[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 251-260

Ensurepass

QUESTION 251

In order for a company to boost profits by implementing cost savings on non-core business activities, the IT manager has sought approval for the corporate email system to be hosted in the cloud. The compliance officer has been tasked with ensuring that data lifecycle issues are taken into account. Which of the following BEST covers the data lifecycle end- to-end?

 

A.

Creation and secure destruction of mail accounts, emails, and calendar items

B.

Information classification, vendor selection, and the RFP process

C.

Data provisioning, processing, in transit, at rest, and de-provisioning

D.

Securing virtual environments, appliances, and equipment that handle email

 

Correct Answer: C

 

 

 

QUESTION 252

An IT administrator wants to restrict DNS zone transfers between two geographically dispersed, external company DNS name servers, and has decided to use TSIG. Which of the following are critical when using TSIG? (Select TWO).

 

A.

Periodic key changes once the initial keys are established between the DNS name servers.

B.

Secure exchange of the key values between the two DNS name servers.

C.

A secure NTP source used by both DNS name servers to avoid message rejection.

D.

DNS configuration files on both DNS name servers must be identically encrypted.

E.

AES encryption with a SHA1 hash must be used to encrypt the configuration files on both DNS name servers.

 

Correct Answer: BC

 

 

QUESTION 253

DRAG DROP

Drag and Drop the following information types on to the appropriate CIA category.

 

clip_image001

 

Correct Answer:

clip_image002

 

 

QUESTION 254

When attending the latest security conference, an information security administrator noticed only a few people carrying a laptop around. Most other attendees only carried their smartphones. Which of the following would impact the security of conference’s resources?

 

A.

Wireless network security may need to be increased to decrease access of mobile devices.

B.

Physical security may need to be increased to deter or prevent theft of mobile devices.

C.

Network security may need to be increased by reducing the number of available physical network jacks.

D.

Wireless network security may need to be decreased to allow for increased access of mobile devices.

 

Correct Answer: C

 

 

QUESTION 255

After connecting to a secure payment server at https://pay.xyz.com, an auditor notices that the SSL certificate was issued to *.xyz.com. The auditor also notices that many of the internal development servers use the same certificate. After installing the certificate on dev1.xyz.com, one of the developers reports misplacing the USB thumb-drive where the SSL certificate was stored. Which of the following should the auditor recommend FIRST?

 

A.

Generate a new public key on both servers.

B.

Replace the SSL certificate on dev1.xyz.com.

C.

Generate a new private key password for both servers.

D.

Replace the SSL certificate on pay.xyz.com.

 

Correct Answer: D

 

QUESTION 256

A company receives an e-discovery request for the Chief Information Officer’s (CIO’s) email data. The storage administrator reports that the data retention policy relevant to their industry only requires one year of email data. However the storage administrator also reports that there are three years of email data on the server and five years of email data on backup tapes. How many years of data MUST the company legally provide?

 

A.

1

B.

2

C.

3

D.

5

 

Correct Answer: D

 

 

QUESTION 257

An organization has had six security incidents over the past year against their main web application. Each time the organization was able to determine the cause of the incident and restore operations within a few hours to a few days. Which of the following provides the MOST comprehensive method for reducing the time to recover?

 

A.

Create security metrics that provide information on response times and requirements to determine the best place to focus time and money.

B.

Conduct a loss analysis to determine which systems to focus time and money towards increasing security.

C.

Implement a knowledge management process accessible to the help desk and finance departments to estimate cost and prioritize remediation.

D.

Develop an incident response team, require training for incident remediation, and provide incident reporting and tracking metrics.

 

Correct Answer: D

 

 

QUESTION 258

Company A has a remote work force that often includes independent contractors and out of state full time employees. Company A’s security engineer has been asked to implement a solution allowing these users to collaborate on projects with the following goals: Which of the following solutions should the security engineer recommend to meet the MOST goals?

 

A.

Create an SSL reverse proxy to a collaboration workspace. Use remote installation service to maintain application version. Have users use full desktop encryption. Schedule server downtime from 12:00 to 1:00 PM.

B.

Install an SSL VPN to Company A’s datacenter, have users connect to a standard virtual workstation image, set workstation time of day restrictions.

C.

Create an extranet web portal using third party web based office applications. Ensure that Company A maintains the administrative access.

D.

Schedule server downtime from 12:00 to 1:00 PM, implement a Terminal Server Gateway, use remote installation services to standardize application on user’s laptops.

 

Correct Answer: B

 

 

 

 

QUESTION 259

A security administrator wants to verify and improve the security of a business process which is tied to proven company workflow. The security administrator was able to improve security by applying controls that were defined by the newly released company security standard. Such controls included code improvement, transport encryption, and interface restrictions. Which of the following can the security administrator do to further increase security after having exhausted all the technical controls dictated by the company’s security standard?

 

A.

Modify the company standard to account for higher security and meet with upper management for approval to implement the new standard.

B.

Conduct a gap analysis and recommend appropriate non-technical mitigating controls, and incorporate the new controls into the standard.

C.

Conduct a risk analysis on all current controls, and recommend appropriate mechanisms to increase overall security.

D.

Modify the company policy to account for higher security, adapt the standard accordingly, and implement new technical controls.

 

Correct Answer: B

 

 

QUESTION 260

A corporation has Research and Development (R&D) and IT support teams, each requiring separate networks with independent control of their security boundaries to support department objectives. The corporation’s Information Security Officer (ISO) is responsible for providing firewall services to both departments, but does not want to increase the hardware footprint within the datacenter. Which of the following should the ISO consider to provide the independent functionality required by each department’s IT teams?

 

A.

Put both departments behind the firewall and assign administrative control for each department to the corporate firewall.

B.

Provide each department with a virtual firewall and assign administrative control to the physical firewall.

C.

Put both departments behind the firewall and incorporate restrictive controls on each department’s network.

D.

Provide each department with a virtual firewall and assign appropriate levels of management for the virtual device.

 

Correct Answer: D

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized. Bookmark the permalink.