CompTIA CAS-003 Exam Practice Questions (P. 2)
- Full Access (480 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Two new technical SMB security settings have been enforced and have also become policies that increase secure communications.
Network Client: Digitally sign communication
Network Server: Digitally sign communication
A storage administrator in a remote location with a legacy storage array, which contains time-sensitive data, reports employees can no longer connect to their department shares. Which of the following mitigation strategies should an information security manager recommend to the data owner?
Network Client: Digitally sign communication
Network Server: Digitally sign communication
A storage administrator in a remote location with a legacy storage array, which contains time-sensitive data, reports employees can no longer connect to their department shares. Which of the following mitigation strategies should an information security manager recommend to the data owner?
- AAccept the risk, reverse the settings for the remote location, and have the remote location file a risk exception until the legacy storage device can be upgraded
- BAccept the risk for the remote location, and reverse the settings indefinitely since the legacy storage device will not be upgraded
- CMitigate the risk for the remote location by suggesting a move to a cloud service provider. Have the remote location request an indefinite risk exception for the use of cloud storage
- DAvoid the risk, leave the settings alone, and decommission the legacy storage device
Correct Answer:
A
A
send
light_mode
delete
Question #12
A security engineer is designing a system in which offshore, outsourced staff can push code from the development environment to the production environment securely. The security engineer is concerned with data loss, while the business does not want to slow down its development process. Which of the following solutions BEST balances security requirements with business need?
- ASet up a VDI environment that prevents copying and pasting to the local workstations of outsourced staff members
- BInstall a client-side VPN on the staff laptops and limit access to the development network
- CCreate an IPSec VPN tunnel from the development network to the office of the outsourced staff
- DUse remote SaaS to provide administrative sharing in production
Correct Answer:
B
B
send
light_mode
delete
Question #13
A systems security engineer is assisting an organization's market survey team in reviewing requirements for an upcoming acquisition of mobile devices. The engineer expresses concerns to the survey team about a particular class of devices that uses a separate SoC for baseband radio I/O. For which of the following reasons is the engineer concerned?
- AThese devices can communicate over networks older than HSPA+ and LTE standards, exposing device communications to poor encryptions routines
- BThe organization will be unable to restrict the use of NFC, electromagnetic induction, and Bluetooth technologies
- CThe associated firmware is more likely to remain out of date and potentially vulnerable
- DThe manufacturers of the baseband radios are unable to enforce mandatory access controls within their driver set
Correct Answer:
B
B
send
light_mode
delete
Question #14
During a security assessment, an organization is advised of inadequate control over network segmentation. The assessor explains that the organization's reliance on VLANs to segment traffic is insufficient to provide segmentation based on regulatory standards. Which of the following should the organization consider implementing along with VLANs to provide a greater level of segmentation?
- AAir gaps
- BAccess control lists
- CSpanning tree protocol
- DNetwork virtualization
- EElastic load balancing
Correct Answer:
D
D
send
light_mode
delete
Question #15
A security administrator was informed that a server unexpectedly rebooted. The administrator received an export of syslog entries for analysis:

Which of the following does the log sample indicate? (Choose two.)

Which of the following does the log sample indicate? (Choose two.)
- AA root user performed an injection attack via kernel module
- BEncrypted payroll data was successfully decrypted by the attacker
- CJsmith successfully used a privilege escalation attackMost Voted
- DPayroll data was exfiltrated to an attacker-controlled hostMost Voted
- EBuffer overflow in memory paging caused a kernel panic
- FSyslog entries were lost due to the host being rebooted
Correct Answer:
CE
CE
send
light_mode
delete
Question #16
An organization has employed the services of an auditing firm to perform a gap assessment in preparation for an upcoming audit. As part of the gap assessment, the auditor supporting the assessment recommends the organization engage with other industry partners to share information about emerging attacks to organizations in the industry in which the organization functions. Which of the following types of information could be drawn from such participation?
- AThreat modeling
- BRisk assessment
- CVulnerability data
- DThreat intelligence
- ERisk metrics
- FExploit frameworks
Correct Answer:
F
F
send
light_mode
delete
Question #17
A recent penetration test identified that a web server has a major vulnerability. The web server hosts a critical shipping application for the company and requires
99.99% availability. Attempts to fix the vulnerability would likely break the application. The shipping application is due to be replaced in the next three months.
Which of the following would BEST secure the web server until the replacement web server is ready?
99.99% availability. Attempts to fix the vulnerability would likely break the application. The shipping application is due to be replaced in the next three months.
Which of the following would BEST secure the web server until the replacement web server is ready?
- APatch management
- BAntivirus
- CApplication firewallMost Voted
- DSpam filters
- EHIDS
Correct Answer:
E
E
send
light_mode
delete
Question #18
To prepare for an upcoming audit, the Chief Information Security Officer (CISO) asks for all 1200 vulnerabilities on production servers to be remediated. The security engineer must determine which vulnerabilities represent real threats that can be exploited so resources can be prioritized to migrate the most dangerous risks. The CISO wants the security engineer to act in the same manner as would an external threat, while using vulnerability scan results to prioritize any actions.
Which of the following approaches is described?
Which of the following approaches is described?
- ABlue team
- BRed teamMost Voted
- CBlack box
- DWhite team
Correct Answer:
C
Reference:
http://resources.infosecinstitute.com/the-types-of-penetration-testing/#gref
C
Reference:
http://resources.infosecinstitute.com/the-types-of-penetration-testing/#gref
send
light_mode
delete
Question #19
An engineer is evaluating the control profile to assign to a system containing PII, financial, and proprietary data.

Based on the data classification table above, which of the following BEST describes the overall classification?

Based on the data classification table above, which of the following BEST describes the overall classification?
- AHigh confidentiality, high availability
- BHigh confidentiality, medium availabilityMost Voted
- CLow availability, low confidentiality
- DHigh integrity, low availability
Correct Answer:
B
B
send
light_mode
delete
Question #20
A security analyst is reviewing the corporate MDM settings and notices some disabled settings, which consequently permit users to download programs from untrusted developers and manually install them. After some conversations, it is confirmed that these settings were disabled to support the internal development of mobile applications. The security analyst is now recommending that developers and testers have a separate device profile allowing this, and that the rest of the organization's users do not have the ability to manually download and install untrusted applications. Which of the following settings should be toggled to achieve the goal? (Choose two.)
- AOTA updates
- BRemote wiping
- CSide loading
- DSandboxing
- EContainerization
- FSigned applications
Correct Answer:
EF
EF
send
light_mode
delete
All Pages