PrepAway - Latest Free Exam Questions & Answers

Tag: Exam CAS-001 (update May 17th, 2015)

Exam CAS-001: CompTIA Advanced Security Practitioner (update May 17th, 2015)

which of the following tools should the helpdesk manager use to make the staff more effective at troubleshooti

The helpdesk manager wants to find a solution that will enable the helpdesk staff to better serve
company employees who call with computer-related problems. The helpdesk staff is currently
unable to perform effective troubleshooting and relies on callers to describe their technology
problems. Given that the helpdesk staff is located within the company headquarters and 90% of
the callers are telecommuters, which of the following tools should the helpdesk manager use to
make the staff more effective at troubleshooting while at the same time reducing company costs?
(Select TWO).

Which of the following approaches presents the MOST risk to the security assessment?

A security manager has started a new job and has identified that a key application for a new client
does not have an accreditation status and is currently not meeting the compliance requirement for

the contract’s SOW. The security manager has competing priorities and wants to resolve this issue
quickly with a system determination and risk assessment. Which of the following approaches
presents the MOST risk to the security assessment?

Which of the following is the BEST strategy to minimize the frequency of these requests?

A security administrator was recently hired in a start-up company to represent the interest of
security and to assist the network team in improving security in the company. The sales team is
continuously contacting the security administrator to answer security questions posed by potential
customers/clients. Which of the following is the BEST strategy to minimize the frequency of these
requests?

which of the following would BEST help the CIO meet the requirements?

The Chief Information Officer (CIO) is focused on improving IT governance within the organization
to reduce system downtime. The CIO has mandated that the following improvements be
implemented:

-All business units must now identify IT risks and include them in their business risk profiles.
-Key controls must be identified and monitored.
-Incidents and events must be recorded and reported with management oversight.
-Exemptions to the information security policy must be formally recorded, approved, and
managed.
-IT strategy will be reviewed to ensure it is aligned with the businesses strategy and objectives.
In addition to the above, which of the following would BEST help the CIO meet the requirements?

Which of the following additional controls should be implemented to prevent data loss?

An organization has decided to reduce labor costs by outsourcing back office processing of credit
applications to a provider located in another country. Data sovereignty and privacy concerns
raised by the security team resulted in the third-party provider only accessing and processing the
data via remote desktop sessions. To facilitate communications and improve productivity, staff at
the third party has been provided with corporate email accounts that are only accessible via the
remote desktop sessions. Email forwarding is blocked and staff at the third party can only
communicate with staff within the organization. Which of the following additional controls should
be implemented to prevent data loss? (Select THREE).

Which of the following software development methods is MOST applicable?

A company has received the contract to begin developing a new suite of software tools to replace
an aging collaboration solution. The original collaboration solution has been in place for nine
years, contains over a million lines of code, and took over two years to develop originally. The
SDLC has broken the primary delivery stages into eight different deliverables, with each section
requiring an in-depth risk analysis before moving on to the next phase. Which of the following
software development methods is MOST applicable?

Which of the following departments are the MOST heavily invested in rectifying the problem?

An intruder was recently discovered inside the data center, a highly sensitive area. To gain
access, the intruder circumvented numerous layers of physical and electronic security measures.
Company leadership has asked for a thorough review of physical security controls to prevent this
from happening again. Which of the following departments are the MOST heavily invested in

rectifying the problem? (Select THREE).

Which of the following questions is the MOST important?

The helpdesk department desires to roll out a remote support application for internal use on all
company computers. This tool should allow remote desktop sharing, system log gathering, chat,
hardware logging, inventory management, and remote registry access. The risk management
team has been asked to review vendor responses to the RFQ. Which of the following questions is
the MOST important?

Which of the following development methodologies involves daily stand-ups designed to improve communication?

A software development manager is taking over an existing software development project. The
team currently suffers from poor communication, and this gap is resulting in an above average
number of security-related bugs making it into production. Which of the following development
methodologies involves daily stand-ups designed to improve communication?


Page 49 of 50« First...102030...4647484950