While you include a CompTIA in your set of skills, it is going to primary assist you to through making an effort to improve your operate circulation. By means of furthering knowing bottom part, you have improved comprehension of what you are doing and then operate even more expeditiously. Further, you will be aware to your website within the software programs as good as many, which could frequently permit you to find the speediest and a lot effective means for you to definitely attain ones responsibilities. But it surely doesn?¡¥t just conclude with personal productivity quantities in addition to knowing just about all you should know in relation to CompTIA solutions.

2021 Nov CAS-002 free draindumps

Q231. - (Topic 4) 

Company XYZ plans to donate 1,000 used computers to a local school. The company has a large research and development section and some of the computers were previously used to store proprietary research. 

The security administrator is concerned about data remnants on the donated machines, but the company does not have a device sanitization section in the data handling policy. 

Which of the following is the BEST course of action for the security administrator to take? 

A. Delay the donation until a new policy is approved by the Chief Information Officer (CIO), and then donate the machines. 

B. Delay the donation until all storage media on the computers can be sanitized. 

C. Reload the machines with an open source operating system and then donate the machines. 

D. Move forward with the donation, but remove all software license keys from the machines. 

Answer:


Q232. - (Topic 3) 

A large corporation which is heavily reliant on IT platforms and systems is in financial difficulty and needs to drastically reduce costs in the short term to survive. The Chief Financial Officer (CFO) has mandated that all IT and architectural functions will be outsourced and a mixture of providers will be selected. One provider will manage the desktops for five years, another provider will manage the network for ten years, another provider will be responsible for security for four years, and an offshore provider will perform day to day business processing functions for two years. At the end of each contract the incumbent may be renewed or a new provider may be selected. Which of the following are the MOST likely risk implications of the CFO’s business decision? 

A. Strategic architecture will be adversely impacted through the segregation of duties between the providers. Vendor management costs will remain unchanged. The risk position of the organization will decline as specialists now maintain the environment. The implementation of security controls and security updates will improve. Internal knowledge of IT systems will improve as providers maintain system documentation. 

B. Strategic architecture will improve as more time can be dedicated to strategy. System stability will improve as providers use specialists and tested processes to maintain systems. Vendor management costs will increase and the organization’s flexibility to react to new market conditions will be reduced slightly. Internal knowledge of IT systems will improve as providers maintain system documentation. The risk position of the organization will remain unchanged. 

C. Strategic architecture will not be impacted in the short term, but will be adversely impacted in the long term through the segregation of duties between the providers. Vendor management costs will stay the same and the organization’s flexibility to react to new market conditions will be improved through best of breed technology implementations. Internal knowledge of IT systems will decline over time. The implementation of security controls and security updates will not change. 

D. Strategic architecture will be adversely impacted through the segregation of duties between the providers. Vendor management costs will increase and the organization’s flexibility to react to new market conditions will be reduced. Internal knowledge of IT systems will decline and decrease future platform development. The implementation of security controls and security updates will take longer as responsibility crosses multiple boundaries. 

Answer:


Q233. - (Topic 5) 

An extensible commercial software system was upgraded to the next minor release version to patch a security vulnerability. After the upgrade, an unauthorized intrusion into the system was detected. The software vendor is called in to troubleshoot the issue and reports that all core components were updated properly. Which of the following has been overlooked in securing the system? (Select TWO). 

A. The company’s IDS signatures were not updated. 

B. The company’s custom code was not patched. 

C. The patch caused the system to revert to http. 

D. The software patch was not cryptographically signed. 

E. The wrong version of the patch was used. 

F. Third-party plug-ins were not patched. 

Answer: B,F 


Q234. - (Topic 3) 

A security consultant is hired by a company to determine if an internally developed web application is vulnerable to attacks. The consultant spent two weeks testing the application, and determines that no vulnerabilities are present. Based on the results of the tools and tests available, which of the following statements BEST reflects the security status of the application? 

A. The company’s software lifecycle management improved the security of the application. 

B. There are no vulnerabilities in the application. 

C. The company should deploy a web application firewall to ensure extra security. 

D. There are no known vulnerabilities at this time. 

Answer:


Q235. - (Topic 2) 

After reviewing a company’s NAS configuration and file system access logs, the auditor is advising the security administrator to implement additional security controls on the NFS export. The security administrator decides to remove the no_root_squash directive from the export and add the nosuid directive. Which of the following is true about the security controls implemented by the security administrator? 

A. The newly implemented security controls are in place to ensure that NFS encryption can only be controlled by the root user. 

B. Removing the no_root_squash directive grants the root user remote NFS read/write access to important files owned by root on the NAS. 

C. Users with root access on remote NFS client computers can always use the SU command to modify other user’s files on the NAS. 

D. Adding the nosuid directive disables regular users from accessing files owned by the root user over NFS even after using the SU command. 

Answer:


Up to date CAS-002 exam topics:

Q236. - (Topic 3) 

A financial institution wants to reduce the costs associated with managing and troubleshooting employees’ desktops and applications, while keeping employees from copying data onto external storage. The Chief Information Officer (CIO) has asked the security team to evaluate four solutions submitted by the change management group. Which of the following BEST accomplishes this task? 

A. Implement desktop virtualization and encrypt all sensitive data at rest and in transit. 

B. Implement server virtualization and move the application from the desktop to the server. 

C. Implement VDI and disable hardware and storage mapping from the thin client. 

D. Move the critical applications to a private cloud and disable VPN and tunneling. 

Answer:


Q237. - (Topic 2) 

Using SSL, an administrator wishes to secure public facing server farms in three subdomains: dc1.east.company.com, dc2.central.company.com, and dc3.west.company.com. Which of the following is the number of wildcard SSL certificates that should be purchased? 

A. 0 

B. 1 

C. 3 

D. 6 

Answer:


Q238. - (Topic 1) 

During a recent audit of servers, a company discovered that a network administrator, who required remote access, had deployed an unauthorized remote access application that communicated over common ports already allowed through the firewall. A network scan showed that this remote access application had already been installed on one third of the servers in the company. Which of the following is the MOST appropriate action that the company should take to provide a more appropriate solution? 

A. Implement an IPS to block the application on the network 

B. Implement the remote application out to the rest of the servers 

C. Implement SSL VPN with SAML standards for federation 

D. Implement an ACL on the firewall with NAT for remote access 

Answer:


Q239. - (Topic 1) 

A company sales manager received a memo from the company’s financial department which stated that the company would not be putting its software products through the same security testing as previous years to reduce the research and development cost by 20 percent for the upcoming year. The memo also stated that the marketing material and service level agreement for each product would remain unchanged. The sales manager has reviewed the sales goals for the upcoming year and identified an increased target across the software products that will be affected by the financial department’s change. All software products will continue to go through new development in the coming year. Which of the following should the sales manager do to ensure the company stays out of trouble? 

A. Discuss the issue with the software product's user groups 

B. Consult the company’s legal department on practices and law 

C. Contact senior finance management and provide background information 

D. Seek industry outreach for software practices and law 

Answer:


Q240. - (Topic 3) 

Within the company, there is executive management pressure to start advertising to a new target market. Due to the perceived schedule and budget inefficiencies of engaging a technology business unit to commission a new micro-site, the marketing department is engaging third parties to develop the site in order to meet time-to-market demands. From a security perspective, which of the following options BEST balances the needs between marketing and risk management? 

A. The third party should be contractually obliged to perform adequate security activities, and evidence of those activities should be confirmed by the company prior to launch. 

B. Outsourcing is a valid option to increase time-to-market. If a security incident occurs, it is not of great concern as the reputational damage will be the third party’s responsibility. 

C. The company should never outsource any part of the business that could cause a security or privacy incident. It could lead to legal and compliance issues. 

D. If the third party has an acceptable record to date on security compliance and is provably faster and cheaper, then it makes sense to outsource in this specific situation. 

Answer: