Download CompTIA Advanced Security Practitioner (CASP).CAS-003.BrainDumps.2018-10-20.57q.vcex

Vendor: CompTIA
Exam Code: CAS-003
Exam Name: CompTIA Advanced Security Practitioner (CASP)
Date: Oct 20, 2018
File Size: 2 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
A security engineer is designing a system in which offshore, outsourced staff can push code from the development environment to the production environment securely. The security engineer is concerned with data loss, while the business does not want to slow down its development process. Which of the following solutions BEST balances security requirements with business need? 
  1. Set up a VDI environment that prevents copying and pasting to the local workstations of outsourced staff members
  2. Install a client-side VPN on the staff laptops and limit access to the development network
  3. Create an IPSec VPN tunnel from the development network to the office of the outsourced staff
  4. Use online collaboration tools to initiate workstation-sharing sessions with local staff who have access to the development network
Correct answer: D
Question 2
A systems security engineer is assisting an organization’s market survey team in reviewing requirements for an upcoming acquisition of mobile devices. The engineer expresses concerns to the survey team about a particular class of devices that uses a separate SoC for baseband radio I/O. For which of the following reasons is the engineer concerned?
  1. These devices can communicate over networks older than HSPA+ and LTE standards, exposing device communications to poor encryptions routines
  2. The organization will be unable to restrict the use of NFC, electromagnetic induction, and Bluetooth technologies
  3. The associated firmware is more likely to remain out of date and potentially vulnerable
  4. The manufacturers of the baseband radios are unable to enforce mandatory access controls within their driver set
Correct answer: B
Question 3
During a security assessment, an organization is advised of inadequate control over network segmentation. The assessor explains that the organization’s reliance on VLANs to segment traffic is insufficient to provide segmentation based on regulatory standards. Which of the following should the organization consider implementing along with VLANs to provide a greater level of segmentation?
  1. Air gaps
  2. Access control lists
  3. Spanning tree protocol
  4. Network virtualization
  5. Elastic load balancing
Correct answer: D
Question 4
A security administrator was informed that a server unexpectedly rebooted. The administrator received an export of syslog entries for analysis:
  
Which of the following does the log sample indicate? (Choose two.) 
  1. A root user performed an injection attack via kernel module
  2. Encrypted payroll data was successfully decrypted by the attacker
  3. Jsmith successfully used a privilege escalation attack
  4. Payroll data was exfiltrated to an attacker-controlled host
  5. Buffer overflow in memory paging caused a kernel panic
  6. Syslog entries were lost due to the host being rebooted
Correct answer: CE
Question 5
An organization has employed the services of an auditing firm to perform a gap assessment in preparation for an upcoming audit. As part of the gap assessment, the auditor supporting the assessment recommends the organization engage with other industry partners to share information about emerging attacks to organizations in the industry in which the organization functions. Which of the following types of information could be drawn from such participation?
  1. Threat modeling
  2. Risk assessment
  3. Vulnerability data
  4. Threat intelligence
  5. Risk metrics
  6. Exploit frameworks
Correct answer: F
Question 6
A recent penetration test identified that a web server has a major vulnerability. The web server hosts a critical shipping application for the company and requires 99.99% availability. Attempts to fix the vulnerability would likely break the application. The shipping application is due to be replaced in the next three months. Which of the following would BEST secure the web server until the replacement web server is ready? 
  1. Patch management
  2. Antivirus
  3. Application firewall
  4. Spam filters
  5. HIDS
Correct answer: E
Question 7
To prepare for an upcoming audit, the Chief Information Security Officer (CISO) asks for all 1200 vulnerabilities on production servers to be remediated. The security engineer must determine which vulnerabilities represent real threats that can be exploited so resources can be prioritized to migrate the most dangerous risks. The CISO wants the security engineer to act in the same manner as would an external threat, while using vulnerability scan results to prioritize any actions. 
Which of the following approaches is described?
  1. Blue team
  2. Red team
  3. Black box
  4. White team
Correct answer: C
Explanation:
Reference: http://resources.infosecinstitute.com/the-types-of-penetration-testing/#gref
Reference: http://resources.infosecinstitute.com/the-types-of-penetration-testing/#gref
Question 8
An engineer is evaluating the control profile to assign to a system containing PII, financial, and proprietary data. 
  
Based on the data classification table above, which of the following BEST describes the overall classification?
  1. High confidentiality, high availability
  2. High confidentiality, medium availability
  3. Low availability, low confidentiality
  4. High integrity, low availability
Correct answer: B
Question 9
A security analyst is reviewing the corporate MDM settings and notices some disabled settings, which consequently permit users to download programs from untrusted developers and manually install them. After some conversations, it is confirmed that these settings were disabled to support the internal development of mobile applications. The security analyst is now recommending that developers and testers have a separate device profile allowing this, and that the rest of the organization’s users do not have the ability to manually download and install untrusted applications. Which of the following settings should be toggled to achieve the goal? (Choose two.)
  1. OTA updates
  2. Remote wiping
  3. Side loading 
  4. Sandboxing
  5. Containerization
  6. Signed applications
Correct answer: EF
Question 10
The Chief Information Security Officer (CISO) for an organization wants to develop custom IDS rulesets faster, prior to new rules being released by IDS vendors. 
Which of the following BEST meets this objective? 
  1. Identify a third-party source for IDS rules and change the configuration on the applicable IDSs to pull in the new rulesets
  2. Encourage cybersecurity analysts to review open-source intelligence products and threat database to generate new IDS rules based on those sources
  3. Leverage the latest TCP- and UDP-related RFCs to arm sensors and IDSs with appropriate heuristics for anomaly detection
  4. Use annual hacking conventions to document the latest attacks and threats, and then develop IDS rules to counter those threats
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!