[Free] 2018(Mar) EnsurePass Testking CompTIA CAS-002 Dumps with VCE and PDF 311-320

Ensurepass.com : Ensure you pass the IT Exams
2018 Mar CompTIA Official New Released CAS-002
100% Free Download! 100% Pass Guaranteed!

CompTIA Advanced Security Practitioner (CASP)

Question No: 311 DRAG DROP – (Topic 3)

Company A has experienced external attacks on their network and wants to minimize the attacks from reoccurring. Modify the network diagram to prevent SQL injections. XSS attacks, smurf attacks, e-mail spam, downloaded malware. viruses and ping attacks. The company can spend a MAXIMUM of 550.000 USD. A cost list for each item is listed below

  1. Anti-Virus Server- $10,000 2 Firewall-$15,000

3 Load Balanced Server – $10,000 4 NIDS/NIPS-$10,000

5. Packet Analyzer-55.000 6 Patch Server-$15,000

7 Proxy Server-$20,000 8. Router – S10.000 9 Spam Filter – S5 000

10 Traffic Shaper – $20,000

11. Web Application Firewall – $10,000

Instructions: Not all placeholders in the diagram need to be filled and items can only be used once.

Ensurepass 2018 PDF and VCE

Ensurepass 2018 PDF and VCE


Ensurepass 2018 PDF and VCE

Question No: 312 – (Topic 3)

An administrator has a system hardening policy to only allow network access to certain services, to always use similar hardware, and to protect from unauthorized application configuration changes.

Which of the following technologies would help meet this policy requirement? (Select TWO).

  1. Spam filter

  2. Solid state drives

  3. Management interface

  4. Virtualization

  5. Host firewall

Answer: D,E

Question No: 313 – (Topic 3)

A corporation has Research and Development (Ramp;D) and IT support teams, each requiring separate networks with independent control of their security boundaries to support department objectives. The corporation’s Information Security Officer (ISO) is responsible for providing firewall services to both departments, but does not want to increase the hardware footprint within the datacenter. Which of the following should the ISO consider to provide the independent functionality required by each department’s IT teams?

  1. Put both departments behind the firewall and assign administrative control for each department to the corporate firewall.

  2. Provide each department with a virtual firewall and assign administrative control to the physical firewall.

  3. Put both departments behind the firewall and incorporate restrictive controls on each department’s network.

  4. Provide each department with a virtual firewall and assign appropriate levels of management for the virtual device.

Answer: D

Question No: 314 – (Topic 3)

When attending the latest security conference, an information security administrator noticed only a few people carrying a laptop around. Most other attendees only carried their smartphones.

Which of the following would impact the security of conference’s resources?

  1. Wireless network security may need to be increased to decrease access of mobile devices.

  2. Physical security may need to be increased to deter or prevent theft of mobile devices.

  3. Network security may need to be increased by reducing the number of available physical network jacks.

  4. Wireless network security may need to be decreased to allow for increased access of mobile devices.

Answer: C

Question No: 315 – (Topic 3)

Which of the following is the BEST place to contractually document security priorities,

responsibilities, guarantees, and warranties when dealing with outsourcing providers?

  1. NDA

  2. OLA

  3. MOU

  4. SLA

Answer: D

Question No: 316 – (Topic 3)

An organization determined that each of its remote sales representatives must use a smartphone for email access.

The organization provides the same centrally manageable model to each person.

Which of the following mechanisms BEST protects the confidentiality of the resident data?

  1. Require dual factor authentication when connecting to the organization’s email server.

  2. Require each sales representative to establish a PIN to access the smartphone and limit email storage to two weeks.

  3. Require encrypted communications when connecting to the organization’s email server.

  4. Require a PIN and automatic wiping of the smartphone if someone enters a specific number of incorrect PINs.

Answer: D

Question No: 317 – (Topic 3)

Staff from the sales department have administrator rights to their corporate standard operating environment, and often connect their work laptop to customer networks when onsite during meetings and presentations. This increases the risk and likelihood of a security incident when the sales staff reconnects to the corporate LAN. Which of the following controls would BEST protect the corporate network?

  1. Implement a network access control (NAC) solution that assesses the posture of the laptop before granting network access.

  2. Use an independent consulting firm to provide regular network vulnerability

    assessments and biannually qualitative risk assessments.

  3. Provide sales staff with a separate laptop with no administrator access just for sales visits.

  4. Update the acceptable use policy and ensure sales staff read and acknowledge the policy.

Answer: A

Question No: 318 – (Topic 3)

Company ABC is planning to outsource its Customer Relationship Management system (CRM) and marketing / leads management to Company XYZ.

Which of the following is the MOST important to be considered before going ahead with the service?

  1. Internal auditors have approved the outsourcing arrangement.

  2. Penetration testing can be performed on the externally facing web system.

  3. Ensure there are security controls within the contract and the right to audit.

  4. A physical site audit is performed on Company XYZ’s management / operation.

Answer: C

Question No: 319 – (Topic 3)

A Physical Security Manager is ready to replace all 50 analog surveillance cameras with IP cameras with built-in web management. The Security Manager has several security guard desks on different networks that must be able to view the cameras without unauthorized people viewing the video as well. The selected IP camera vendor does not have the ability to authenticate users at the camera level. Which of the following should the Security Manager suggest to BEST secure this environment?

  1. Create an IP camera network and deploy NIPS to prevent unauthorized access.

  2. Create an IP camera network and only allow SSL access to the cameras.

  3. Create an IP camera network and deploy a proxy to authenticate users prior to accessing the cameras.

  4. Create an IP camera network and restrict access to cameras from a single management host.

Answer: C

Question No: 320 – (Topic 3)

An administrator at a small company replaces servers whenever budget money becomes available. Over the past several years the company has acquired and still uses 20 servers and 50 desktops from five different computer manufacturers. Which of the following are management challenges and risks associated with this style of technology lifecycle management?

  1. Decreased security posture, decommission of outdated hardware, inability to centrally manage, and performance bottlenecks on old hardware.

  2. Increased mean time to failure rate of legacy servers, OS variances, patch availability, and ability to restore to dissimilar hardware.

  3. OS end-of-support issues, ability to backup data, hardware parts availability, and firmware update availability and management.

  4. Inability to use virtualization, trusted OS complexities, and multiple patch versions based on OS dependency.

Answer: B

100% Ensurepass Free Download!
Download Free Demo:CAS-002 Demo PDF
100% Ensurepass Free Guaranteed!
CAS-002 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com