[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 161-170

Ensurepass

QUESTION 161

After the install process, a software application executed an online activation process. After a few months, the system experienced a hardware failure. A backup image of the system was restored on a newer revision of the same brand and model device. After the restore, the specialized application no longer works. Which of the following is the MOST likely cause of the problem?

 

A.

The binary files used by the application have been modified by malware.

B.

The application is unable to perform remote attestation due to blocked ports.

C.

The restored image backup was encrypted with the wrong key.

D.

The hash key summary of hardware and installed software no longer match.

 

Correct Answer: D

 

 

 

 

 

 

 

 

QUESTION 162

A company has decided to change its current business direction and refocus on core business. Consequently, several company sub-businesses are in the process of being sold-off. A security consultant has been engaged to advise on residual information security concerns with a de-merger. From a high-level perspective, which of the following BEST provides the procedure that the consultant should follow?

 

A.

Perform a penetration test for the current state of the company. Perform another penetration test after the de-merger. Identify the gaps between the two tests.

B.

Duplicate security-based assets should be sold off for commercial gain to ensure that the security posture of the company does not decline.

C.

Explain that security consultants are not trained to offer advice on company acquisitions or demergers. This needs to be handled by legal representatives well versed in corporate law.

D.

Identify the current state from a security viewpoint. Based on the demerger, assess what the security gaps will be from a physical, technical, DR, and policy/awareness perspective.

 

Correct Answer: D

 

 

QUESTION 163

The risk manager at a small bank wants to use quantitative analysis to determine the ALE of running a business system at a location which is subject to fires during the year. A risk analyst reports to the risk manager that the asset value of the business system is $120,000 and, based on industry data, the exposure factor to fires is only 20% due to the fire suppression system installed at the site. Fires occur in the area on average every four years. Which of the following is the ALE?

 

A.

$6,000

B.

$24,000

C.

$30,000

D.

$96,000

 

Correct Answer: A

 

 

QUESTION 164

A system worth $100,000 has an exposure factor of eight percent and an ARO of four. Which of the following figures is the system’s SLE?

 

A.

$2,000

B.

$8,000

C.

$12,000

D.

$32,000

 

Correct Answer: B

 

 

QUESTION 165

ABC Corporation has introduced token-based authentication to system administrators due to the risk of password compromise. The tokens have a set of HMAC counter-based codes and are valid until they are used. Which of the following types of authentication mechanisms does this statement describe?

 

A.

TOTP

B.

PAP

C.

CHAP

D.

HOTP

 

Correct Answer: D

 

 

QUESTION 166

An administrator has enabled salting for users’ passwords on a UNIX box. A penetration tester must attempt to retrieve password hashes. Which of the following files must the penetration tester use to eventually obtain passwords on the system? (Select TWO).

 

A.

/etc/passwd

B.

/etc/shadow

C.

/etc/security

D.

/etc/password

E.

/sbin/logon

F.

/bin/bash

 

Correct Answer: AB

 

 

QUESTION 167

An administrator believes that the web servers are being flooded with excessive traffic from time to time. The administrator suspects that these traffic floods correspond to when a competitor makes major announcements. Which of the following should the administrator do to prove this theory?

 

A.

Implement data analytics to try and correlate the occurrence times.

B.

Implement a honey pot to capture traffic during the next attack.

C.

Configure the servers for high availability to handle the additional bandwidth.

D.

Log all traffic coming from the competitor’s public IP addresses.

 

Correct Answer: A

 

 

QUESTION 168

A security administrator is assessing a new application. The application uses an API that is supposed to encrypt text strings that are stored in memory. How might the administrator test that the strings are indeed encrypted in memory?

 

A.

Use fuzzing techniques to examine application inputs

B.

Run nmap to attach to application memory

C.

Use a packet analyzer to inspect the strings

D.

Initiate a core dump of the application

E.

Use an HTTP interceptor to capture the text strings

 

Correct Answer: D

 

 

 

 

 

QUESTION 169

Company policy requires that all company laptops meet the following baseline requirements:

 

Software requirements:

 

clip_image002Antivirus

clip_image002[1]Anti-malware

clip_image002[2]Anti-spyware

clip_image002[3]Log monitoring

clip_image002[4]Full-disk encryption

clip_image002[5]Terminal services enabled for RDP

clip_image002[6]Administrative access for local users

 

Hardware restrictions:

 

clip_image002[7]Bluetooth disabled

clip_image002[8]FireWire disabled

clip_image002[9]WiFi adapter disabled

 

Ann, a web developer, reports performance issues with her laptop and is not able to access any network resources. After further
investigation, a bootkit was discovered and it was trying to access external websites. Which of the following hardening techniques should be applied to mitigate this specific issue from reoccurring? (Select TWO).

 

A.

Group policy to limit web access

B.

Restrict VPN access for all mobile users

C.

Remove full-disk encryption

D.

Remove administrative access to local users

E.

Restrict/disable TELNET access to network resources

F.

Perform vulnerability scanning on a daily basis

G.

Restrict/disable USB access

 

Correct Answer: DG

 

 

QUESTION 170

Company ABC is hiring customer service representatives from Company XYZ. The representatives reside at Company XYZ’s headquarters. Which of the following BEST prevents Company XYZ representatives from gaining access to unauthorized Company ABC systems?

 

A.

Require each Company XYZ employee to use an IPSec connection to the required systems

B.

Require Company XYZ employees to establish an encrypted VDI session to the required systems

C.

Require Company ABC employees to use two-factor authentication on the required systems

D.

Require a site-to-site VPN for intercompany communications

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized. Bookmark the permalink.