PrepAway - Latest Free Exam Questions & Answers

Category: CAS-001 (v.1)

Exam CAS-001: CompTIA Advanced Security Practitioner (update May 17th, 2015)

Which of the following policies, when implemented, would allow the company to audit this employee’s work

Every year, the accounts payable employee, Ann, takes a week off work for a vacation. She
typically completes her responsibilities remotely during this week. Which of the following policies,
when implemented, would allow the company to audit this employee’s work and potentially
discover improprieties?

Which of the following techniques should the consultant use to discover the source of the information leaks?

A security consultant is investigating acts of corporate espionage within an organization. Each
time the organization releases confidential information to high-ranking engineers, the information
is soon leaked to competing companies. Which of the following techniques should the consultant
use to discover the source of the information leaks?

Which of the following risk strategies did the CISO implement?

The Chief Information Security Officer (CISO) at a company knows that many users store
business documents on public cloud-based storage; and realizes this is a risk to the company. In
response, the CISO implements a mandatory training course in which all employees are instructed
on the proper use of cloud-based storage. Which of the following risk strategies did the CISO
implement?

Which of the following explains this?

A security administrator is investigating the compromise of a software distribution website.
Forensic analysis shows that several popular files are infected with malicious code. However,
comparing a hash of the infected files with the original, non-infected files which were restored from
backup, shows that the hash is the same. Which of the following explains this?

Which of the following policies MUST be reviewed to address future compliance?

A court order has ruled that your company must surrender all the email sent and received by a
certain employee for the past five years. After reviewing the backup systems, the IT administrator
concludes that email backups are not kept that long. Which of the following policies MUST be

reviewed to address future compliance?

Which of the following should the Information Technology department implement to reduce the security risk from

The risk manager is reviewing a report which identifies a requirement to keep a business critical
legacy system operational for the next two years. The legacy system is out of support because the
vendor and security patches are no longer released. Additionally, this is a proprietary embedded
system and little is documented and known about it. Which of the following should the Information
Technology department implement to reduce the security risk from a compromise of this system?

How should the employees request access to shared resources before the authentication integration is complete?

Two separate companies are in the process of integrating their authentication infrastructure into a
unified single sign-on system. Currently, both companies use an AD backend and two factor
authentication using TOTP. The system administrators have configured a trust relationship
between the authentication backend to ensure proper process flow. How should the employees
request access to shared resources before the authentication integration is complete?


Page 43 of 50« First...102030...4142434445...50...Last »