PrepAway - Latest Free Exam Questions & Answers

Tag: Exam CAS-002 (update May 22th, 2017)

Exam CAS-002 : CompTIA Advanced Security Practitioner (update May 22th, 2017)

Which of the following solutions would allow the users …

VPN users cannot access the active FTP server through the router but can access any server in the data
center. Additional network information:DMZ network 192.168.5.0/24 (FTP server is 192.168.5.11) VPN network 192.168.1.0/24 Datacenter –
192.168.2.0/24 User network – 192.168.3.0/24 HR network 192.168.4.0/24\\ Traffic shaper configuration: VLAN
Bandwidth Limit (Mbps) VPN50 User175 HR250
Finance250 Guest0
Router ACL: ActionSourceDestination Permit192.168.1.0/24192.168.2.0/24
Permit192.168.1.0/24192.168.3.0/24 Permit192.168.1.0/24192.168.5.0/24 Permit192.168.2.0/24192.168.1.0/24
Permit192.168.3.0/24192.168.1.0/24 Permit192.168.5.1/32192.168.1.0/24 Deny192.168.4.0/24192.168.1.0/24
Deny192.168.1.0/24192.168.4.0/24
Denyanyany
Which of the following solutions would allow the users to access the active FTP server?

Which of the following components should be used to ach…

An educational institution would like to make computer labs available to remote students. The labs are used for
various IT networking, security, and programming courses. The requirements are:
1. Each lab must be on a separate network segment.
2. Labs must have access to the Internet, but not other lab networks.
3. Student devices must have network access, not simple access to hosts on the lab networks.
4. Students must have a private certificate installed before gaining access.
5. Servers must have a private certificate installed locally to provide assurance to the students.
6. All students must use the same VPN connection profile. Which of the following components should be used
to achieve the design in conjunction with directory services?

Company A has noticed abnormal behavior targeting their SQL server on the network

CORRECT TEXT
Company A has noticed abnormal behavior targeting their SQL server on the network from a rogue IP address.
The company uses the following internal IP address ranges: 192.10.1.0/24 for the corporate site and
192.10.2.0/24 for the remote site. The Telco router interface uses the 192.10.5.0/30 IP range. Instructions:
Click on the simulation button to refer to the Network Diagram for Company A. Click on Router 1, Router 2, and
the Firewall to evaluate and configure each device.
Task 1: Display and examine the logs and status of Router 1, Router 2, and Firewall interfaces. Task 2:
Reconfigure the appropriate devices to prevent the attacks from continuing to target the SQL server and other
servers on the corporate network.

Compliance with company policy requires a quarterly review of firewall rules.

CORRECT TEXT
Compliance with company policy requires a quarterly review of firewall rules. A new administrator is asked to
conduct this review on the internal firewall sitting between several Internal networks. The intent of this firewall is
to make traffic more restrictive. Given the following information answer the questions below: User Subnet:
192.168.1.0/24 Server Subnet: 192.168.2.0/24 Finance Subnet:192.168.3.0/24 Instructions: To perform the
necessary tasks, please modify the DST port, Protocol, Action, and/or Rule Order columns. Firewall ACLs are
read from the top down Task 1) An administrator added a rule to allow their machine terminal server access to
the server subnet. This rule is not working. Identify the rule and correct this issue. Task 2) All web servers have
been changed to communicate solely over SSL. Modify the
appropriate rule to allow communications.
Task 3) An administrator added a rule to block access to the SQL server from anywhere on the network. This
rule is not working. Identify and correct this issue. Task 4) Other than allowing all hosts to do network time and
SSL, modify a rule to ensure that no other traffic is allowed.

The security administrator instead suggests that the de…

A recently hired security administrator is advising developers about the secure integration of a legacy in-house
application with a new cloud based processing system. The systems must exchange large amounts of fixed
format data such as names, addresses, and phone numbers, as well as occasional chunks of data in
unpredictable formats. The developers want to construct anew data format and create custom tools to parse and process the data. The security administrator instead
suggests that the developers:

Which of the following is the correct asset value calcu…

An accountant at a small business is trying to understand the value of a server to determine if the business canafford to buy another server for DR. The risk manager only provided the accountant with the SLE of $24,000,
ARO of 20% and the exposure factor of 25%. Which of the following is the correct asset value calculated by the
accountant?

Which of the following security controls will MOST like…

Wireless users are reporting issues with the company’s video conferencing and VoIP systems. The security
administrator notices internal DoS attacks from infected PCs on the network causing the VoIP system to drop
calls. The security administrator also notices that the SIP servers are unavailable during these attacks. Which
of the following security controls will MOST likely mitigate the VoIP DoS attacks on the network? (Select TWO).


Page 9 of 40« First...7891011...203040...Last »