[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 181-190

Ensurepass

QUESTION 181

A system administrator has just installed a new Linux distribution. The distribution is configured to be “secure out of the box”. The system administrator cannot make updates to certain system files and services. Each time changes are attempted, they are denied and a system error is generated. Which of the following troubleshooting steps should the security administrator suggest?

 

A.

Review settings in the SELinux configuration files

B.

Reset root permissions on systemd files

C.

Perform all administrative actions while logged in as root

D.

Disable any firewall software before making changes

 

Correct Answer: A

 

 

QUESTION 182

It has come to the IT administrator’s attention that the “post your comment” field on the company blog page has been exploited, resulting in cross-site scripting attacks against customers reading the blog. Which of the following would be the MOST effective at preventing the “post your comment” field from being exploited?

 

A.

Update the blog page to HTTPS

B.

Filter metacharacters

C.

Install HIDS on the server

D.

Patch the web application

E.

Perform client side input validation

 

Correct Answer: B

 

 

QUESTION 183

CORRECT TEXT

Company A has noticed abnormal behavior targeting their SQL server on the network from a rogue IP address. The company uses the following internal IP address ranges:

192.10.1.0/24 for the corporate site and 192.10.2.0/24 for the remote site. The Telco router interface uses the 192.10.5.0/30 IP range.

 

Instructions:

Click on the simulation button to refer to the Network Diagram for Company A.

 

Click on Router 1, Router 2, and the Firewall to evaluate and configure each device.

 

Task 1: Display and examine the logs and status of Router 1, Router 2, and Firewall interfaces.

 

Task 2: Reconfigure the appropriate devices to prevent the attacks from continuing to target the SQL server and other servers on the corporate network.

 

clip_image002

clip_image003

clip_image004

clip_image006

 

Correct Answer:

We need to select the exactly the same to configure and then click on Save as shown below image.

 

clip_image008

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 184

The following has been discovered in an internally developed application:

 

Error – Memory allocated but not freed:

 

char *myBuffer = malloc(BUFFER_SIZE);

 

if (myBuffer != NULL) {

 

*myBuffer = STRING_WELCOME_MESSAGE;

 

printf(“Welcome to: %sn”, myBuffer);

 

}

 

exit(0);

 

Which of the following security assessment methods are likely to reveal this security weakness? (Select TWO).

 

A.

Static code analysis

B.

Memory dumping

C.

Manual code review

D.

Application sandboxing

E.

Penetration testing

F.

Black box testing

 

Correct Answer: AC

 

 

QUESTION 185

A user is suspected of engaging in potentially illegal activities. Law enforcement has requested that the user continue to operate on the network as normal. However, they would like to have a copy of any communications from the user involving certain key terms. Additionally, the law enforcement agency has requested that the user’s ongoing communication be retained in the user’s account for future investigations. Which of the following will BEST meet the goals of law enforcement?

 

A.

Begin a chain-of-custody on for the user’s communication. Next,
place a legal hold on the user’s email account.

B.

Perform an e-discover using the applicable search terms. Next, back up the user’s email for a future investigation.

C.

Place a legal hold on the user’s email account. Next, perform e-discovery searches to collect applicable emails.

D.

Perform a back up of the user’s email account. Next, export the applicable emails that match the search terms.

 

Correct Answer: C

 

 

 

 

 

 

QUESTION 186

A facilities manager has observed varying electric use on the company’s metered service lines. The facility management rarely interacts with the IT department unless new equipment is being delivered. However, the facility manager thinks that there is a correlation between spikes in electric use and IT department activity. Which of the following business processes and/or practices would provide better management of organizational resources with the IT department’s needs? (Select TWO).

 

A.

Deploying a radio frequency identification tagging asset management system

B.

Designing a business resource monitoring system

C.

Hiring a property custodian

D.

Purchasing software asset management software

E.

Facility management participation on a change control board

F.

Rewriting the change board charter

G.

Implementation of change management best practices

 

Correct Answer: EG

 

 

QUESTION 187

A large company is preparing to merge with a smaller company. The smaller company has been very profitable, but the smaller company’s main applications were created in-house. Which of the following actions should the large company’s security administrator take in preparation for the merger?

 

 

Correct Answer: C

 

 

QUESTION 188

A software developer and IT administrator are focused on implementing security in the organization to protect OSI layer 7. Which of the following security technologies would BEST meet their requirements? (Select TWO).

 

A.

A review of the mitigations implemented from the most recent audit findings of the smaller company should be performed.

B.

An ROI calculation should be performed to determine which company’s application should be used.

C.

A security assessment should be performed to establish the risks of integration or co- existence.

D.

A regression test should be performed on the in-house software to determine security risks associated with the software.

A.

NIPS

B.

HSM

C.

HIPS

D.

NIDS

E.

WAF

 

Correct Answer: CE

 

 

 

 

 

QUESTION 189

A company with 2000 workstations is considering purchasing a HIPS to minimize the impact of a system compromise from malware. Currently, the company projects a total cost of $50,000 for the next three years responding to and eradicating workstation malware. The Information Security Officer (ISO) has received three quotes from different companies that provide HIPS. Which solution should the company select if the contract is only valid for three years?

 

A.

First quote

B.

Second quote

C.

Third quote

D.

Accept the risk

 

Correct Answer: B

 

 

QUESTION 190

An IT manager is concerned about the cost of implementing a web filtering solution in an effort to mitigate the risks associated with malware and resulting data leakage. Given that the ARO is twice per year, the ALE resulting from a data leak is $25,000 and the ALE after implementing the web filter is $15,000. The web filtering solution will cost the organization $10,000 per year. Which of the following values is the single loss expectancy of a data leakage event after implementing the web filtering solution?

 

A.

$0

B.

$7,500

C.

$10,000

D.

$12,500

E.

$15,000

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in CAS-002 Exam Questions (December) and tagged , , , , , , . Bookmark the permalink.