PrepAway - Latest Free Exam Questions & Answers

Category: CAS-001 (v.1)

Exam CAS-001: CompTIA Advanced Security Practitioner (update May 17th, 2015)

Which of the following should the security administrator implement?

A security audit has uncovered that some of the encryption keys used to secure the company B2B
financial transactions with its partners may be too weak. The security administrator needs to
implement a process to ensure that financial transactions will not be compromised if a weak
encryption key is found. Which of the following should the security administrator implement?

Which of the following has MOST likely occurred?

A company provides on-demand virtual computing for a sensitive project. The company
implements a fully virtualized datacenter and terminal server access with two-factor authentication
for access to sensitive data. The security administrator at the company has uncovered a breach in
data confidentiality. Sensitive data was found on a hidden directory within the hypervisor. Which of
the following has MOST likely occurred?

Which of the following solutions is BEST suited for this scenario?

Company XYZ provides residential television cable service across a large region.

The company’s board of directors is in the process of approving a deal with the following three
companies:
A National landline telephone provider
A Regional wireless telephone provider
An international Internet service provider
The board of directors at Company XYZ wants to keep the companies and billing separated.
While the Chief Information Officer (CIO) at Company XYZ is concerned about the confidentiality
of Company XYZ’s customer data and wants to share only minimal information about its
customers for the purpose of accounting, billing, and customer authentication.
The proposed solution must use open standards and must make it simple and seamless for
Company XYZ’s customers to receive all four services.
Which of the following solutions is BEST suited for this scenario?

Which of the following solutions will MOST likely mitigate this type of attack?

The security administrator at a bank is receiving numerous reports that customers are unable to
login to the bank website. Upon further investigation, the security administrator discovers that the
name associated with the bank website points to an unauthorized IP address.
Which of the following solutions will MOST likely mitigate this type of attack?

Which of the following will BEST protect the data on the virtual machines from an attack?

A security administrator has finished building a Linux server which will host multiple virtual
machines through hypervisor technology. Management of the Linux server, including monitoring
server performance, is achieved through a third party web enabled application installed on the
Linux server. The security administrator is concerned about vulnerabilities in the web application
that may allow an attacker to retrieve data from the virtual machines.
Which of the following will BEST protect the data on the virtual machines from an attack?

Which of the following can the government agency deploy to meet future security needs?

A breach at a government agency resulted in the public release of top secret information. The
Chief Information Security Officer has tasked a group of security professionals to deploy a system
which will protect against such breaches in the future.
Which of the following can the government agency deploy to meet future security needs?

Which of the following should be the Information Security Officer’s (ISO’s) recommendation?

The internal auditor at Company ABC has completed the annual audit of the company’s financial
system. The audit report indicates that the accounts receivable department has not followed
proper record disposal procedures during a COOP/BCP tabletop exercise involving manual
processing of financial transactions.
Which of the following should be the Information Security Officer’s (ISO’s) recommendation?
(Select TWO).


Page 1 of 5012345...102030...Last »