QUESTION 181
A system administrator has just installed a new Linux distribution. The distribution is configured to be “secure out of the box”. The system administrator cannot make updates to certain system files and services. Each time changes are attempted, they are denied and a system error is generated. Which of the following troubleshooting steps should the security administrator suggest?
A. |
Review settings in the SELinux configuration files |
B. |
Reset root permissions on systemd files |
C. |
Perform all administrative actions while logged in as root |
D. |
Disable any firewall software before making changes |
Correct Answer: A
QUESTION 182
It has come to the IT administrator’s attention that the “post your comment” field on the company blog page has been exploited, resulting in cross-site scripting attacks against customers reading the blog. Which of the following would be the MOST effective at preventing the “post your comment” field from being exploited?
A. |
Update the blog page to HTTPS |
B. |
Filter metacharacters |
C. |
Install HIDS on the server |
D. |
Patch the web application |
E. |
Perform client side input validation |
Correct Answer: B
QUESTION 183
CORRECT TEXT
Company A has noticed abnormal behavior targeting their SQL server on the network from a rogue IP address. The company uses the following internal IP address ranges:
192.10.1.0/24 for the corporate site and 192.10.2.0/24 for the remote site. The Telco router interface uses the 192.10.5.0/30 IP range.
Instructions:
Click on the simulation button to refer to the Network Diagram for Company A.
Click on Router 1, Router 2, and the Firewall to evaluate and configure each device.
Task 1: Display and examine the logs and status of Router 1, Router 2, and Firewall interfaces.
Task 2: Reconfigure the appropriate devices to prevent the attacks from continuing to target the SQL server and other servers on the corporate network.
Correct Answer:
We need to select the exactly the same to configure and then click on Save as shown below image.
QUESTION 184
The following has been discovered in an internally developed application:
Error – Memory allocated but not freed:
char *myBuffer = malloc(BUFFER_SIZE);
if (myBuffer != NULL) {
*myBuffer = STRING_WELCOME_MESSAGE;
printf(“Welcome to: %sn”, myBuffer);
}
exit(0);
Which of the following security assessment methods are likely to reveal this security weakness? (Select TWO).
A. |
Static code analysis |
B. |
Memory dumping |
C. |
Manual code review |
D. |
Application sandboxing |
E. |
Penetration testing |
F. |
Black box testing |
Correct Answer: AC
QUESTION 185
A user is suspected of engaging in potentially illegal activities. Law enforcement has requested that the user continue to operate on the network as normal. However, they would like to have a copy of any communications from the user involving certain key terms. Additionally, the law enforcement agency has requested that the user’s ongoing communication be retained in the user’s account for future investigations. Which of the following will BEST meet the goals of law enforcement?
A. |
Begin a chain-of-custody on for the user’s communication. Next, |
B. |
Perform an e-discover using the applicable search terms. Next, back up the user’s email for a future investigation. |
C. |
Place a legal hold on the user’s email account. Next, perform e-discovery searches to collect applicable emails. |
D. |
Perform a back up of the user’s email account. Next, export the applicable emails that match the search terms. |
Correct Answer: C
QUESTION 186
A facilities manager has observed varying electric use on the company’s metered service lines. The facility management rarely interacts with the IT department unless new equipment is being delivered. However, the facility manager thinks that there is a correlation between spikes in electric use and IT department activity. Which of the following business processes and/or practices would provide better management of organizational resources with the IT department’s needs? (Select TWO).
A. |
Deploying a radio frequency identification tagging asset management system |
B. |
Designing a business resource monitoring system |
C. |
Hiring a property custodian |
D. |
Purchasing software asset management software |
E. |
Facility management participation on a change control board |
F. |
Rewriting the change board charter |
G. |
Implementation of change management best practices |
Correct Answer: EG
QUESTION 187
A large company is preparing to merge with a smaller company. The smaller company has been very profitable, but the smaller company’s main applications were created in-house. Which of the following actions should the large company’s security administrator take in preparation for the merger?
A. |
A review of the mitigations implemented from the most recent audit findings of the smaller company should be performed. |
B. |
An ROI calculation should be performed to determine which company’s application should be used. |
C. |
A security assessment should be performed to establish the risks of integration or co- existence. |
D. |
A regression test should be performed on the in-house software to determine security risks associated with the software. |
A. |
NIPS |
B. |
HSM |
C. |
HIPS |
D. |
NIDS |
E. |
WAF |
Correct Answer: CE
QUESTION 189
A company with 2000 workstations is considering purchasing a HIPS to minimize the impact of a system compromise from malware. Currently, the company projects a total cost of $50,000 for the next three years responding to and eradicating workstation malware. The Information Security Officer (ISO) has received three quotes from different companies that provide HIPS. Which solution should the company select if the contract is only valid for three years?
A. |
First quote |
B. |
Second quote |
C. |
Third quote |
D. |
Accept the risk |
Correct Answer: B
QUESTION 190
An IT manager is concerned about the cost of implementing a web filtering solution in an effort to mitigate the risks associated with malware and resulting data leakage. Given that the ARO is twice per year, the ALE resulting from a data leak is $25,000 and the ALE after implementing the web filter is $15,000. The web filtering solution will cost the organization $10,000 per year. Which of the following values is the single loss expectancy of a data leakage event after implementing the web filtering solution?
A. |
$0 |
B. |
$7,500 |
C. |
$10,000 |
D. |
$12,500 |
E. |
$15,000 |
Correct Answer: B
Free VCE & PDF File for CompTIA CAS-002 Real Exam
Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF