PrepAway - Latest Free Exam Questions & Answers

Category: CAS-001 (v.1)

Exam CAS-001: CompTIA Advanced Security Practitioner (update May 17th, 2015)

Which of the following should occur to allow VNC access to the server?

An administrator is unable to connect to a server via VNC.
Upon investigating the host firewall configuration, the administrator sees the following lines:
A INPUT -m state –state NEW -m tcp -p tcp –dport 3389 -j DENY
A INPUT -m state –state NEW -m tcp -p tcp –dport 22 -j DENY
A INPUT -m state –state NEW -m tcp -p tcp –dport 10000 -j ACCEPT
A INPUT -m state –state NEW -m tcp -p tcp –dport 80 -j DENY
A INPUT -m state –state NEW -m tcp -p tcp –sport 3389 -j ACCEPT
Which of the following should occur to allow VNC access to the server?

Which of the following solutions accomplishes the MOST of these goals?

Company A is trying to implement controls to reduce costs and time spent on litigation.
To accomplish this, Company A has established several goals:
Prevent data breaches from lost/stolen assets
Reduce time to fulfill e-discovery requests
Prevent PII from leaving the network
Lessen the network perimeter attack surface
Reduce internal fraud
Which of the following solutions accomplishes the MOST of these goals?

which of the following should the security architect take into consideration?

A security architect is seeking to outsource company server resources to a commercial cloud
service provider. The provider under consideration has a reputation for poorly controlling physical
access to datacenters and has been the victim of multiple social engineering attacks. The service
provider regularly assigns VMs from multiple clients to the same physical resources. When
conducting the final risk assessment which of the following should the security architect take into
consideration?

which of the following attacks should form the basis of the incident mitigation plan?

The root cause analysis of a recent security incident reveals that an attacker accessed a printer
from the Internet. The attacker then accessed the print server, using the printer as a launch pad
for a shell exploit. The print server logs show that the attacker was able to exploit multiple
accounts, ultimately launching a successful DoS attack on the domain controller.
Defending against which of the following attacks should form the basis of the incident mitigation
plan?

which weakened the security posture of the enclave?

An existing enterprise architecture included an enclave where sensitive research and development
work was conducted. This network enclave also served as a storage location for proprietary
corporate data and records. The initial security architect chose to protect the enclave by restricting
access to a single physical port on a firewall. All downstream network devices were isolated from
the rest of the network and communicated solely through the single 100mbps firewall port. Over
time, researchers connected devices on the protected enclave directly to external resources and
corporate data stores. Mobile and wireless devices were also added to the enclave to support high
speed data research. Which of the following BEST describes the process which weakened the
security posture of the enclave?

which of the following?

At one time, security architecture best practices led to networks with a limited number (1-3) of
network access points. This restriction allowed for the concentration of security resources and
resulted in a well defined attack surface. The introduction of wireless networks, highly portable
network devices, and cloud service providers has rendered the network boundary and attack
surface increasingly porous. This evolution of the security architecture has led to which of the
following?

Which of the following documents would contain the details of this marketing agreement?

Company ABC has entered into a marketing agreement with Company XYZ, whereby ABC will
share some of its customer information with XYZ. However, XYZ can only contact ABC customers
who explicitly agreed to being contacted by third parties. Which of the following documents would
contain the details of this marketing agreement?

Which of the following protocols should the cable company be using to allow their customers to establish VLANs

Company ABC has a 100Mbps fiber connection from headquarters to a remote office 200km (123
miles) away. This connection is provided by the local cable television company. ABC would like to
extend a secure VLAN to the remote office, but the cable company says this is impossible since
they already use VLANs on their internal network. Which of the following protocols should the
cable company be using to allow their customers to establish VLANs to other sites?


Page 20 of 50« First...10...1819202122...304050...Last »