[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 261-270

Ensurepass

QUESTION 261

Within the company, there is executive management pressure to start advertising to a new target market. Due to the perceived schedule and budget inefficiencies of engaging a technology business unit to commission a new micro-site, the marketing department is engaging third parties to develop the site in order to meet time-to-market demands. From a security perspective, which of the following options BEST balances the needs between marketing and risk management?

 

A.

The third party should be contractually obliged to perform adequate security activities, and evidence of those activities should be confirmed by the company prior to launch.

B.

Outsourcing is a valid option to increase time-to-market. If a security incident occurs, it is not of great concern as the reputational damage will be the third party’s responsibility.

C.

The company should never outsource any part of the business that could cause a security or privacy incident. It could lead to legal and compliance issues.

D.

If the third party has an acceptable record to date on security compliance and is provably faster and cheaper, then it makes sense to outsource in this specific situation.

 

Correct Answer: A

 

 

QUESTION 262

Which of the following should be used to identify overflow vulnerabilities?

 

A.

Fuzzing

B.

Input validation

C.

Privilege escalation

D.

Secure coding standards

 

Correct Answer: A

 

 

QUESTION 263

A new company requirement mandates the implementation of multi-factor authentication to access network resources. The security administrator was asked to research and implement the most cost-effective solution that would allow for the authentication of both hardware and users. The company wants to leverage the PKI infrastructure which is already well established. Which of the following solutions should the security administrator implement?

 

A.

Issue individual private/public key pairs to each user, install the private key on the central authentication system, and protect the private key with the user’s credentials. Require each user to install the public key on their computer.

B.

Deploy USB fingerprint scanners on all desktops, and enable the fingerprint scanner on all laptops. Require all network users to register their fingerprint using the reader and store the information in the central authentication system.

C.

Issue each user one hardware token. Configure the token serial number in the user properties of the central authentication system for each user and require token authentication with PIN for network logon.

D.

Issue individual private/public key pairs to each user, install the public key on the central authentication system, and require each user to install the private key on their computer and protect it with a password.

 

Correct Answer: D

 

 

< b>QUESTION 264

The Linux server at Company A hosts a graphical application widely used by the company designers. One designer regularly connects to the server from a Mac laptop in the designer’s office down the hall. When the security engineer learns of this it is discovered the connection is not secured and the password can easily be obtained via network sniffing. Which of the following would the security engineer MOST likely implement to secure this connection?

 

Linux Server: 192.168.10.10/24

 

Mac Laptop: 192.168.10.200/24

 

A.

From the server, establish an SSH tunnel to the Mac and VPN to 192.168.10.200.

B.

From the Mac, establish a remote desktop connection to 192.168.10.10 using Network Layer Authentication and the CredSSP security provider.

C.

From the Mac, establish a VPN to the Linux server and connect the VNC to 127.0.0.1.

D.

From the Mac, establish a SSH tunnel to the Linux server and connect the VNC to 127.0.0.1.

 

Correct Answer: D

 

 

QUESTION 265

A corporation has expanded for the first time by integrating several newly acquired businesses. Which of the following are the FIRST tasks that the security team should undertake? (Select TWO).

 

A.

Remove acquired companies Internet access.

B.

Federate identity management systems.

C.

Install firewalls between the businesses.

D.

Re-image all end user computers to a standard image.

E.

Develop interconnection policy.

F.

Conduct a risk analysis of each acquired company’s networks.

 

Correct Answer: EF

 

 

QUESTION 266

A Physical Security Manager is ready to replace all 50 analog surveillance cameras with IP cameras with built-in web management. The Security Manager has several security guard desks on different networks that must be able to view the cameras without unauthorized people viewing the video as well. The selected IP camera vendor does not have the ability to authenticate users at the camera level. Which of the following should the Security Manager suggest to BEST secure this environment?

 

A.

Create an IP camera network and deploy NIPS to prevent unauthorized access.

B.

Create an IP camera network and only allow SSL access to the cameras.

C.

Create an IP camera network and deploy a proxy to authenticate u
sers prior to accessing the cameras.

D.

Create an IP camera network and restrict access to cameras from a single management host.

 

Correct Answer: C

 

 

QUESTION 267

Which of the following is the BEST place to contractually document security priorities, responsibilities, guarantees, and warranties when dealing with outsourcing providers?

 

A.

NDA

B.

OLA

C.

MOU

D.

SLA

 

Correct Answer: D

 

 

 

 

 

 

QUESTION 268

An administrator is reviewing logs and sees the following entry:

 

Message: Access denied with code 403 (phase 2). Pattern match “bunionb.{1,100}?bselectb” at ARGS:$id. [data “union all select”] [severity “CRITICAL”] [tag “WEB_ATTACK”] [tag “WASCTC/WASC-19”] [tag “OWASP_TOP_10/A1”] [tag “OWASP_AppSensor/CIE1”]

 

Action: Intercepted (phase 2) Apache-Handler: php5-script

 

Which of the following attacks was being attempted?

 

A.

Session hijacking

B.

Cross-site script

C.

SQL injection

D.

Buffer overflow

 

Correct Answer: C

 

 

QUESTION 269

The VoIP administrator starts receiving reports that users are having problems placing phone calls. The VoIP administrator cannot determine the issue, and asks the security administrator for help. The security administrator reviews the switch interfaces and does not see an excessive amount of network traffic on the voice network. Using a protocol analyzer, the security administrator does see an excessive number of SIP INVITE packets destined for the SIP proxy. Based on the information given, which of the following types of attacks is underway and how can it be remediated?

 

A.

Man in the middle attack; install an IPS in front of SIP proxy.

B.

Man in the middle attack; use 802.1x to secure voice VLAN.

C.

Denial of Service; switch to more secure H.323 protocol.

D.

Denial of Service; use rate limiting to limit traffic.

 

Correct Answer: D

 

 

QUESTION 270

A new web application system was purchased from a vendor and configured by the internal development team. Before the web application system was moved into production, a vulnerability assessment was conducted. A review of the vulnerability assessment report indicated that the testing team discovered a minor security issue with the configuration of the web application. The security issue should be reported to:

 

A.

CISO immediately in an exception report.

B.

Users of the new web application system.

C.

The vendor who supplied the web application system.

D.

Team lead in a weekly report.

 

Correct Answer: D

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in CAS-002 Exam Questions (December) and tagged , , , , , , . Bookmark the permalink.