[Free] Download New Latest (November) CompTIA CAS-001 Actual Tests 31-40

Ensurepass

QUESTION 31

Based on the results of a recent audit, a company rolled out a standard computer image in an effort to provide consistent security configurations across all computers. Which of the following controls provides the GREATEST level of certainty that unauthorized changes are not occurring?

 

A.

Schedule weekly vulnerability assessments

B.

Implement continuous log monitoring

C.

Scan computers weekly against the baseline

D.

Require monthly reports showing compliance with configuration and updates

 

Correct Answer: C

 

 

QUESTION 32

The Chief Executive Officer (CEO) of a corporation purchased the latest mobile device and wants to connect it to the company’s internal network. The Chief Information Security Officer (CISO) was told to research and recommend how to secure this device. Which of the following recommendations should be implemented to keep the device from posing a security risk to the company?

 

A.

A corporate policy to prevent sensitive information from residing on a mobile device and anti-virus software.

B.

Encryption of the non-volatile memory and a corporate policy to prevent sensitive information from residing on a mobile device.

C.

Encryption of the non-volatile memory and a password or PIN to access the device.

D.

A password or PIN to access the device and a corporate policy to prevent sensitive information from residing on a mobile device.

 

Correct Answer: C

 

 

QUESTION 33

A data breach occurred which impacted the HR and payroll system. It is believed that an attack from within the organization resulted in the data breach. Which of the following should be performed FIRST after the data breach occurred?

 

A.

Assess system status

B.

Restore from backup tapes

C.

Conduct a business impact analysis

D.

Review NIDS logs

 

Correct Answer: A

 

 

QUESTION 34

Which of the following must be taken into consideration for e-discovery purposes when a legal case is first presented to a company?

 

A.

Data ownership on all files

B.

Data size on physical disks

C.

Data retention policies on only file servers

D.

Data recovery and storage

 

Correct Answer: D

 

 

QUESTION 35

The company is about to upgrade a financial system through a third party, but wants to legally ensure that no sensitive information is compromised throughout the project. The project manager must also make sure that internal controls are set to mitigate the potential damage that one individual’s actions may cause. Which of the following needs to be put in place to make certain both organizational requirements are met? (Select TWO).

 

A.

Separation of duties

B.

Forensic tasks

C.

MOU

D.

OLA

E.

NDA

F.

Job rotation

 

Correct Answer: AE

 

 

QUESTION 36

The internal auditor at Company ABC has completed the annual audit of the company’s financial system. The audit report indicates that the accounts receivable department has not followed proper record disposal procedures during a COOP/BCP tabletop exercise involving manual processing of financial transactions. Which of the following should be the Information Security Officer’s (ISO’s) recommendation? (Select TWO).

 

A.

Wait for the external audit results

B.

Perform another COOP exercise

C.

Implement mandatory training

D.

Destroy the financial transactions

E.

Review company procedures

 

Correct Answer: CE

 

 

QUESTION 37

An administrator wants to virtualize the company’s web servers, application servers, and database servers. Which of the following should be done to secure the virtual host machines? (Select TWO).

 

A.

Establish VLANs for each virtual guest’s NIC on the virtual switch.

B.

Enable virtual switch layer 2 security precautions.

C.

Only access hosts through a secure management interface.

D.

Distribute guests to hosts by application role or trust zone.

E.

Restrict physical and network access to the host console.

 

Correct Answer: CE

 

 

 

 

 

QUESTION 38

Which of the following can aid a buffer overflow attack to execute when used in the creation of applications?

 

A.

Secure cookie storage

B.

Standard libraries

C.

State management

D.

Input validation

 

Correct Answer: B

 

 

QUESTION 39

The helpdesk is receiving multiple calls about slow and intermittent Internet access from the finance department. The network administrator reviews the tickets and compiles the following information for the security administrator:

 

—–

 

Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0

 

Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0

 

Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0

 

All callers are connected to the same switch and are routed by a router with five built-in interfaces. The upstream router interface’s MAC is 00-01-42-32-ab-1a

 

—–

 

The security administrator brings a laptop to the finance office, connects it to one of the wall jacks, starts up a network analyzer, and notices the following:

 

09:05:10.937590 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f
:f1:da:52)

 

09:05:15.934840 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)

 

09:05:19.931482 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)

 

Which of the following can the security administrator determine from the above information?

 

A.

A man in the middle attack is underway – implementing static ARP entries is a possible solution.

B.

An ARP flood attack targeted at the router is causing intermittent communication – implementing IPS is a possible solution.

C.

The default gateway is being spoofed – implementing static routing with MD5 is a possible solution.

D.

The router is being advertised on a separate network – router reconfiguration is a possible solution.

 

Correct Answer: A

 

 

 

 

 

QUESTION 40

After implementing port security, restricting all network traffic into and out of a network, migrating to IPv6, installing NIDS, firewalls, spam and application filters, a security administer is convinced that the network is secure. The administrator now focuses on securing the hosts on the network, starting with the servers. Which of the following is the MOST complete list of end-point security software the administrator could plan to implement?

 

A.

Anti-malware/virus/spyware/spam software, as well as a host based firewall and strong, two-factor authentication.

B.

Anti-virus/spyware/spam software, as well as a host based IDS, firewall, and strong three-factor authentication.

C.

Anti-malware/virus/spyware/spam software, as well as a host based firewall and biometric authentication.

D.

Anti-malware/spam software, as well as a host based firewall and strong, three-factor authentication.

 

Correct Answer: A

 

Free VCE & PDF File for CompTIA CAS-001 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in CAS-001 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.