[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 321-330

Ensurepass

QUESTION 321

Several business units have requested the ability to use collaborative web-based meeting places with third party vendors. Generally these require user registration, installation of client-based ActiveX or Java applets, and also the ability for the user to share their desktop in read-only or read-write mode. In order to ensure that information security is not compromised, which of the following controls is BEST suited to this situation?

 

A.

Disallow the use of web-based meetings as this could lead to vulnerable client-side components being installed, or a malicious third party gaining read-write control over an internal workstation.

B.

Hire an outside consultant firm to perform both a quantitative and a qualitative risk- based assessment. Based on the outcomes, if any risks are identified then do not allow web-based meetings. If no risks are identified then go forward and allow for these meetings to occur.

C.

Allow the use of web-based meetings, but put controls in place to ensure that the use of these meetings is logged and tracked.

D.

Evaluate several meeting providers. Ensure that client-side components do not introduce undue security risks. Ensure that the read-write desktop mode can either be prevented or strongly audited.

 

Correct Answer: D

 

 

QUESTION 322

A business wants to start using social media to promote the corporation and to ensure that customers have a good experience with their products. Which of the following security items should the company have in place before implementation? (Select TWO).

 

A.

The company must dedicate specific staff to act as social media representatives of the company.

B.

All staff needs to be instructed in the proper use of social media in the work environment.

C.

Senior staff blogs should be ghost written by marketing professionals.

D.

The finance department must provide a cost benefit analysis for social media.

E.

The security policy needs to be reviewed to ensure that social media policy is properly implemented.

F.

The company should ensure that the company has sufficient bandwidth to allow for social media traffic.

 

Correct Answer: AE

 

 

QUESTION 323

In an effort to reduce internal email administration costs, a company is determining whether to outsource its email to a managed service provider that provides email, spam, and malware protection. The security manager is asked to provide input regarding any security implications of this change. Which of the following BEST addresses risks associated with disclosure of intellectual property?

 

A.

Require the managed service provider to implement additional data separation.

B.

Require encrypted communications when accessing email.

C.

Enable data loss protection to minimize emailing PII and confidential data.

D.

Establish an acceptable use policy and incident response policy.

 

Correct Answer: C

 

 

 

QUESTION 324

A large organization has gone through several mergers, acquisitions, and de-mergers over the past decade. As a result, the internal networks have been integrated but have complex dependencies and interactions between systems. Better integration is needed in order to simplify the underlying complexity. Which of the following is the MOST suitable integration platform to provide event-driven and standards-based secure software architecture?

 

A.

Service oriented architecture (SOA)

B.

Federated identities

C.

Object request broker (ORB)

D.

Enterprise service bus (ESB)

 

Correct Answer: D

 

 

QUESTION 325

A University uses a card transaction system that allows students to purchase goods using their student ID. Students can put money on their ID at terminals throughout the campus. The security administrator was notified that computer science students have been using the network to illegally put money on their cards. The administrator would like to attempt to reproduce what the students are doing. Which of the following is the BEST course of action?

 

A.

Notify the transaction system vendor of the security vulnerability that was discovered.

B.

Use a protocol analyzer to reverse engineer the transaction system’s protocol.

C.

Contact the computer science students and threaten disciplinary action if they continue their actions.

D.

Install a NIDS in front of all the transaction system terminals.

 

Correct Answer: B

 

 

QUESTION 326

An administrator has a system hardening policy to only allow network access to certain services, to always use similar hardware, and to protect from unauthorized application configuration changes. Which of the following technologies would help meet this policy requirement? (Select TWO).

 

A.

Spam filter

B.

Solid state drives

C.

Management interface

D.

Virtualization

E.

Host firewall

 

Correct Answer: DE

 

 

 

 

 

 

 

 

 

 

QUESTION 327

Company XYZ has transferred all of the corporate servers, including web servers, to a cloud hosting provider to reduce costs. All of the servers are running unpatched, outdated versions of Apache. Furthermore, the corporate financial data is also hosted by the cloud services provider, but it is encrypted when not in use. Only the DNS server is configured to audit user and administrator actions and logging is disabled on the other virtual machines. Given this scenario, which of the following is the MOST significant risk to the system?

 

A.

All servers are unpatched and running old versions.

B.

Financial data is processed without being encrypted.

C.

Logging is disabled on critical servers.

D.

Server services have been virtualized and outsourced.

 

Correct Answer: A

 

 

QUESTION 328

A company runs large computing jobs only during the overnight hours. To minimize the amount of capital investment in equipment, the company relies on the elastic computing services of a major cloud computing vendor. Because the virtual resources are created and destroyed on the fly across a large pool of shared resources, the company never knows which specific hardware platforms will be used from night to night. Which of the following presents the MOST risk to confidentiality in this scenario?

 

A.

Loss of physical control of the servers

B.

Distribution of the job to multiple data centers

C.

Network transmission of cryptographic keys

D.

Data scraped from the hardware platforms

 

Correct Answer: D

 

 

QUESTION 329

At 10:35 a.m. a malicious user was able to obtain a valid authentication token which allowed read/write access to the backend database of a financial company. At 10:45 a.m. the security administrator received multiple alerts from the company’s statistical anomaly- based IDS about a company database administrator performing unusual transactions. At 10:55 a.m. the security administrator resets the database administrator’s password. At 11:00 a.m. the security administrator is still receiving alerts from the IDS about unusual transactions from the same user. Which of the following is MOST likely the cause of the alerts?

 

A.

The IDS logs are compromised.

B.

The new password was compromised.

C.

An input validation error has occurred.

D.

A race condition has occurred.

 

Correct Answer: D

 

 

 

 

 

 

 

QUESTION 330

A new startup company with very limited funds wants to protect the organization from external threats by implementing some type of best practice security controls across a number of hosts located in the application zone, the production zone, and the core network. The 50 hosts in the core network are a mixture of Windows and Linux based systems, used by development staff to develop new applications. The single Windows host in the application zone is used exclusively by the production team to control software deployments into the production zone. There are 10 UNIX web application hosts in the production zone which are publically accessible. Development staff is required to install and remove various types of software from their hosts on a regular basis while the hosts in the zone rarely require any type of configuration changes. Which of the following when implemented would provide the BEST level of protection with the LEAST amount of disruption to staff?

 

A.

NIPS in the production zone, HIPS in the application zone, and anti-virus / anti-malware across all Windows hosts.

B.

NIPS in the production zone, NIDS in the application zone, HIPS in the core network, and anti-virus / anti-malware across all hosts.

C.

HIPS in the production zone, NIPS in the application zone, and HIPS in the core network.

D.

NIDS in the production zone, HIDS in the application zone, and anti-virus / anti-malware across all hosts.

 

Correct Answer: A

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in CAS-002 Exam Questions (December) and tagged , , , , , , . Bookmark the permalink.