[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 41-50

Ensurepass

QUESTION 41

A company is facing penalties for failing to effectively comply with e-discovery requests. Which of the following could reduce the overall risk to the company from this issue?

 

A.

Establish a policy that only allows filesystem encryption and disallows the use of individual file encryption.

B.

Require each user to log passwords used for file encryption to a decentralized repository.

C.

Permit users to only encrypt individual files using their domain password and archive all old user passwords.

D.

Allow encryption only by tools that use public keys from the existing escrowed corporate PKI.

 

Correct Answer: D

 

 

 

 

 

 

QUESTION 42

A security engineer on a large enterprise network needs to schedule maintenance within a fixed window of time. A total outage period of four hours is permitted for servers. Workstations can undergo maintenance from 8:00 pm to 6:00 am daily. Which of the following can specify parameters for the maintenance work? (Select TWO).

 

A.

Managed security service

B.

Memorandum of understanding

C.

Quality of service

D.

Network service provider

E.

Operating level agreement

 

Correct Answer: BE

 

 

QUESTION 43

A security administrator wants to prevent sensitive data residing on corporate laptops and desktops from leaking outside of the corporate network. The company has already implemented full-disk encryption and has disabled all peripheral devices on its desktops and laptops. Which of the following additional controls MUST be implemented to minimize the risk of data leakage? (Select TWO).

 

A.

A full-system backup should be implemented to a third-party provider with strong encryption for data in transit.

B.

A DLP gateway should be installed at the company border.

C.

Strong authentication should be implemented via external biometric devices.

D.

Full-tunnel VPN should be required for all network communication.

E.

Full-drive file hashing should be implemented with hashes stored on separate storage.

F.

Split-tunnel VPN should be enforced when transferring sensitive data.

 

Correct Answer: BD

 

 

QUESTION 44

An industry organization has implemented a system to allow trusted authentication between all of its partners. The system consists of a web of trusted RADIUS servers communicating over the Internet. An attacker was able to set up a malicious server and conduct a successful man-in-the-middle attack. Which of the following controls should be implemented to mitigate the attack in the future?

 

A.

Use PAP for secondary authentication on each RADIUS server

B.

Disable unused EAP methods on each RADIUS server

C.

Enforce TLS connections between RADIUS servers

D.

Use a shared secret for each pair of RADIUS servers

 

Correct Answer: C

 

 

 

 

 

 

 

 

QUESTION 45

Two universities are making their 802.11n wireless networks available to the other university’s students. The infrastructure will pass the student’s credentials back to the home school for authentication via the Internet.

 

The requirements are:

 

clip_image002Mutual authentication of clients and authentication server

clip_image002[1]The design should not limit connection speeds

clip_image002[2]Authentication must be delegated to the home school

clip_image002[3]No passwords should be sent unencrypted

 

The following design was implemented:

 

clip_image002[4]WPA2 Enterprise using EAP-PEAP-MSCHAPv2 will be used for wireless security

clip_image002[5]RADIUS proxy servers will be used to forward authentication requests to the home school

clip_image002[6]The RADIUS servers will have certificates from a common public certificate authority

clip_image002[7]A strong s
hared secret will be used for RADIUS server authentication

 

Which of the following security considerations should be added to the design?

 

A.

The transport layer between the RADIUS servers should be secured

B.

WPA Enterprise should be used to decrease the network overhead

C.

The RADIUS servers should have local accounts for the visiting students

D.

Students should be given certificates to use for authentication to the network

 

Correct Answer: A

 

 

QUESTION 46

A security administrator is shown the following log excerpt from a Unix system:

 

2013 Oct 10 07:14:57 web14 sshd[1632]: Failed password for root from 198.51.100.23 port 37914 ssh2

 

2013 Oct 10 07:14:57 web14 sshd[1635]: Failed password for root from 198.51.100.23 port 37915 ssh2

 

2013 Oct 10 07:14:58 web14 sshd[1638]: Failed password for root from 198.51.100.23 port 37916 ssh2

 

2013 Oct 10 07:15:59 web14 sshd[1640]: Failed password for root from 198.51.100.23 port 37918 ssh2

 

2013 Oct 10 07:16:00 web14 sshd[1641]: Failed password for root from 198.51.100.23 port 37920 ssh2

 

2013 Oct 10 07:16:00 web14 sshd[1642]: Successful login for root from 198.51.100.23 port 37924 ssh2

 

Which of the following is the MOST likely explanation of what is occurring and the BEST immediate response? (Select TWO).

 

A.

An authorized administrator has logged into the root account remotely.

B.

The administrator should disable remote root logins.

C.

Isolate the system immediately and begin forensic analysis on the host.

D.

A remote attacker has compromised the root account using a buffer overflow in sshd.

E.

A remote attacker has guessed the root password using a dictionary attack.

F.

Use iptables to immediately DROP connections from the IP 198.51.100.23.

G.

A remote attacker has compromised the private key of the root account.

H.

Change the root password immediately to a password not found in a dictionary.

 

Correct An
swer:
CE

 

 

QUESTION 47

After a security incident, an administrator would like to implement policies that would help reduce fraud and the potential for collusion between employees. Which of the following would help meet these goals by having co-workers occasionally audit another worker’s position?

 

A.

Least privilege

B.

Job rotation

C.

Mandatory vacation

D.

Separation of duties

 

Correct Answer: B

 

 

QUESTION 48

A popular commercial virtualization platform allows for the creation of virtual hardware. To virtual machines, this virtual hardware is indistinguishable from real hardware. By implementing virtualized TPMs, which of the following trusted system concepts can be implemented?

 

A.

Software-based root of trust

B.

Continuous chain of trust

C.

Chain of trust with a hardware root of trust

D.

Software-based trust anchor with no root of trust

 

Correct Answer: C

 

 

QUESTION 49

Which of the following describes a risk and mitigation associated with cloud data storage?

 

A.

Risk: Shared hardware caused data leakageMitigation: Strong encryption at rest

B.

Risk: Offsite replicationMitigation: Multi-site backups

C.

Risk: Data loss from de-duplicationMitigation: Dynamic host bus addressing

D.

Risk: Combined data archivingMitigation: Two-factor administrator authentication

 

Correct Answer: A

 

 

QUESTION 50

The Information Security Officer (ISO) is reviewing a summary of the findings from the last COOP tabletop exercise. The Chief Information Officer (CIO) wants to determine which additional controls must be implemente
d to reduce the risk of an extended customer service outage due to the VoIP system being unavailable. Which of the following BEST describes the scenario presented and the document the ISO is reviewing?

 

A.

The ISO is evaluating the business implications of a recent telephone system failure within the BIA.

B.

The ISO is investigating the impact of a possible downtime of the messaging system within the RA.

C.

The ISO is calculating the budget adjustment needed to ensure audio/video system redundancy within the RFQ.

D.

The ISO is assessing the effect of a simulated downtime involving the telecommunication system within the AAR.

 

Correct Answer: D

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized. Bookmark the permalink.