

clip_image006

 

Correct Answer: 192.18.1.0/24 any 192.168.20.0/24 3389 any

 

 

QUESTION 289

A morphed worm carrying a 0-day payload has infiltrated the company network and is now spreading across the organization. The security administrator was able to isolate the worm communication and payload distribution channel to TCP port 445. Which of the following can the administrator do in the short term to minimize the attack?

 

A.

Deploy the following ACL to the HIPS: DENY – TCP – ANY – ANY ?445.

B.

Run a TCP 445 port scan across the organization and patch hosts with open ports.

C.

Add the following ACL to the corporate firewall: DENY – TCP – ANY – ANY – 445.

D.

Force a signature update and full system scan from the enterprise anti-virus solution.

 

Correct Answer: A

QUESTION 290

New zero-day attacks are announced on a regular basis against a broad range of technology systems. Which of the following best practices should a security manager do to manage the risks of these attack vectors? (Select TWO).

 

A.

Establish an emergency response call tree.

B.

Create an inventory of applications.

C.

Backup the router and firewall configurations.

D.

Maintain a list of critical systems.

E.

Update all network diagrams.

 

Correct Answer: BD

 

Free VCE & PDF File for CompTIA CAS-001 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in CAS-001 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.