PrepAway - Latest Free Exam Questions & Answers

Category: CAS-001 (v.1)

Exam CAS-001: CompTIA Advanced Security Practitioner (update May 17th, 2015)

Which of the following BEST describes the application issue?

Joe, a hacker, has discovered he can specifically craft a webpage that when viewed in a browser
crashes the browser and then allows him to gain remote code execution in the context of the
victim’s privilege level. The browser crashes due to an exception error when a heap memory that
is unused is accessed. Which of the following BEST describes the application issue?

Which of the following are of MOST concern?

A large hospital has implemented BYOD to allow doctors and specialists the ability to access
patient medical records on their tablets. The doctors and specialists access patient records over
the hospital’s guest WiFi network which is isolated from the internal network with appropriate
security controls. The patient records management system can be accessed from the guest
network and requires two factor authentication. Using a remote desktop type interface, the doctors
and specialists can interact with the hospital’s system. Cut and paste and printing functions are
disabled to prevent the copying of data to BYOD devices. Which of the following are of MOST
concern? (Select TWO).

Which of the following security activities should be implemented as part of the SDL in order to provide the MO

A company is in the process of implementing a new front end user interface for its customers, the
goal is to provide them with more self service functionality. The application has been written by
developers over the last six months and the project is currently in the test phase.
Which of the following security activities should be implemented as part of the SDL in order to
provide the MOST security coverage over the solution? (Select TWO).

Which of the following are the MOST appropriate security activities to be performed as part of due diligence?

A company is in the process of outsourcing its customer relationship management system to a
cloud provider. It will host the entire organization’s customer database. The database will be
accessed by both the company’s users and its customers. The procurement department has
asked what security activities must be performed for the deal to proceed. Which of the following
are the MOST appropriate security activities to be performed as part of due diligence? (Select
TWO).

Which of the following techniques, if implemented in the code, would be the MOST effective in protecting the f

A developer is determining the best way to improve security within the code being developed. The
developer is focusing on input fields where customers enter their credit card details. Which of the
following techniques, if implemented in the code, would be the MOST effective in protecting the
fields from malformed input?

Which of the following should the organization require as part of the contract to ensure the protection of the

An organization is finalizing a contract with a managed security services provider (MSSP) that is
responsible for primary support of all security technologies. Which of the following should the
organization require as part of the contract to ensure the protection of the organization’s
technology?

which of the following is the aggregate security categorization of the database server?

An administrator is trying to categorize the security impact of a database server in the case of a
security event. There are three databases on the server.
Current Financial Data = High level of damage if data is disclosed. Moderate damage if the system
goes offline
Archived Financial Data = No need for the database to be online. Low damage for integrity loss
Public Website Data = Low damage if the site goes down. Moderate damage if the data is
corrupted
Given these security categorizations of each database, which of the following is the aggregate
security categorization of the database server?


Page 42 of 50« First...102030...4041424344...50...Last »