[Free] 2018(June) Ensurepass CompTIA CAS-002 Dumps with VCE and PDF 341-350

Ensurepass.com : Ensure you pass the IT Exams
2018 May CompTIA Official New Released CAS-002
100% Free Download! 100% Pass Guaranteed!

CompTIA Advanced Security Practitioner (CASP)

Question No: 341 – (Topic 4)

The lead systems architect on a software development project developed a design which is optimized for a distributed computing environment. The security architect assigned to the project has concerns about the integrity of the system, if it is deployed in a commercial cloud. Due to poor communication within the team, the security risks of the proposed design are not being given any attention. A network engineer on the project has a security background and is concerned about the overall success of the project. Which of the following is the BEST course of action for the network engineer to take?

  1. Address the security concerns through the network design and security controls.

  2. Implement mitigations to the security risks and address the poor communications on the team with the project manager.

  3. Document mitigations to the security concerns and facilitate a meeting between the architects and the project manager.

  4. Develop a proposal for an alternative architecture that does not leverage cloud computing and present it to the lead architect.

Answer: C

Question No: 342 – (Topic 4)

A security code reviewer has been engaged to manually review a legacy application. A number of systemic issues have been uncovered relating to buffer overflows and format string vulnerabilities.

The reviewer has advised that future software projects utilize managed code platforms if at all possible.

Which of the following languages would suit this recommendation? (Select TWO).

  1. C

  2. C#

  3. C

  4. Perl

  5. Java

Answer: B,E

Question No: 343 – (Topic 4)

An administrator has four virtual guests on a host server. Two of the servers are corporate SQL servers, one is a corporate mail server, and one is a testing web server for a small group of developers. The administrator is experiencing difficulty connecting to the host server during peak network usage times. Which of the following would allow the administrator to securely connect to and manage the host server during peak usage times?

  1. Increase the virtual RAM allocation to high I/O servers.

  2. Install a management NIC and dedicated virtual switch.

  3. Configure the high I/O virtual servers to use FCoE rather than iSCSI.

  4. Move the guest web server to another dedicated host.

    Answer: B

    Question No: 344 – (Topic 4)

    A company has been purchased by another agency and the new security architect has identified new security goals for the organization. The current location has video surveillance throughout the building and entryways. The following requirements must be met:

    1. Ability to log entry of all employees in and out of specific areas

    2. Access control into and out of all sensitive areas

    3. Two-factor authentication

      Which of the following would MOST likely be implemented to meet the above requirements and provide a secure solution? (Select TWO).

      1. Proximity readers

      2. Visitor logs

      3. Biometric readers

      4. Motion detection sensors

      5. Mantrap

Answer: A,C

Question No: 345 – (Topic 4)

A UNIX administrator notifies the storage administrator that extra LUNs can be seen on a UNIX server. The LUNs appear to be NTFS file systems. Which of the following MOST likely happened?

  1. The iSCSI initiator was not restarted.

  2. The NTFS LUNs are snapshots.

  3. The HBA allocation is wrong.

  4. The UNIX server is multipathed.

Answer: C

Question No: 346 – (Topic 4)

A Linux security administrator is attempting to resolve performance issues with new software installed on several baselined user systems. After investigating, the security administrator determines that the software is not initializing or executing correctly. For security reasons, the company has implemented trusted operating systems with the goal of

preventing unauthorized changes to the configuration baseline. The MOST likely cause of this problem is that SE Linux is set to:

  1. Enforcing mode with an incorrectly configured policy.

  2. Enforcing mode with no policy configured.

  3. Disabled with a correctly configured policy.

  4. Permissive mode with an incorrectly configured policy.

Answer: A

Question No: 347 – (Topic 4)

A systems administrator establishes a CIFS share on a Unix device to share data to windows systems. The security authentication on the windows domain is set to the highest level. Windows users are stating that they cannot authenticate to the Unix share. Which of the following settings on the Unix server is the cause of this problem?

  1. Refuse LM and only accept NTLMv2

  2. Accept only LM

  3. Refuse NTLMv2 and accept LM

  4. Accept only NTLM

Answer: A

Question No: 348 – (Topic 4)

A security administrator at Company XYZ is trying to develop a body of knowledge to enable heuristic and behavior based security event monitoring of activities on a geographically distributed network. Instrumentation is chosen to allow for monitoring and measuring the network. Which of the following is the BEST methodology to use in establishing this baseline?

  1. Model the network in a series of VMs; instrument the systems to record comprehensive metrics; run a large volume of simulated data through the model; record and analyze results; document expected future behavior.

  2. Completely duplicate the network on virtual machines; replay eight hours of captured corporate network traffic through the duplicate network; instrument the network; analyze the results; document the baseline.

  3. Instrument the operational network; simulate extra traffic on the network; analyze net

    flow information from all network devices; document the baseline volume of traffic.

  4. Schedule testing on operational systems when users are not present; instrument the systems to log all network traffic; monitor the network for at least eight hours; analyze the results; document the established baseline.

Answer: A

Question No: 349 – (Topic 4)

Continuous monitoring is a popular risk reduction technique in many large organizations with formal certification processes for IT projects. In order to implement continuous monitoring in an effective manner which of the following is correct?

  1. Only security related alerts should be forwarded to the network team for resolution.

  2. All logs must be centrally managed and access to the logs restricted only to data storage staff.

  3. Logging must be set appropriately and alerts delivered to security staff in a timely manner.

  4. Critical logs must be monitored hourly and adequate staff must be assigned to the network team.

Answer: C

Question No: 350 – (Topic 4)

A security policy states that all applications on the network must have a password length of eight characters. There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in six months, and two are not expected to be upgraded or removed from the network. Which of the following processes should be followed?

  1. Establish a risk matrix

  2. Inherit the risk for six months

  3. Provide a business justification to avoid the risk

  4. Provide a business justification for a risk exception

Answer: D

100% Ensurepass Free Download!
Download Free Demo:CAS-002 Demo PDF
100% Ensurepass Free Guaranteed!
CAS-002 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No