PrepAway - Latest Free Exam Questions & Answers

Category: CAS-001 (v.1)

Exam CAS-001: CompTIA Advanced Security Practitioner (update May 17th, 2015)

Which of the following provides the MOST secure method of integrating the non-compliant clients into the netwo

An organization recently upgraded its wireless infrastructure to support WPA2 and requires all
clients to use this method. After the upgrade, several critical wireless clients fail to connect
because they are only WEP compliant. For the foreseeable future, none of the affected clients
have an upgrade path to put them into compliance with the WPA2 requirement. Which of the
following provides the MOST secure method of integrating the non-compliant clients into the
network?

Which of the following policies should the CISO implement to reduce the risk?

The Chief Information Security Officer (CISO) is researching ways to reduce the risk associated
with administrative access of six IT staff members while enforcing separation of duties. In the case
where an IT staff member is absent, each staff member should be able to perform all the
necessary duties of their IT co-workers. Which of the following policies should the CISO implement
to reduce the risk?

Which of the following should appear in the primary DNS configuration file to accomplish this?

A company has a primary DNS server at address 192.168.10.53 and a secondary server at
192.168.20.53. An administrator wants to secure a company by only allowing secure zone
transfers to the secondary server. Which of the following should appear in the primary DNS
configuration file to accomplish this?

Which of the following security practices would allow for non-repudiation and prevent network sniffers from re

An employee of a company files a complaint with a security administrator. While sniffing network
traffic, the employee discovers that financially confidential emails were passing between two
warehouse users. The two users deny sending confidential emails to each other. Which of the
following security practices would allow for non-repudiation and prevent network sniffers from
reading the confidential mail? (Select TWO).

Which of the following are supported authentication or encryption methods to use while implementing this?

An administrator wants to integrate the Credential Security Support Provider (CredSSP) protocol
network level authentication (NLA) into the remote desktop terminal services environment. Which
of the following are supported authentication or encryption methods to use while implementing
this? (Select THREE).

Which of the following network design considerations should the consultant consider?

A systems security consultant is hired by Corporation X to analyze the current enterprise network
environment and make recommendations for increasing network security. It is the consultant’s first
day on the job. Which of the following network design considerations should the consultant
consider? (Select THREE).

Given the below groups and tasks select the BEST list of assignments.

The Chief Executive Officer (CEO) has asked a security project manager to provide
recommendations on the breakout of tasks for the development of a new product. The CEO thinks
that by assigning areas of work appropriately the overall security of the product will be increased,
because staff will focus on their areas of expertise. Given the below groups and tasks select the
BEST list of assignments.
Groups: Networks, Development, Project Management, Security, Systems Engineering, Testing
Tasks: Decomposing requirements, Secure coding standards, Code stability, Functional validation,
Stakeholder engagement, Secure transport


Page 12 of 50« First...1011121314...203040...Last »