[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 231-240

Ensurepass

QUESTION 231

A company has noticed recently that its corporate information has ended up on an online forum. An investigation has identified that internal employees are sharing confidential corporate information on a daily basis. Which of the following are the MOST effective security controls that can be implemented to stop the above problem? (Select TWO).

 

A.

Implement a URL filter to block the online forum

B.

Implement NIDS on the desktop and DMZ networks

C.

Security awareness compliance training for all employees

D.

Implement DLP on the desktop, email gateway, and web proxies

E.

Review of security policies and procedures

 

Correct Ans
wer:
CD

 

 

QUESTION 232

In a situation where data is to be recovered from an attacker’s location, which of the following are the FIRST things to capture? (Select TWO).

 

A.

Removable media

B.

Passwords written on scrap paper

C.

Snapshots of data on the monitor

D.

Documents on the printer

E.

Volatile system memory

F.

System hard drive

 

Correct Answer: CE

 

 

QUESTION 233

The latest independent research shows that cyber attacks involving SCADA systems grew an average of 15% per year in each of the last four years, but that this year’s growth has slowed to around 7%. Over the same time period, the number of attacks against applications has decreased or stayed flat each year. At the start of the measure period, the incidence of PC boot loader or BIOS based attacks was negligible. Starting two years ago, the growth in the number of PC boot loader attacks has grown exponentially. Analysis of these trends would seem to suggest which of the following strategies should be employed?

 

A.

Spending on SCADA protections should stay steady; application control spending should increase substantially and spending on PC boot loader controls should increase substantially.

B.

Spending on SCADA security controls should stay steady; application control spending should decrease slightly and spending on PC boot loader protections should increase substantially.

C.

Spending all controls should increase by 15% to start; spending on application controls should be suspended, and PC boot loader protection research should increase by 100%.

D.

Spending on SCADA security controls should increase by 15%; application control spending should increase slightly, and spending on PC boot loader protections should remain steady.

 

Correct Answer: B

 

 

QUESTION 234

An insurance company has an online quoting system for insurance premiums. It allows potential customers to fill in certain details about their car and obtain a quote. During an investigation, the following patterns were detected:

 

clip_image002Pattern 1 – Analysis of the logs identifies that insurance premium forms are being filled in but only single fields are incrementally being updated.

clip_image002[1]Pattern 2 – For every quote completed, a new customer number is created; due to legacy systems, customer numbers are running out.

 

Which of the following is the attack type the system is susceptible to, and what is the BEST way to defend against it? (Select TWO).

 

A.

Apply a hidden field that triggers a SIEM alert

B.

Cross site scripting attack

C.

Resource exhaustion attack

D.

Input a blacklist of all known BOT malware IPs into the firewall

E.

SQL injection

F.

Implement an inline WAF and integrate into SIEM

G.

Distributed denial of service

H.

Implement firewall rules to block the attacking IP addresses

 

Correct Answer: CF

 

 

 

 

 

QUESTION 235

Wireless users are reporting issues with the company’s video conferencing and VoIP systems. The security administrator notices internal DoS attacks from infected PCs on the network causing the VoIP system to drop calls. The security administrator also notices that the SIP servers are unavailable during these attacks. Which of the following security controls will MOST likely mitigate the VoIP DoS attacks on the network? (Select TWO).

 

A.

Install a HIPS on the SIP servers

B.

Configure 802.1X on the network

C.

Update the corporate firewall to block attacking addresses

D.

Configure 802.11e on the network

E.

Configure 802.1q on the network

 

Correct Answer: AD

 

 

QUESTION 236

An IT manager is working with a project manager from another subsidiary of the same multinational organization. The project manager is responsible for a new software development effort that is being outsourced overseas, while customer acceptance testing will be performed in house. Which of the following capabilities is MOST likely to cause issues with network availability?

 

A.

Source code vulnerability scanning

B.

Time-based access control lists

C.

ISP to ISP network jitter

D.

File-size validation

E.

End to end network encryption

 

Correct Answer: B

 

 

QUESTION 237

An organization has several production critical SCADA supervisory systems that cannot follow the normal 30-day patching policy. Which of the following BEST maximizes the protection of these systems from malicious software?

 

A.

Configure a firewall with deep packet inspection that restricts traffic to the systems

B.

Configure a separate zone for the systems and restrict access to known ports

C.

Configure the systems to ensure only necessary applications are able to run

D.

Configure the host firewall to ensure only the necessary applications have listening ports

 

Correct Answer: C

 

 

QUESTION 238

An organization recently upgraded its wireless infrastructure to support 802.1x and requires all clients to use this method. After the upgrade, several critical wireless clients fail to connect because they are only pre-shared key compliant. For the foreseeable future, none of the affected clients have an upgrade path to put them into compliance with the 802.1x requirement. Which of the following provides the MOST secure method of integrating the non-compliant clients into the network?

 

A.

Create a separate SSID and require the use of dynamic encryption keys.

B.

Create a separate SSID
with a pre-shared key to support the legacy clients and rotate the key at random intervals.

C.

Create a separate SSID and pre-shared WPA2 key on a new network segment and only allow required communication paths.

D.

Create a separate SSID and require the legacy clients to connect to the wireless network using certificate-based 802.1x.

 

Correct Answer: B

 

 

QUESTION 239

An international shipping company discovered that deliveries left idle are being tampered with. The company wants to reduce the idle time associated with international deliveries by ensuring that personnel are automatically notified when an inbound delivery arrives at the transit dock. Which of the following should be implemented to help the company increase the security posture of its operations?

 

A.

Back office database

B.

Asset tracking

C.

Geo-fencing

D.

Barcode scanner

 

Correct Answer: C

 

 

QUESTION 240

A security administrator must implement a SCADA style network overlay to ensure secure remote management of all network management and infrastructure devices. Which of the following BEST describes the rationale behind this architecture?

 

A.

A physically isolated network that allows for secure metric collection.

B.

A physically isolated network with inband management that uses two factor authentication.

C.

A logically isolated network with inband management that uses secure two factor authentication.

D.

An isolated network that provides secure out-of-band remote management.

 

Correct Answer: D

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in CAS-002 Exam Questions (December) and tagged , , , , , , . Bookmark the permalink.