Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

2021 BEST CASP+ EXAM CAS-003 STUDY(Updated on up to question 427 )

Beoordeling
-
Verkocht
-
Pagina's
137
Cijfer
A+
Geüpload op
20-08-2022
Geschreven in
2022/2023

Large multinational organization wants to improve elasticity and resource usage of hardware that is housing on-premise critical internal services. Private cloud with IaaS Collection of organizations in the same industry vertical developing services based on a common application stack. Community cloud with PaaS 00:12 01:11 Organization that has an orchestration but that integrates with a large on-premise footprint, subscribing to a small amount of external software services and starting to move workloads to a variety of other cloud models. Hybrid cloud Marketing organization that outsources email delivery to an online provider. Public cloud with SaaS Organization that has migrated their highly customized external websites into the cloud. Public cloud with PaaS Where users are attached to the corporate network, single sign-on will be utilized Kerberos Authentication to cloud-based corporate portals will feature single sign-on SAML Any infrastructure portal will require time-based authentication OTP Customers will have delegated access to multiple digital services oAuth A company's Chief Operating Officer (COO) is concerned about the potential for competitors to infer proprietary information gathered from employees' social media accounts. Which of the following methods should the company use to gauge its own social media threat level without targeting individual employees? A. Utilize insider threat consultants to provide expertise. B. Require that employees divulge social media accounts. C. Leverage Big Data analytical algorithms. D. Perform social engineering tests to evaluate employee awareness. A The DB server can only be managed from NIC3 via RDP from the sysadmin 10.100.2.0/24 network Permit TCP from 10.100.2.0/24 to 172.16.0.20/32 port 3389 The web server in the 10.10.10.0/25 network should connect to the DB via NIC1 Permit TCP from 10.10.10.0/25 to 192.168.1.20/24 port 1433 The backup server at 172.30.10.3 should perform BD backups by connecting via the 192.168.1.0/24 network Permit IP from 172.30.10.3 to 192.168.1.20 The DB server should not initiate outbound connections on NIC2 Deny IP from 10.0.10.20 to ANY A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following security requirements: The data is for internal consumption only and shall not be distributed to outside individuals The systems administrator should not have access to the data processed by the server The integrity of the kernel image is maintained Which of the following host-based security controls BEST enforce the data owner's requirements? (Choose three.) A. SELinux B. DLP C. HIDS D. Host-based firewall E. Measured boot F. Data encryption G. Watermarking BEF An SQL database is no longer accessible online due to a recent security breach. An investigation reveals that unauthorized access to the database was possible due to an SQL injection vulnerability. To prevent this type of breach in the future, which of the following security controls should be put in place before bringing the database back online? (Choose two.) A. Secure storage policies B. Browser security updates C. Input validation D. Web application firewall E. Secure coding standards F. Database activity monitoring CD A company has entered into a business agreement with a business partner for managed human resources services. The Chief Information Security Officer (CISO) has been asked to provide documentation that is required to set up a business-to-business VPN between the two organizations. Which of the following is required in this scenario? A. ISA B. BIA C. SLA D. RA A Given the following output from a local PC: C:ipconfig Windows IP Configuration Wireless LAN adapter Wireless Network Connection: Connection-specific DNS Suffix . : Link-local IPv6 Address....... : fe80::4551:67ba:77a6:62e1%11 IPv4 Address............................. : 172.30.0.28 Subnet Mask.............................. : 255.255.0.0 Default Gateway....................... : 172.30.0.5 C: Which of the following ACLs on a stateful host-based firewall would allow the PC to serve an intranet website? A. Allow 172.30.0.28:80 - ANY B. Allow 172.30.0.28:80 - 172.30.0.0/16 C. Allow 172.30.0.28:80 - 172.30.0.28:443 D. Allow 172.30.0.28:80 - 172.30.0.28:53 B A penetration tester has been contracted to conduct a physical assessment of a site. Which of the following is the MOST plausible method of social engineering to be conducted during this engagement? A. Randomly calling customer employees and posing as a help desk technician requiring user password to resolve issues B. Posing as a copier service technician and indicating the equipment had ג€phoned homeג€ to alert the technician for a service call C. Simulating an illness while at a client location for a sales call and then recovering once listening devices are installed D. Obtaining fake government credentials and impersonating law enforcement to gain access to a company facility B A penetration tester is conducting an assessment on C and runs the following command from a coffee shop while connected to the public Internet: C:nslookup -querytype=MX Server: Unknown Address: 198.51.100.45 MX preference=10, mail exchanger = 92.68.102.33 MX preference=20, mail exchanger = Internet address = 192.168.102.67 Which of the following should the penetration tester conclude about the command output? A. The public/private views on the C DNS servers are misconfigured B. C is running an older mail server, which may be vulnerable to exploits C. The DNS SPF records have not been updated for C D. 192.168.102.67 is a backup mail server that may be more vulnerable to attack D Two new technical SMB security settings have been enforced and have also become policies that increase secure communications. Network Client: Digitally sign communication Network Server: Digitally sign communication A storage administrator in a remote location with a legacy storage array, which contains time-sensitive data, reports employees can no longer connect to their department shares. Which of the following mitigation strategies should an information security manager recommend to the data owner? A. Accept the risk, reverse the settings for the remote location, and have the remote location file a risk exception until the legacy storage device can be upgraded B. Accept the risk for the remote location, and reverse the settings indefinitely since the legacy storage device will not be upgraded C. Mitigate the risk for the remote location by suggesting a move to a cloud service provider. Have the remote location request an indefinite risk exception for the use of cloud storage D. Avoid the risk, leave the settings alone, and decommission the legacy storage device A

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

2021 BEST CASP+ EXAM CAS-003
STUDY
Large multinational organization wants to improve elasticity and resource usage of
hardware that is housing on-premise critical internal services. - Answer Private cloud
with IaaS

Collection of organizations in the same industry vertical developing services based on a
common application stack. - Answer Community cloud with PaaS

Organization that has an orchestration but that integrates with a large on-premise
footprint, subscribing to a small amount of external software services and starting to
move workloads to a variety of other cloud models. - Answer Hybrid cloud

Marketing organization that outsources email delivery to an online provider. - Answer
Public cloud with SaaS

Organization that has migrated their highly customized external websites into the cloud.
- Answer Public cloud with PaaS

Where users are attached to the corporate network, single sign-on will be utilized -
Answer Kerberos

Authentication to cloud-based corporate portals will feature single sign-on - Answer
SAML

Any infrastructure portal will require time-based authentication - Answer OTP

Customers will have delegated access to multiple digital services - Answer oAuth

A company's Chief Operating Officer (COO) is concerned about the potential for
competitors to infer proprietary information gathered from employees' social media
accounts.

Which of the following methods should the company use to gauge its own social media
threat level without targeting individual employees?

A. Utilize insider threat consultants to provide expertise.
B. Require that employees divulge social media accounts.
C. Leverage Big Data analytical algorithms.
D. Perform social engineering tests to evaluate employee awareness. - Answer A

,The DB server can only be managed from NIC3 via RDP from the sysadmin
10.100.2.0/24 network - Answer Permit TCP from 10.100.2.0/24 to 172.16.0.20/32 port
3389

The web server in the 10.10.10.0/25 network should connect to the DB via NIC1 -
Answer Permit TCP from 10.10.10.0/25 to 192.168.1.20/24 port 1433

The backup server at 172.30.10.3 should perform BD backups by connecting via the
192.168.1.0/24 network - Answer Permit IP from 172.30.10.3 to 192.168.1.20

The DB server should not initiate outbound connections on NIC2 - Answer Deny IP from
10.0.10.20 to ANY

A security administrator is hardening a TrustedSolaris server that processes sensitive
data. The data owner has established the following security requirements:

✑ The data is for internal consumption only and shall not be distributed to outside
individuals
✑ The systems administrator should not have access to the data processed by the
server
✑ The integrity of the kernel image is maintained

Which of the following host-based security controls BEST enforce the data owner's
requirements? (Choose three.)

A. SELinux
B. DLP
C. HIDS
D. Host-based firewall
E. Measured boot
F. Data encryption
G. Watermarking - Answer BEF

An SQL database is no longer accessible online due to a recent security breach. An
investigation reveals that unauthorized access to the database was possible due to an
SQL injection vulnerability.

To prevent this type of breach in the future, which of the following security controls
should be put in place before bringing the database back online? (Choose two.)

A. Secure storage policies
B. Browser security updates
C. Input validation
D. Web application firewall
E. Secure coding standards
F. Database activity monitoring - Answer CD

,A company has entered into a business agreement with a business partner for
managed human resources services. The Chief Information Security Officer (CISO) has
been asked to provide documentation that is required to set up a business-to-business
VPN between the two organizations.

Which of the following is required in this scenario?

A. ISA
B. BIA
C. SLA
D. RA - Answer A

Given the following output from a local PC:

C:\>ipconfig
Windows IP Configuration

Wireless LAN adapter Wireless Network Connection:
Connection-specific DNS Suffix . : comptia.org
Link-local IPv6 Address....... : fe80::4551:67ba:77a6:62e1%11
IPv4 Address............................. : 172.30.0.28
Subnet Mask.............................. : 255.255.0.0
Default Gateway....................... : 172.30.0.5
C:\>

Which of the following ACLs on a stateful host-based firewall would allow the PC to
serve an intranet website?

A. Allow 172.30.0.28:80 -> ANY
B. Allow 172.30.0.28:80 -> 172.30.0.0/16
C. Allow 172.30.0.28:80 -> 172.30.0.28:443
D. Allow 172.30.0.28:80 -> 172.30.0.28:53 - Answer B

A penetration tester has been contracted to conduct a physical assessment of a site.

Which of the following is the MOST plausible method of social engineering to be
conducted during this engagement?

A. Randomly calling customer employees and posing as a help desk technician
requiring user password to resolve issues

B. Posing as a copier service technician and indicating the equipment had ‫ג‬€phoned
home‫ג‬€ to alert the technician for a service call

, C. Simulating an illness while at a client location for a sales call and then recovering
once listening devices are installed

D. Obtaining fake government credentials and impersonating law enforcement to gain
access to a company facility - Answer B

A penetration tester is conducting an assessment on Comptia.org and runs the following
command from a coffee shop while connected to the public Internet:

C:\>nslookup -querytype=MX comptia.org
Server: Unknown
Address: 198.51.100.45

comptia.org MX preference=10, mail exchanger = 92.68.102.33
comptia.org MX preference=20, mail exchanger = exchg1.comptia.org
exchg1.comptia.org Internet address = 192.168.102.67


Which of the following should the penetration tester conclude about the command
output?

A. The public/private views on the Comptia.org DNS servers are misconfigured
B. Comptia.org is running an older mail server, which may be vulnerable to exploits
C. The DNS SPF records have not been updated for Comptia.org
D. 192.168.102.67 is a backup mail server that may be more vulnerable to attack -
Answer D

Two new technical SMB security settings have been enforced and have also become
policies that increase secure communications.

Network Client: Digitally sign communication
Network Server: Digitally sign communication

A storage administrator in a remote location with a legacy storage array, which contains
time-sensitive data, reports employees can no longer connect to their department
shares.


Which of the following mitigation strategies should an information security manager
recommend to the data owner?

A. Accept the risk, reverse the settings for the remote location, and have the remote
location file a risk exception until the legacy storage device can be upgraded
B. Accept the risk for the remote location, and reverse the settings indefinitely since the
legacy storage device will not be upgraded

Geschreven voor

Vak

Documentinformatie

Geüpload op
20 augustus 2022
Aantal pagina's
137
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$20.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EvaTee Phoenix University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5226
Lid sinds
4 jaar
Aantal volgers
3570
Documenten
56039
Laatst verkocht
1 dag geleden
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

952 beoordelingen

5
453
4
167
3
174
2
48
1
110

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen