[Free] Download New Updated (December) CompTIA CAS-002 Exam Questions 91-100

Ensurepass

QUESTION 91

A security officer is leading a lessons learned meeting. Which of the following should be components of that meeting? (Select TWO).

 

A.

Demonstration of IPS system

B.

Review vendor selection process

C.

Calculate the ALE for the event

D.

Discussion of event timeline

E.

Assigning of follow up items

 

Correct Answer: DE

 

 

QUESTION 92

An application present on the majority of an organization’s 1,000 systems is vulnerable to a buffer overflow attack. Which of the following is the MOST comprehensive way to resolve the issue?

 

A.

Deploy custom HIPS signatures to detect and block the attacks.

B.

Validate and deploy the appropriate patch.

C.

Run the application in terminal services to reduce the threat landscape.

D.

Deploy custom NIPS signatures to detect and block the attacks.

 

Correct Answer: B

 

 

QUESTION 93

A security administrator notices a recent increase in workstations becoming compromised by malware. Often, the malware is delivered via drive-by downloads, from malware hosting websites, and is not being detected by the corporate antivirus. Which of the following solutions would provide the BEST protection for the company?

 

A.

Increase the frequency of antivirus downloads and install updates to all workstations.

B.

Deploy a cloud-based content filter and enable the appropriate category to prevent further infections.

C.

Deploy a WAF to inspect and block all web traffic which may contain malware and exploits.

D.

Deploy a web based gateway antivirus server to intercept viruses before they enter the network.

 

Correct Answer: B

 

 

QUESTION 94

A software project manager has been provided with a requirement from the customer to place limits on the types of transactions a given user can initiate without external interaction from another user with elevated privileges. This requirement is BEST described as an implementation of:

 

A.

an administrative control

B.

dual control

C.

separation of duties

D.

least privilege

E.

collusion

 

Correct Answer: C

 

 

QUESTION 95

A security firm is writing a response to an RFP from a customer that is building a new network based software product. The firm’s expertise is in penetration testing corporate networks. The RFP explicitly calls for all possible behaviors of the product to be tested, however, it does not specify any particular method to achieve this goal. Which of the following should be used to ensure the security and functionality of the product? (Select TWO).

 

A.

Code review

B.

Penetration testing

C.

Grey box testing

D.

Code signing

E.

White box testing

 

Correct Answer: AE

 

 

QUESTION 96

A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store cryptographic keys used to sign code and code modules on the VMs. Which of the following will meet this goal without requiring any hardware pass-through implementations?

 

A.

vTPM

B.

HSM

C.

TPM

D.

INE

 

Correct Answer: A

 

 

QUESTION 97

Due to compliance regulations, a company requires a yearly penetration test. The Chief Information Security Officer (CISO) has asked that it be done under a black box methodology. Which of the following would be the advantage of conducting this kind of penetration test?

 

A.

The risk of unplanned server outages is reduced.

B.

Using documentation provided to them, the pen-test organization can quickly determine areas to focus on.

C.

The results will show an in-depth view of the network and should help pin-point areas of internal weakness.

D.

The results should reflect what attackers may be able to learn about the company.

 

Correct Answer: D

 

 

QUESTION 98

The senior security administrator wants to redesign the company DMZ to minimize the risks associated with both external and internal threats. The DMZ design must support security in depth, change management and configuration processes, and support incident reconstruction. Which of the following designs BEST supports the given requirements?

 

A.

A dual firewall DMZ with remote logging where each firewall is managed by a separate administrator.

B.

A single firewall DMZ where each firewall interface is managed by a separate administrator and logging to the cloud.

C.

A SaaS based firewall which logs to the company’s local storage via SSL, and is managed by the change control team.

D.

A virtualized firewall, where each virtual instance is managed by a separate administrator and logging to the same hardware.

 

Correct Answer: A

 

 

QUESTION 99

A security policy states that all applications on the network must have a password length of eight characters. There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in six months, and two are not expected to be upgraded or removed from the network. Which of the following processes should be followed?

 

A.

Establish a risk matrix

B.

Inherit the risk for six months

C.

Provide a business justification to avoid the risk

D.

Provide a business justification for a risk exception

 

Correct Answer: D

 

 

QUESTION 100

A company sales manager received a memo from the company’s financial department which stated that the company would not be putting its software products through the same security testing as previous years to reduce the research and development cost by 20 percent for the upcoming year. The memo also stated that the marketing material and service level agreement for each product would remain unchanged. The sales manager has reviewed the sales goals for the upcoming year and identified an increased target across the software products that will be affected by the financial department’s change. All software products will continue to go through new development in the coming year. Which of the following should the sales manager do to ensure the company stays out of trouble?

 

A.

Discuss the issue with the software product’s user groups

B.

Consult the company’s legal department on practices and law

C.

Contact senior finance management and provide background information

D.

Seek industry outreach for software practices and law

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA CAS-002 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in CAS-002 Exam Questions (December) and tagged , , , , , , . Bookmark the permalink.