[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 171-180

Ensurepass

QUESTION 171

In an effort to minimize costs, the management of a small candy company wishes to explore a cloud service option for the development of its online applications. The company does not wish to invest heavily in IT infrastructure. Which of the following solutions should be recommended?

 

A.

A public IaaS

B.

A public PaaS

C.

A public SaaS

D.

A private SaaS

E.

A private IaaS

F.

A private PaaS

 

Correct Answer: B

 

 

QUESTION 172

A port in a fibre channel switch failed, causing a costly downtime on the company’s primary website. Which of the following is the MOST likely cause of the downtime?

 

A.

The web server iSCSI initiator was down.

B.

The web server was not multipathed.

C.

The SAN snapshots were not up-to-date.

D.

The SAN replication to the backup site failed.

 

Correct Answer: B

 

 

QUESTION 173

An IT manager is working with a project manager to implement a new ERP system capable of transacting data between the new ERP system and the legacy system. As part of this process, both parties must agree to the controls utilized to secure data connections between the two enterprise systems. This is commonly documented in which of the following formal documents?

 

A.

Memorandum of Understanding

B.

Information System Security Agreement

C.

Interconnection Security Agreement

D.

Interoperability Agreement

E.

Operating Level Agreement

 

Correct Answer: C

 

 

QUESTION 174

A security architect has been engaged during the implementation stage of the SDLC to review a new HR software installation for security gaps. With the project under a tight schedule to meet market commitments on project delivery, which of the following security activities should be prioritized by the security architect? (Select TWO).

 

A.

Perform penetration testing over the HR solution to identify technical vulnerabilities

B.

Perform a security risk assessment with recommended solutions to close off high-rated risks

C.

Secure code review of the HR solution to identify security gaps that could be exploited

D.

Perform access control testing to ensure that privil
eges have been configured correctly

E.

Determine if the information security standards have been complied with by the project

Correct Answer: BE

 

 

QUESTION 175

Joe, a penetration tester, is tasked with testing the security robustness of the protocol between a mobile web application and a RESTful application server. Which of the following security tools would be required to assess the security between the mobile web application and the RESTful application server? (Select TWO).

 

A.

Jailbroken mobile device

B.

Reconnaissance tools

C.

Network enumerator

D.

HTTP interceptor

E.

Vulnerability scanner

F.

Password cracker

 

Correct Answer: DE

 

 

QUESTION 176

A firm’s Chief Executive Officer (CEO) is concerned that IT staff lacks the knowledge to identify complex vulnerabilities that may exist in a payment system being internally developed. The payment system being developed will be sold to a number of organizations and is in direct competition with another leading product. The CEO highlighted that code base confidentiality is of critical importance to allow the company to exceed the competition in terms of the product’s reliability, stability, and performance. Which of the following would provide the MOST thorough testing and satisfy the CEO’s requirements?

 

A.

Sign a MOU with a marketing firm to preserve the company reputation and use in-house resources for random testing.

B.

Sign a BPA with a small software consulting firm and use the firm to perform Black box testing and address all findings.

C.

Sign a NDA with a large security consulting firm and use the firm to perform Grey box testing and address all findings.

D.

Use the most qualified and senior developers on the project to perform a variety of White box testing and code reviews.

 

Correct Answer: C

 

 

QUESTION 177

CORRECT TEXT

Compliance with company policy requires a quarterly review of firewall rules. A new administrator is asked to conduct this review on the internal firewall sitting between several Internal networks. The intent of this firewall is to make traffic more restrictive. Given the following information answer the questions below:

 

User Subnet: 192.168.1.0/24 Server Subnet: 192.168.2.0/24 Finance Subnet:192.168.3.0/24

 

Instructions:

To perform the necessary tasks, please modify the DST port, Protocol, Action, and/or Rule Order columns. Firewall ACLs are read from the top down

 

Task 1: An administrator added a rule to allow their machine t
erminal server access to the server subnet. This rule is not working. Identify the rule and correct this issue.

 

Task 2: All web servers have been changed to communicate solely over SSL. Modify the appropriate rule to allow communications.

 

Task 3: An administrator added a rule to block access to the SQL server from anywhere on the network. This rule is not working. Identify and correct this issue.

 

Task 4: Other than allowing all hosts to do network time and SSL, modify a rule to ensure that no other traffic is allowed.

 

clip_image002

clip_image004

 

Correct Answer:

Firewall rules should be re-arranged to look like this:

clip_image006

 

 

QUESTION 178

A medical device manufacturer has decided to work with another international organization to develop the software for a new robotic surgical platform to be introduced into hospitals within the next 12 months. In order to ensure a competitor does not become aware, management at the medical device manufacturer has decided to keep it secret until formal contracts are signed. Which of the following documents is MOST likely to contain a description of the initial terms and arrangement and is not legally enforceable?

 

A.

OLA

B.

BPA

C.

SLA

D.

SOA

E.

MOU

 

Correct Answer: E

 

 

QUESTION 179

A security administrator has noticed that an increased number of employees’ workstations are becoming infected with malware. The company deploys an enterpris
e antivirus system as well as a web content filter, which blocks access to malicious web sites where malware files can be downloaded. Additionally, the company implements technical measures to disable external storage. Which of the following is a technical control that the security administrator should implement next to reduce malware infection?

 

A.

Implement an Acceptable Use Policy which addresses malware downloads.

B.

Deploy a network access control system with a persistent agent.

C.

Enforce mandatory security awareness training for all employees and contractors.

D.

Block cloud-based storage software on the company network.

 

Correct Answer: D

 

 

QUESTION 180

Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?

 

A.

Deduplication

B.

Data snapshots

C.

LUN masking

D.

Storage multipaths

 

Correct Answer: C

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized. Bookmark the permalink.