CAS-003 EnsurePass-Exam-Dumps-PDF-VCE-Practice-Test-Questions

Page 1

The Latest CAS-003 Exam ☆ Instant Download ☆ Free Update for 180 Days

Vendor: CompTIA Exam Code: CAS-003 Exam Name: CompTIA Advanced Security Practitioner (CASP) Version: 13.02 Q & A: 361

Guaranteed Success with EnsurePass VCE Software & PDF File


The Latest CAS-003 Exam ☆ Instant Download ☆ Free Update for 180 Days

QUESTION 1 An organization is engaged in international business operations and is required to comply with various legal frameworks. In addition to changes in legal frameworks, which of thefollowing is a primary purpose of a compliance management program? A. B. C. D.

Following new requirements that result from contractual obligations Answering requests from auditors that relate to e-discovery Responding to changes in regulatory requirements Developing organizational policies that relate to hiring and termination procedures

Correct Answer: C

QUESTION 2 A security engineer is working with a software development team. The engineer is tasked with ensuring all security requirements are adhered to by the developers. Which of the following BEST describes the contents of the supporting documentthe engineer is creating? A. A series of ad-hoc tests that each verify security control functionality of the entire system at once. B. A series of discrete tasks that, when viewed in total, can be used to verify and document each individual constraint from the SRTM. C. A set of formal methods that apply to one or more of the programing languages used on the development project. D. A methodology to verify each security control in each unit of developed code prior to committing the code. Correct Answer: D

QUESTION 3 The legal department has required that all traffic to and from a company's cloud-based word processing and email system islogged. To meet this requirement, the Chief Information Security Officer (CISO) has implemented a next-generation firewall to perform inspection of the secure traffic and has decided to use a cloud-based log aggregation solution for all traffic that is logged. Which of the following presents a long-term risk to user privacy in this scenario? A. Confidential or sensitive documents are inspected by the firewall before being logged. B. Latency when viewing videos and other online content may increase. C. Reports generated from the firewall will take longer to produce due to more information from inspected traffic. D. Stored logs may contain non-encrypted usernames and passwords for personal websites. Correct Answer: A

QUESTION 4 A security engineer has been hired to design a device that will enable the exfiltration of data from within a well-defended network perimeter during an authorized test. The device must bypass all firewalls and NIDS in place, as well as allow for the upload of commands from a centralized command and control answer. The total cost of the device must be kept to a minimum in case the device is discovered during an assessment. Which of the following tools should the engineer load onto the device being designed? A. Custom firmware with rotating key generation Guaranteed Success with EnsurePass VCE Software & PDF File


The Latest CAS-003 Exam ☆ Instant Download ☆ Free Update for 180 Days

B. Automatic MITM proxy C. TCP beacon broadcast software D. Reverse shell endpoint listener Correct Answer: B

QUESTION 5 After investigating virus outbreaks that have cost the company $1,000 per incident, the company's Chief Information Security Officer (CISO) has been researching new antivirus software solutions to use and be fully supported for the next two years. The CISO has narrowed down the potential solutions to four candidates that meet all the company's performance and capability requirements:

Using the table above, which of the following would be the BEST business-driven choice among five possible solutions? A. B. C. D. E.

Product A Product B Product C Product D Product E

Correct Answer: E

QUESTION 6 A security analyst is reviewing the corporate MDM settings and notices some disabled settings, which consequently permit users to download programs from untrusted developers and manually install them. After someconversations, it is confirmed that these settings were disabled to support the internal development of mobile applications. The security analyst is now recommending that developers and testers have a separate device profile allowing this, and that the rest of the organization's users do not have the ability to manually download and install untrusted applications. Which of the following settings should be toggled to achieve the goal? (Choose two.) A. B. C. D. E.

OTA updates Remote wiping Side loading Sandboxing Containerization Guaranteed Success with EnsurePass VCE Software & PDF File


The Latest CAS-003 Exam ☆ Instant Download ☆ Free Update for 180 Days

F. Signed applications Correct Answer: EF

QUESTION 7 A security engineer must establish amethod to assess compliance with company security policies as they apply to the unique configuration of individual endpoints, as well as to the shared configuration policies of common devices.

Which of the following tools is the security engineer usingto produce the above output? A. B. C. D.

Vulnerability scanner SIEM Port scanner SCAP scanner

Correct Answer: B

QUESTION 8 A security analyst has been asked to create a list of external IT security concerns, which are applicable to the organization. The intent is to show the different types of external actors, their attack vectors, and the types of vulnerabilities that would cause business impact. The Chief Information Security Officer (CISO) will then present this list to the board to request funding for controls in areas that have insufficient coverage. Which of the following exercise types should the analyst perform? A. B. C. D.

Summarize the most recently disclosed vulnerabilities. Research industry best practices and latest RFCs. Undertake an external vulnerability scan and penetration test. Conduct a threat modeling exercise.

Correct Answer: D

QUESTION 9 A company wants to extend its help desk availability beyond business hours. The Chief Information Officer (CIO) decides to augment the help desk with a third-party service that will answer calls and provide Tier 1 problem resolution, suchas password resets and remote assistance. The security administrator implements the following firewall change: Guaranteed Success with EnsurePass VCE Software & PDF File


The Latest CAS-003 Exam ☆ Instant Download ☆ Free Update for 180 Days

The administrator provides the appropriate path and credentials to the third-party company. Which of the following technologies is MOST likelybeing used to provide access to the third company? A. B. C. D. E.

LDAP WAYF OpenID RADIUS SAML

Correct Answer: D

QUESTION 10 A large enterprise with thousands of users is experiencing a relatively high frequency of malicious activity from the insider threats. Much of the activity appears to involve internal reconnaissance that results in targeted attacks against privileged users and network file shares. Given this scenario, which of the following would MOST likely prevent or deter these attacks? (Choose two.) A. Conduct role-based training for privileged users that highlights common threats against them and covers best practices to thwart attacks B. Increase the frequency at which host operating systems are scanned for vulnerabilities, and decrease the amount of time permitted between vulnerability identification and the application of corresponding patches C. Enforce command shell restrictions via group policies for all workstations by default to limit which native operating system tools are available for use D. Modify the existing rules of behavior to include an explicit statement prohibiting users from enumerating user and file directories using available tools and/or accessing visible resources that do not directly pertain to their job functions E. For all workstations, implement full-disk encryption andconfigure UEFI instances to require complex passwords for authentication F. Implement application blacklisting enforced by the operating systems of all machines in the enterprise Correct Answer: CD

QUESTION 11 A company has entered into a business agreement with abusiness partner for managed human resources services. The Chief Information Security Officer (CISO) has been asked to provide documentation that is required to set up a business-to-business VPN between the two organizations. Which of the following is required in this scenario? A. ISA Guaranteed Success with EnsurePass VCE Software & PDF File


The Latest CAS-003 Exam ☆ Instant Download ☆ Free Update for 180 Days

B. BIA C. SLA D. RA Correct Answer: C

QUESTION 12 A company has created a policy to allow employees to use their personally owned devices. The Chief Information Officer (CISO) is getting reports of company data appearing on unapproved forums and an increase in theft of personal electronic devices. Which of the following security controls would BEST reduce the risk of exposure? A. B. C. D.

Disk encryption on the local drive Grouppolicy to enforce failed login lockout Multifactor authentication Implementation of email digital signatures

Correct Answer: A

QUESTION 13 The Chief Information Officer (CIO) has been asked to develop a security dashboard with the relevant metrics. The board of directors will use the dashboard to monitor and track the overall security posture of the organization. The CIO produces a basic report containing both KPI and KRI data in two separate sections for the board to review. Which of the following BEST meets the needs of the board? A. KRI:- Compliance with regulations- Backlog of unresolved security investigations- Severity of threats and vulnerabilities reported by sensors- Time to patch critical issues on a monthly basisKPI:- Time to resolve open security items- % of suppliers with approved security control frameworks- EDR coverage across the fleet- Threat landscape rating B. KRI:- EDR coverage across the fleet- Backlog of unresolved security investigations- Time to patch critical issues on a monthly basis- Threat landscape ratingKPI:- Time to resolve open security items- Compliance with regulations- % of suppliers with approved security control frameworks- Severity of threats and vulnerabilities reported by sensors C. KRI:- EDR coverage across the fleet- % of suppliers with approved security control frameworkBacklog of unresolved security investigations- Threat landscape ratingKPI:- Time to resolve open security items- Compliance with regulations- Time to patch critical issues on a monthly basisSeverity of threats and vulnerabilities reported by sensors D. KPI:- Compliance with regulations- % of suppliers with approved security control frameworksSeverity of threats and vulnerabilities reported by sensors- Threat landscape ratingKRI:- Time to resolve open security items- Backlog of unresolved security investigations- EDR coverage across the fleet- Time to patch critical issues on a monthly basis Correct Answer: A

Guaranteed Success with EnsurePass VCE Software & PDF File


The Latest CAS-003 Exam ☆ Instant Download ☆ Free Update for 180 Days

QUESTION 14 As a result of an acquisition, a new development team is being integrated into the company. The development team has BYOD laptops with IDEs installed, build servers, and code repositories that utilizeSaaS. To have the team up and running effectively, a separate Internet connection has been procured. A stand up has identified the following additional requirements: 1. Reuse of the existing network infrastructure 2. Acceptable use policies to be enforced 3. Protection of sensitive files 4. Access to the corporate applications Which of the following solution components should be deployed to BEST meet the requirements? (Select three.) A. B. C. D. E. F. G. H.

IPSec VPN HIDS Wireless controller Rights management SSLVPN NAC WAF Load balancer

Correct Answer: DEF

QUESTION 15 A systems administrator has installed a disk wiping utility on all computers across the organization and configured it to perform a seven-pass wipe and an additional pass to overwrite the disk with zeros. The company has also instituted a policy that requires users to erase files containing sensitive information when they are no longer needed. To ensure the process provides the intended results, an auditor reviews the following content from a randomly selected decommissioned hard disk:

Which of the following should be included in the auditor's report based in the above findings? A. B. C. D.

The harddisk contains bad sectors The disk has been degaussed. The data represents part of the disk BIOS. Sensitive data might still be present on the hard drives.

Correct Answer: A

Guaranteed Success with EnsurePass VCE Software & PDF File


The Latest CAS-003 Exam ☆ Instant Download ☆ Free Update for 180 Days

QUESTION 16 At ameeting, the systems administrator states the security controls a company wishes to implement seem excessive, since all of the information on the company's web servers can be obtained publicly and is not proprietary in any way. The next day the company'swebsite is defaced as part of an SQL injection attack, and the company receives press inquiries about the message the attackers displayed on the website. Which of the following is the FIRST action the company should take? A. B. C. D. E.

Refer to and followprocedures from the company's incident response plan. Call a press conference to explain that the company has been hacked. Establish chain of custody for all systems to which the systems administrator has access. Conduct a detailed forensic analysis of the compromised system. Inform the communications and marketing department of the attack details.

Correct Answer: A

QUESTION 17 A newly hired systems administrator is trying to connect a new and fully updated, but very customized, Android device to access corporate resources. However, the MDM enrollment process continually fails. The administrator asks a security team member to look into the issue. Which of the following is the MOST likely reason the MDM is not allowing enrollment? A. B. C. D.

The OS version is notcompatible The OEM is prohibited The device does not support FDE The device is rooted

Correct Answer: D

QUESTION 18 An organization is in the process ofintegrating its operational technology and information technology areas. As part of the integration, some of the cultural aspects it would like to see include more efficient use of resources during change windows, better protection of critical infrastructure, and the ability to respond to incidents. The following observations have been identified: The ICS supplier has specified that any software installed will result in lack of support. There is no documented trust boundary defined between the SCADA and corporate networks. Operational technology staff have to manage the SCADA equipment via the engineering workstation. There is a lack of understanding of what is within the SCADA network. Which of the following capabilities would BEST improve the security position? A. B. C. D.

VNC, router, and HIPS SIEM, VPN, and firewall Proxy, VPN, and WAF IDS, NAC, and log monitoring

Correct Answer: A

Guaranteed Success with EnsurePass VCE Software & PDF File


The Latest CAS-003 Exam ☆ Instant Download ☆ Free Update for 180 Days

QUESTION 19 The risk subcommittee of a corporate board typically maintains a master register of the most prominent risks to the company. A centralized holistic view of risk is particularlyimportant to the corporate Chief Information Security Officer (CISO) because: A. IT systems are maintained in silos to minimize interconnected risks and provide clear risk boundaries used to implement compensating controls B. risks introduced by a systemin one business unit can affect other business units in ways in which the individual business units have no awareness C. corporate general counsel requires a single system boundary to determine overall corporate risk exposure D. major risks identified bythe subcommittee merit the prioritized allocation of scare funding to address cybersecurity concerns Correct Answer: A

QUESTION 20 The marketing department has developed a new marketing campaign involving significant social media outreach. The campaign includes allowing employees and customers to submit blog posts and pictures of their day-to-day experiences at the company. The information security manager has been asked to provide an informative letter to all participants regarding the security risks and how to avoid privacy and operational security issues. Which of the following is the MOSTimportant information to reference in the letter? A. B. C. D.

After-action reports from prior incidents. Social engineering techniques Company policies and employee NDAs Data classification processes

Correct Answer: C

QUESTION 21 Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic records for 2000 sales force employees. Source records will be email, PC, network shares, and applications. After all restrictions have been lifted, which of the following should the information manager review? A. B. C. D.

Data retention policy Legal hold Chain of custody Scope statement

Correct Answer: B

QUESTION 22 Which of the following system would be at the GREATEST risk of compromise if found to have an open vulnerability associated with perfect ... secrecy? A. Endpoints B. VPN concentrators Guaranteed Success with EnsurePass VCE Software & PDF File


EnsurePass.com Members Features: 1. 2. 3. 4. 5.

Verified Answers researched by industry experts. Q&As are downloadable in PDF and VCE format. 98% success Guarantee and Money Back Guarantee. Free updates for 180 Days. Instant Access to download the Items

View list of All Exam provided: http://www.ensurepass.com/certfications?index=A To purchase Lifetime Full Access Membership click here: http://www.ensurepass.com/user/register

Valid Discount Code 20% OFF for 2019: MMJ4-IGD8-X3QW To purchase the HOT Exams: Vendors Cisco Cisco Cisco Cisco Cisco Cisco Cisco Cisco Cisco Cisco CompTIA CompTIA CompTIA CompTIA CompTIA CompTIA CompTIA CompTIA CompTIA CompTIA CompTIA Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft ISC

Hot Exams 100-105 200-105 200-125 200-310 200-355 300-101 300-115 300-135 300-320 400-101 220-1001 220-1002 220-901 220-902 CAS-003 LX0-103 LX0-104 N10-007 PK0-004 SK0-004 SY0-501 70-410 70-411 70-412 70-740 70-741 70-742 70-761 70-762 CISSP

Download http://www.ensurepass.com/100-105.html http://www.ensurepass.com/200-105.html http://www.ensurepass.com/200-125.html http://www.ensurepass.com/200-310.html http://www.ensurepass.com/200-355.html http://www.ensurepass.com/300-101.html http://www.ensurepass.com/300-115.html http://www.ensurepass.com/300-135.html http://www.ensurepass.com/300-320.html http://www.ensurepass.com/400-101.html http://www.ensurepass.com/220-1001.html http://www.ensurepass.com/220-1002.html http://www.ensurepass.com/220-901.html http://www.ensurepass.com/220-902.html http://www.ensurepass.com/CAS-003.html http://www.ensurepass.com/LX0-103.html http://www.ensurepass.com/LX0-104.html http://www.ensurepass.com/N10-007.html http://www.ensurepass.com/PK0-004.html http://www.ensurepass.com/SK0-004.html http://www.ensurepass.com/SY0-501.html http://www.ensurepass.com/70-410.html http://www.ensurepass.com/70-411.html http://www.ensurepass.com/70-412.html http://www.ensurepass.com/70-740.html http://www.ensurepass.com/70-741.html http://www.ensurepass.com/70-742.html http://www.ensurepass.com/70-761.html http://www.ensurepass.com/70-762.html http://www.ensurepass.com/CISSP.html


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.