PrepAway - Latest Free Exam Questions & Answers

Tag: Briefing CAS-002 (update December 14th, 2017)

Briefing CAS-002 : CompTIA Advanced Security Practitioner (update December 14th, 2017)

Which of the following solutions minimizes the performa…

Due to a new regulatory requirement, ABC Company must now encrypt all WAN transmissions. When speaking
with the network administrator, the security administrator learns that the existing routers have the minimum
processing power to do the required level of encryption. Which of the following solutions minimizes the
performance impact on the router?

Which of the following BEST describes the core concerns…

Company XYZ provides hosting services for hundreds of companies across multiple industries including
healthcare, education, and manufacturing. The security architect for company XYZ is reviewing a vendor
proposal to reduce company XYZ’s hardware costs by combining multiple physical hosts through the use of
virtualization technologies. The security architect notes concerns about data separation, confidentiality,
regulatory requirements concerning PII, and administrative complexity on the proposal. Which of the following
BEST describes the core concerns of the security architect?

which of the following scenarios should they consider?

A forensic analyst works for an e-discovery firm where several gigabytes of data are processed daily. While the
business is lucrative, they do not have the resources or the scalability to adequately serve their clients. Since it
is an e-discovery firm where chain of custody is important, which of the following scenarios should they
consider?

Which of the following has been overlooked in securing …

An extensible commercial software system was upgraded to the next minor release version to patch a security
vulnerability. After the upgrade, an unauthorized intrusion into the system was detected. The software vendor is
called in to troubleshoot the issue and reports that all core components were updated properly. Which of the
following has been overlooked in securing the system? (Select TWO).

Which of the following should the Information Technolog…

The risk manager is reviewing a report which identifies a requirement to keep a business critical legacy systemoperational for the next two years. The legacy system is out of support because the vendor and security
patches are no longer released. Additionally, this is a proprietary embedded system and little is documented
and known about it. Which of the following should the Information Technology department implement to reduce
the security risk from a compromise of this system?


Page 14 of 24« First...1213141516...20...Last »