PrepAway - Latest Free Exam Questions & Answers

Category: CAS-001 (v.1)

Exam CAS-001: CompTIA Advanced Security Practitioner (update May 17th, 2015)

what the engineer is trying to achieve?

During a software development project review, the cryptographic engineer advises the project
manager that security can be greatly improved by significantly slowing down the runtime of a
hashing algorithm and increasing the entropy by passing the input and salt back during each
iteration. Which of the following BEST describes what the engineer is trying to achieve?

Which of the following BEST describes the technique used by the malware developers?

A security engineer at a bank has detected a Zeus variant, which relies on covert communication
channels to receive new instructions and updates from the malware developers. As a result, NIPS
and AV systems did not detect the configuration files received by staff in emails that appeared as
normal files. Which of the following BEST describes the technique used by the malware
developers?

Which of the following, when implemented, would BEST meet the engineer’s requirements?

A security engineer wants to implement forward secrecy but still wants to ensure the number of
requests handled by the web server is not drastically reduced due to the larger computational
overheads. Browser compatibility is not a concern; however system performance is. Which of the
following, when implemented, would BEST meet the engineer’s requirements?

Which of the following devices would BEST meet all of these requirements?

An IT administrator has been tasked by the Chief Executive Officer with implementing security
using a single device based on the following requirements:
1. Selective sandboxing of suspicious code to determine malicious intent.
2. VoIP handling for SIP and H.323 connections.
3. Block potentially unwanted applications.
Which of the following devices would BEST meet all of these requirements?

Which of the following would BEST meet the CEO’s requirements?

The Chief Executive Officer (CEO) has asked the IT administrator to protect the externally facing
web server from SQL injection attacks and ensure the backend database server is monitored for
unusual behavior while enforcing rules to terminate unusual behavior. Which of the following
would BEST meet the CEO’s requirements?

Which of the following is BEST at protecting the internal certificates used in the decryption process?

An IT administrator has been tasked with implementing an appliance-based web proxy server to
control external content accessed by internal staff. Concerned with the threat of corporate data
leakage via web-based email, the IT administrator wants to decrypt all outbound HTTPS sessions
and pass the decrypted content to an ICAP server for inspection by the corporate DLP software.
Which of the following is BEST at protecting the internal certificates used in the decryption
process?

Which of the following recommendations from the server administrator BEST meets the IT and security managersâ€

A security manager is concerned about performance and patch management, and, as a result,
wants to implement a virtualization strategy to avoid potential future OS vulnerabilities in the host
system. The IT manager wants a strategy that would provide the hypervisor with direct
communications with the underlying physical hardware allowing the hardware resources to be
paravirtualized and delivered to the guest machines. Which of the following recommendations
from the server administrator BEST meets the IT and security managers’ requirements? (Select
TWO).


Page 41 of 50« First...102030...3940414243...50...Last »