PrepAway - Latest Free Exam Questions & Answers

Category: CAS-001 (v.1)

Exam CAS-001: CompTIA Advanced Security Practitioner (update May 17th, 2015)

Which of the following would the security engineer MOST likely recommend based on the table?

— Exhibit –-

— Exhibit —
Company management has indicated that instant messengers (IM) add to employee productivity.
Management would like to implement an IM solution, but does not have a budget for the project.
The security engineer creates a feature matrix to help decide the most secure product. Click on
the Exhibit button.

Which of the following would the security engineer MOST likely recommend based on the table?

Which of the following should the administrator perform to allow the program to be installed?

An administrator attempts to install the package “named.9.3.6-12-x86_64.rpm” on a server. Even
though the package was downloaded from the official repository, the server states the package
cannot be installed because no GPG key is found. Which of the following should the administrator
perform to allow the program to be installed?

Which compliance category would this task be part of?

A medium-sized company has recently launched an online product catalog. It has decided to keep
the credit card purchasing in-house as a secondary potential income stream has been identified in
relation to sales leads. The company has decided to undertake a PCI assessment in order to
determine the amount of effort required to meet the business objectives. Which compliance
category would this task be part of?

Which of the following approaches would the network security administrator for Company XYZ MOST likely proceed

Company XYZ recently acquired a manufacturing plant from Company ABC which uses a different
manufacturing ICS platform. Company XYZ has strict ICS security regulations while Company
ABC does not. Which of the following approaches would the network security administrator for
Company XYZ MOST likely proceed with to integrate the new manufacturing plant?

Which of the following should the security administrator do to ensure the firewall platform is appropriate for

An Association is preparing to upgrade their firewalls at five locations around the United States.
Each of the three vendor’s RFP responses is in-line with the security and other requirements.
Which of the following should the security administrator do to ensure the firewall platform is
appropriate for the Association?

Based on this information, the following tasks should be completed:

CORRECT TEXT
The IDS has detected abnormal behavior on this network. Click on the network devices to view
device information. Based on this information, the following tasks should be completed:
1. Select the server that is a victim of a cross-site scripting (XSS) attack.
2 Select the source of the brute force password attack.
3. Modify the access control list (ACL) on the router(s) to ONLY block the XSS attack.
Instructions: Simulations can be reset at anytime to the initial state: however, all selections will be deleted



Page 35 of 50« First...102030...3334353637...4050...Last »