PrepAway - Latest Free Exam Questions & Answers

Tag: Exam CAS-001 (update May 17th, 2015)

Exam CAS-001: CompTIA Advanced Security Practitioner (update May 17th, 2015)

Which of the following tools would a security engineer use to make sure the DNS server is listening on port 53

The security engineer receives an incident ticket from the helpdesk stating that DNS lookup
requests are no longer working from the office. The network team has ensured that Layer 2 and
Layer 3 connectivity are working. Which of the following tools would a security engineer use to
make sure the DNS server is listening on port 53?

which part of the incident response phase would this be addressed in a controlled and productive manner?

A large organization has recently suffered a massive credit card breach. During the months of
Incident Response, there were multiple attempts to assign blame as to whose fault it was that the
incident occurred. In which part of the incident response phase would this be addressed in a
controlled and productive manner?

which of the following types of IPS products would be BEST suited for use in this situation?

The IT manager is evaluating IPS products to determine which would be most effective at stopping
network traffic that contains anomalous content on networks that carry very specific types of traffic.
Based on the IT manager’s requirements, which of the following types of IPS products would be
BEST suited for use in this situation?

Which of the following is the MOST cost effective way to mitigate such a risk?

A Chief Information Security Officer (CISO) is approached by a business unit manager who heard
a report on the radio this morning about an employee at a competing firm who shipped a VPN
token overseas so a fake employee could log into the corporate VPN. The CISO asks what can be
done to mitigate the risk of such an incident occurring within the organization. Which of the
following is the MOST cost effective way to mitigate such a risk?

Which of the following security considerations should be added to the design?

Two universities are making their 802.11n wireless networks available to the other university’s
students. The infrastructure will pass the student’s credentials back to the home school for
authentication via the Internet.

The requirements are:
Mutual authentication of clients and authentication server
The design should not limit connection speeds
Authentication must be delegated to the home school
No passwords should be sent unencrypted
The following design was implemented:
WPA2 Enterprise using EAP-PEAP-MSCHAPv2 will be used for wireless security
RADIUS proxy servers will be used to forward authentication requests to the home school
The RADIUS servers will have certificates from a common public certificate authority
A strong shared secret will be used for RADIUS server authentication
Which of the following security considerations should be added to the design?

Which of the following best practices has MOST likely been overlooked in the agile implementation?

A company has decided to move to an agile software development methodology. The company
gives all of its developers security training. After a year of agile, a management review finds that
the number of items on a vulnerability scan has actually increased since the methodology change.
Which of the following best practices has MOST likely been overlooked in the agile
implementation?


Page 46 of 50« First...102030...4445464748...Last »