December 21, 2024

CompTIA

Online Practice test CompTIA CASP CAS-002 exam questions, 100% real and effective exam questions answers, easy access to CAS-002 dumps enhance your skills and experience, CAS-002 PDF online Download, Meetexams updates valid exam dumps throughout the year for full CAS-002 exam dumps: https://www.leads4pass.com/cas-002.html (Total Questions: 733 Q&A)

[PDF] Free CompTIA CASP CAS-002 pdf dumps download from Google Drive: https://drive.google.com/open?id=1fm0O5FZH2TD4aFhVhdjTexLr1D9SMYCr

[PDF] Free Full CompTIA pdf dumps download from Google Drive: https://drive.google.com/open?id=1cFeWWpiWzsSWZqeuRVlu9NtAcFT4WsiG

(CASP+) Advanced Security Practitioner Certification | CompTIA IT Certifications: https://certification.comptia.org/certifications/comptia-advanced-security-practitioner

Latest effective CompTIA CASP CAS-002 Exam Practice Tests

QUESTION 1
A system administrator needs to develop a policy for when an application server is no longer needed. Which of the
following policies would need to be developed?
A. Backup policy
B. De-provisioning policy
C. Data retention policy
D. Provisioning policy
Correct Answer: C

QUESTION 2
A large organization has gone through several mergers, acquisitions, and de-mergers over the past decade. As a result,
the internal networks have been integrated but have complex dependencies and interactions between systems. Better
integration is needed in order to simplify the underlying complexity. Which of the following is the MOST suitable
integration platform to provide event-driven and standards- based secure software architecture?
A. Service oriented architecture (SOA)
B. Federated identities
C. Object request broker (ORB)
D. Enterprise service bus (ESB)
Correct Answer: D

QUESTION 3
An administrator notices the following file in the Linux server\\’s /tmp directory.
-rwsr-xr-x. 4 root root 234223 Jun 6 22:52 bash*
Which of the following should be done to prevent further attacks of this nature?
A. Never mount the /tmp directory over NFS
B. Stop the rpcidmapd service from running
C. Mount all tmp directories nosuid, noexec
D. Restrict access to the /tmp directory
Correct Answer: C

QUESTION 4
A business wants to start using social media to promote the corporation and to ensure that customers have a good
experience with their products. Which of the following security items should the company have in place before
implementation? (Select TWO).
A. The company must dedicate specific staff to act as social media representatives of the company.
B. All staff needs to be instructed in the proper use of social media in the work environment.
C. Senior staff blogs should be ghost written by marketing professionals.
D. The finance department must provide a cost benefit analysis for social media.
E. The security policy needs to be reviewed to ensure that social media policy is properly implemented.
F. The company should ensure that the company has sufficient bandwidth to allow for social media traffic.
Correct Answer: AE

QUESTION 5
Company XYZ is in negotiations to acquire Company ABC for $1.2millon. Due diligence activities have uncovered
systemic security issues in the flagship product of Company ABC. It has been established that a complete product
rewrite would be needed with average estimates indicating a cost of $1.6millon. Which of the following approaches
should the risk manager of Company XYZ recommend?
A. Transfer the risk
B. Accept the risk
C. Mitigate the risk
D. Avoid the risk
Correct Answer: D

QUESTION 6
CORRECT TEXT
An administrator wants to install a patch to an application. Given the scenario, download, verify and install the patch in
the most secure manner.
Instructions: The last install that is completed will be the final submission.leads4pass cas-002 exam question q6 leads4pass cas-002 exam question q6-1Correct Answer:
Review the for full solution of this exam.
In this case the second link should be used (This may vary in actual exam). The first link showed the following error so it
should not be used. leads4pass cas-002 exam question q6-2

Also, Two of the link choices used HTTP and not HTTPS as shown when hovering over the links as shown: leads4pass cas-002 exam question q6-3

Since we need to do this in the most secure manner possible, they should not be used.
Finally, the second link was used and the MD5 utility of MD5sum should be used on the install.exe file as shown. Make
sure that the hash matches. leads4pass cas-002 exam question q6-4Finally, type in install.exe to install it and make sure there are no signature verification errors.

QUESTION 7
An educational institution would like to make computer labs available to remote students. The labs are used for various
IT networking, security, and programming courses. The requirements are:
1.
Each lab must be on a separate network segment.
2.
Labs must have access to the Internet, but not other lab networks.
3.
Student devices must have network access, not simple access to hosts on the lab networks.
4.
Students must have a private certificate installed before gaining access.
5.
Servers must have a private certificate installed locally to provide assurance to the students.
6.
All students must use the same VPN connection profile.
Which of the following components should be used to achieve the design in conjunction with directory services?
A. L2TP VPN over TLS for remote connectivity, SAML for federated authentication, firewalls between each lab segment
B. SSL VPN for remote connectivity, directory services groups for each lab group, ACLs on routing equipment
C. IPSec VPN with mutual authentication for remote connectivity, RADIUS for authentication, ACLs on network
equipment
D. Cloud service remote access tool for remote connectivity, OAuth for authentication, ACL on routing equipment
Correct Answer: C

QUESTION 8
The security team for Company XYZ has determined that someone from outside the organization has obtained sensitive
information about the internal organization by querying the external DNS server of the company. The security manager
is tasked with making sure this problem does not occur in the future. How would the security manager address this
problem?
A. Implement a split DNS, only allowing the external DNS server to contain information about domains that only the
outside world should be aware, and an internal DNS server to maintain authoritative records for internal systems.
B. Implement a split DNS, only allowing the external DNS server to contain information about internal domain resources
that the outside world would be interested in, and an internal DNS server to maintain authoritative records for internal
systems.
C. Implement a split DNS, only allowing the external DNS server to contain information about domains that only the
outside world should be aware, and an internal DNS server to maintain non-authoritative records for external systems.
D. Implement a split DNS, only allowing the internal DNS server to contain information about domains the outside world
should be aware of, and an external DNS server to maintain authoritative records for internal systems.
Correct Answer: A

QUESTION 9
At 9:00 am each morning, all of the virtual desktops in a VDI implementation become extremely slow and/ or
unresponsive. The outage lasts for around 10 minutes, after which everything runs properly again. The administrator
has traced the problem to a lab of thin clients that are all booted at 9:00 am each morning. Which of the following is the
MOST likely cause of the problem and the BEST solution? (Select TWO).
A. Add guests with more memory to increase capacity of the infrastructure.
B. A backup is running on the thin clients at 9am every morning.
C. Install more memory in the thin clients to handle the increased load while booting.
D. Booting all the lab desktops at the same time is creating excessive I/O.
E. Install 10-Gb uplinks between the hosts and the lab to increase network capacity.
F. Install faster SSD drives in the storage system used in the infrastructure.
G. The lab desktops are saturating the network while booting.
H. The lab desktops are using more memory than is available to the host systems.
Correct Answer: DF

QUESTION 10
A system worth $100,000 has an exposure factor of eight percent and an ARO of four. Which of the following figures is
the system\\’s SLE?
A. $2,000
B. $8,000
C. $12,000
D. $32,000
Correct Answer: B

QUESTION 11
A security architect is assigned to a major software development project. The software development team has a history
of writing bug prone, inefficient code, with multiple security flaws in every release. The security architect proposes
implementing secure coding standards to the project manager. The secure coding standards will contain detailed
standards for:
A. error handling, input validation, memory use and reuse, race condition handling, commenting, and preventing typical
security problems.
B. error prevention, requirements validation, memory use and reuse, commenting typical security problems, and testing
code standards.
C. error elimination, trash collection, documenting race conditions, peer review, and typical security problems.
D. error handling, input validation, commenting, preventing typical security problems, managing customers, and
documenting extra requirements.
Correct Answer: A

QUESTION 12
The senior security administrator wants to redesign the company DMZ to minimize the risks associated with both
external and internal threats. The DMZ design must support security in depth, change management and configuration
processes, and support incident reconstruction. Which of the following designs BEST supports the given requirements?
A. A dual firewall DMZ with remote logging where each firewall is managed by a separate administrator.
B. A single firewall DMZ where each firewall interface is managed by a separate administrator and logging to the cloud.
C. A SaaS based firewall which logs to the company\\’s local storage via SSL, and is managed by the change control
team.
D. A virtualized firewall, where each virtual instance is managed by a separate administrator and logging to the same
hardware.
Correct Answer: A

QUESTION 13
A popular commercial virtualization platform allows for the creation of virtual hardware. To virtual machines, this virtual
hardware is indistinguishable from real hardware. By implementing virtualized TPMs, which of the following trusted
system concepts can be implemented?
A. Software-based root of trust
B. Continuous chain of trust
C. Chain of trust with a hardware root of trust D. Software-based trust anchor with no root of trust
Correct Answer: C

QUESTION 14
An organization uses IP address block 203.0.113.0/24 on its internal network. At the border router, the network
administrator sets up rules to deny packets with a source address in this subnet from entering the network, and to deny
packets with a destination address in this subnet from leaving the network. Which of the following is the administrator
attempting to prevent?
A. BGP route hijacking attacks
B. Bogon IP network traffic
C. IP spoofing attacks
D. Man-in-the-middle attacks
E. Amplified DDoS attacks
Correct Answer: C

QUESTION 15
A bank provides single sign on services between its internally hosted applications and externally hosted CRM. The
following sequence of events occurs:
1.
The banker accesses the CRM system, a redirect is performed back to the organization\\’s internal systems.
2.
A lookup is performed of the identity and a token is generated, signed and encrypted.
3.
A redirect is performed back to the CRM system with the token.
4.
The CRM system validates the integrity of the payload, extracts the identity and performs a lookup.
5.
If the banker is not in the system and automated provisioning request occurs.
6.
The banker is authenticated and authorized and can access the system. This is an example of which of the following?
A. Service provider initiated SAML 2.0
B. Identity provider initiated SAML 1.0
C. OpenID federated single sign on
D. Service provider initiated SAML 1.1
Correct Answer: A

QUESTION 16
The security administrator has just installed an active\passive cluster of two firewalls for enterprise perimeter defense of
the corporate network. Stateful firewall inspection is being used in the firewall implementation. There have been
numerous reports of dropped connections with external clients.
Which of the following is MOST likely the cause of this problem?
A. TCP sessions are traversing one firewall and return traffic is being sent through the secondary firewall and sessions
are being dropped.
B. TCP and UDP sessions are being balanced across both firewalls and connections are being dropped because the
session IDs are not recognized by the secondary firewall.
C. Prioritize UDP traffic and associated stateful UDP session information is traversing the passive firewall causing the
connections to be dropped.
D. The firewall administrator connected a dedicated communication cable between the firewalls in order to share a
single state table across the cluster causing the sessions to be dropped.
Correct Answer: A

QUESTION 17
An internal committee comprised of the facilities manager, the physical security manager, the network administrator,
and a member of the executive team has been formed to address a recent breach at a company\\’s data center. It was
discovered that during the breach, an HVAC specialist had gained entry to an area that contained server farms holding
sensitive financial data. Although the HVAC specialist was there to fix a legitimate issue, the investigation concluded
security be provided for the two entry and exit points for the server farm. Which of the following should be implemented
to accomplish the recommendations of the investigation?
A. Implement a policy that all non-employees should be escorted in the data center.
B. Place a mantrap at the points with biometric security.
C. Hire an HVAC person for the company, eliminating the need for external HVAC people.
D. Implement CCTV cameras at both points.
Correct Answer: B

QUESTION 18
A recently hired security administrator is advising developers about the secure integration of a legacy in- house
application with a new cloud based processing system. The systems must exchange large amounts of fixed format data
such as names, addresses, and phone numbers, as well as occasional chunks of data in unpredictable formats. The
developers want to construct a new data format and create custom tools to parse and process the data. The security
administrator instead suggests that the developers:
A. Create a custom standard to define the data.
B. Use well formed standard compliant XML and strict schemas.
C. Only document the data format in the parsing application code.
D. Implement a de facto corporate standard for all analyzed data.
Correct Answer: B

QUESTION 19
In developing a new computing lifecycle process for a large corporation, the security team is developing the process for
decommissioning computing equipment. In order to reduce the potential for data leakage, which of the following should
the team consider? (Select TWO).
A. Erase all files on drive
B. Install of standard image
C. Remove and hold all drives
D. Physical destruction
E. Drive wipe
Correct Answer: DE

QUESTION 20
An enterprise must ensure that all devices that connect to its networks have been previously approved. The solution
must support dual factor mutual authentication with strong identity assurance. In order to reduce costs and
administrative overhead, the security architect wants to outsource identity proofing and second factor digital delivery to
the third party. Which of the following solutions will address the enterprise requirements?
A. Implementing federated network access with the third party.
B. Using a HSM at the network perimeter to handle network device access.
C. Using a VPN concentrator which supports dual factor via hardware tokens.
D. Implementing 802.1x with EAP-TTLS across the infrastructure.
Correct Answer: D

QUESTION 21
The helpdesk is receiving multiple calls about slow and intermittent Internet access from the finance department. The
following information is compiled:
Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0
Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0
Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0
All callers are connected to the same switch and are routed by a router with five built-in interfaces. The upstream router
interface\\’s MAC is 00-01-42-32-ab-1a
A packet capture shows the following:
09:05:15.934840 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)
09:06:16.124850 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)
09:07:25.439811 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)
09:08:10.937590 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2305, seq 1, length 65534
09:08:10.937591 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2306, seq 2, length 65534
09:08:10.937592 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2307, seq 3, length 65534
Which of the following is occurring on the network?
A. A man-in-the-middle attack is underway on the network.
B. An ARP flood attack is targeting at the router.
C. The default gateway is being spoofed on the network.
D. A denial of service attack is targeting at the router.
Correct Answer: D

QUESTION 22
An administrator receives reports that the network is running slow for users connected to a certain switch. Viewing the
network traffic, the administrator reviews the following:
18:51:59.042108 IP linuxwksta.55467 andgt; dns.company.com.domain: 39462+ PTR? 222.17.4.10.in-addr.arpa. (42)
18:51:59.055732 IP dns.company.com.domain andgt; linuxwksta.55467: 39462 NXDomain 0/0/0 (42)
18:51:59.055842 IP linuxwksta.48287 andgt; dns.company.com.domain: 46767+ PTR? 255.19.4.10.in-addr.arpa. (42)
18:51:59.069816 IP dns.company.com.domain andgt; linuxwksta.48287: 46767 NXDomain 0/0/0 (42)
18:51:59.159060 IP linuxwksta.42491 andgt; 10.4.17.72.iscsi-target: Flags [P.], seq 1989625106:1989625154, ack
2067334822, win 1525, options [nop,nop,TS val 16021424 ecr 215646227], length 48
18:51:59.159145 IP linuxwksta.48854 andgt; dns.company.com.domain: 3834+ PTR? 72.17.4.10.in-addr.arpa. (41)
18:51:59.159314 IP 10.4.17.72.iscsi-target andgt; linuxwksta.42491: Flags [P.], seq 1:49, ack 48, win 124, options
[nop,nop,TS val 215647479 ecr 16021424], length 48
18:51:59.159330 IP linuxwksta.42491 andgt; 10.4.17.72.iscsi-target: Flags [.], ack 49, win 1525, options [nop,nop,TS val
16021424 ecr 215647479], length 0
18:51:59.165342 IP dns.company.com.domain andgt; linuxwksta.48854: 3834 NXDomain 0/0/0 (41)
18:51:59.397461 ARP, Request who-has 10.4.16.58 tell 10.4.16.1, length 46
18:51:59.397597 IP linuxwksta.37684 andgt; dns.company.com.domain: 15022+ PTR? 58.16.4.10.in-addr.arpa. (41)
Given the traffic report, which of the following is MOST likely causing the slow traffic?
A. DNS poisoning
B. Improper network zoning
C. ARP poisoning
D. Improper LUN masking
Correct Answer: B

QUESTION 23
A penetration tester is assessing a mobile banking application. Man-in-the-middle attempts via a HTTP intercepting
proxy are failing with SSL errors. Which of the following controls has likely been implemented by the developers?
A. SSL certificate revocation
B. SSL certificate pinning
C. Mobile device root-kit detection
D. Extended Validation certificates
Correct Answer: B

QUESTION 24
A Chief Financial Officer (CFO) has raised concerns with the Chief Information Security Officer (CISO) because money
has been spent on IT security infrastructure, but corporate assets are still found to be vulnerable. The business recently
funded a patch management product and SOE hardening initiative. A third party auditor reported findings against the
business because some systems were missing patches. Which of the following statements BEST describes this
situation?
A. The CFO is at fault because they are responsible for patching the systems and have already been given patch
management and SOE hardening products.
B. The audit findings are invalid because remedial steps have already been applied to patch servers and the
remediation takes time to complete.
C. The CISO has not selected the correct controls and the audit findings should be assigned to them instead of the
CFO.
D. Security controls are generally never 100% effective and gaps should be explained to stakeholders and managed
accordingly.
Correct Answer: D

QUESTION 25
There has been a recent security breach which has led to the release of sensitive customer information. As part of
improving security and reducing the disclosure of customer data, a training company has been employed to educate
staff. Which of the following should be the primary focus of the privacy compliance training program?
A. Explain how customer data is gathered, used, disclosed, and managed.
B. Remind staff of the company\\’s data handling policy and have staff sign an NDA.
C. Focus on explaining the “how” and “why” customer data is being collected.
D. Republish the data classification and the confidentiality policy.
Correct Answer: A

QUESTION 26
To prevent a third party from identifying a specific user as having previously accessed a service provider through an
SSO operation, SAML uses which of the following?
A. Transient identifiers
B. SOAP calls
C. Discovery profiles
D. Security bindings
Correct Answer: A

QUESTION 27
A Chief Information Security Officer (CISO) of a major consulting firm has significantly increased the company\\’s
security posture; however, the company is still plagued by data breaches of misplaced assets. These data breaches as
a result have led to the compromise of sensitive corporate and client data on at least 25 occasions. Each employee in
the company is provided a laptop to perform company business. Which of the following actions can the CISO take to
mitigate the breaches?
A. Reload all user laptops with full disk encryption software immediately.
B. Implement full disk encryption on all storage devices the firm owns.
C. Implement new continuous monitoring procedures.
D. Implement an open source system which allows data to be encrypted while processed.
Correct Answer: B

QUESTION 28
Ann, a systems engineer, is working to identify an unknown node on the corporate network. To begin her investigative
work, she runs the following nmap command string:
user@hostname:~$ sudo nmap -O 192.168.1.54
Based on the output, nmap is unable to identify the OS running on the node, but the following ports are open on the
device:
TCP/22
TCP/111
TCP/512-514
TCP/2049
TCP/32778
Based on this information, which of the following operating systems is MOST likely running on the unknown node?
A. Linux
B. Windows
C. Solaris
D. OSX
Correct Answer: C

QUESTION 29
An external auditor has found that IT security policies in the organization are not maintained and in some cases are
nonexistent. As a result of the audit findings, the CISO has been tasked with the objective of establishing a mechanism
to manage the lifecycle of IT security policies. Which of the following can be used to BEST achieve the CISO\\’s
objectives?
A. CoBIT
B. UCF
C. ISO 27002
D. eGRC
Correct Answer: D

QUESTION 30
A developer is determining the best way to improve security within the code being developed. The developer is focusing
on input fields where customers enter their credit card details. Which of the following techniques, if implemented in the
code, would be the MOST effective in protecting the fields from malformed input?
A. Client side input validation
B. Stored procedure
C. Encrypting credit card details
D. Regular expression matching
Correct Answer: D

QUESTION 31
A completely new class of web-based vulnerabilities has been discovered. Claims have been made that all common
web-based development frameworks are susceptible to attack. Proof-of-concept details have emerged on the Internet. A
security advisor within a company has been asked to provide recommendations on how to respond quickly to these
vulnerabilities. Which of the following BEST describes how the security advisor should respond?
A. Assess the reliability of the information source, likelihood of exploitability, and impact to hosted data. Attempt to
exploit via the proof-of-concept code. Consider remediation options.
B. Hire an independent security consulting agency to perform a penetration test of the web servers. Advise
management of any `high\\’ or `critical\\’ penetration test findings and put forward recommendations for mitigation.
C. Review vulnerability write-ups posted on the Internet. Respond to management with a recommendation to wait until
the news has been independently verified by software vendors providing the web application software.
D. Notify all customers about the threat to their hosted data. Bring the web servers down into “maintenance mode” until
the vulnerability can be reliably mitigated through a vendor patch.
Correct Answer: A

QUESTION 32
An assessor identifies automated methods for identifying security control compliance through validating sensors at the
endpoint and at Tier 2. Which of the following practices satisfy continuous monitoring of authorized information
systems?
A. Independent verification and validation
B. Security test and evaluation
C. Risk assessment
D. Ongoing authorization
Correct Answer: D

QUESTION 33
A developer has implemented a piece of client-side JavaScript code to sanitize a user\\’s provided input to a web page
login screen. The code ensures that only the upper case and lower case letters are entered in the username field, and
that only a 6-digit PIN is entered in the password field. A security administrator is concerned with the following web
server log:
10.235.62.11 — [02/Mar/2014:06:13:04] andquot;GET /site/script.php?user=adminandamp;pass=pass%20or%201=1
HTTP/1.1andquot; 200 5724
Given this log, which of the following is the security administrator concerned with and which fix should be implemented
by the developer?
A. The security administrator is concerned with nonprintable characters being used to gain administrative access, and
the developer should strip all nonprintable characters.
B. The security administrator is concerned with XSS, and the developer should normalize Unicode characters on the
browser side.
C. The security administrator is concerned with SQL injection, and the developer should implement server side input
validation.
D. The security administrator is concerned that someone may log on as the administrator, and the developer should
ensure strong passwords are enforced.
Correct Answer: C

QUESTION 34
Executive management is asking for a new manufacturing control and workflow automation solution. This application will
facilitate management of proprietary information and closely guarded corporate trade secrets.
The information security team has been a part of the department meetings and come away with the following notes:
-Human resources would like complete access to employee data stored in the application. They would like automated
data interchange with the employee management application, a cloud-based SaaS application.
-Sales is asking for easy order tracking to facilitate feedback to customers.
-Legal is asking for adequate safeguards to protect trade secrets. They are also concerned with data ownership
questions and legal jurisdiction.
-Manufacturing is asking for ease of use. Employees working the assembly line cannot be bothered with additional steps
or overhead. System interaction needs to be quick and easy.
-Quality assurance is concerned about managing the end product and tracking overall performance of the product being
produced. They would like read-only access to the entire workflow process for monitoring and baselining.
The favored solution is a user friendly software application that would be hosted onsite. It has extensive ACL
functionality, but also has readily available APIs for extensibility. It supports read-only access, kiosk automation, custom
fields, and
data encryption.
Which of the following departments\\’ request is in contrast to the favored solution?
A. Manufacturing
B. Legal
C. Sales
D. Quality assurance
E. Human resources
Correct Answer: E

QUESTION 35
VPN users cannot access the active FTP server through the router but can access any server in the data center.
Additional network information:
DMZ network -192.168.5.0/24 (FTP server is 192.168.5.11)
VPN network -192.168.1.0/24
Datacenter -192.168.2.0/24
User network – 192.168.3.0/24
HR network -192.168.4.0/24\
Traffic shaper configuration:
VLAN Bandwidth Limit (Mbps)
VPN50
User175
HR250
Finance250
Guest0
Router ACL:
ActionSourceDestination
Permit192.168.1.0/24192.168.2.0/24
Permit192.168.1.0/24192.168.3.0/24
Permit192.168.1.0/24192.168.5.0/24
Permit192.168.2.0/24192.168.1.0/24
Permit192.168.3.0/24192.168.1.0/24
Permit192.168.5.1/32192.168.1.0/24
Deny192.168.4.0/24192.168.1.0/24
Deny192.168.1.0/24192.168.4.0/24
Denyanyany
Which of the following solutions would allow the users to access the active FTP server?
A. Add a permit statement to allow traffic from 192.168.5.0/24 to the VPN network
B. Add a permit statement to allow traffic to 192.168.5.1 from the VPN network
C. IPS is blocking traffic and needs to be reconfigured
D. Configure the traffic shaper to limit DMZ traffic
E. Increase bandwidth limit on the VPN network
Correct Answer: A

QUESTION 36
A growing corporation is responding to the needs of its employees to access corporate email and other resources while
traveling. The company is implementing remote access for company laptops. Which of the following security systems
should be implemented for remote access? (Select TWO).
A. Virtual Private Network
B. Secure Sockets Layer for web servers
C. Network monitoring
D. Multifactor authentication for users
E. Full disk encryption
F. Intrusion detection systems
Correct Answer: AD

QUESTION 37
A large financial company has a team of security-focused architects and designers that contribute into broader IT
architecture and design solutions. Concerns have been raised due to the security contributions having varying levels of
quality and consistency. It has been agreed that a more formalized methodology is needed that can take business
drivers, capabilities, baselines, and re-usable patterns into account. Which of the following would BEST help to achieve
these objectives?
A. Construct a library of re-usable security patterns
B. Construct a security control library
C. Introduce an ESA framework
D. Include SRTM in the SDLC
Correct Answer: C

QUESTION 38
A security consultant is conducting a network assessment and wishes to discover any legacy backup Internet
connections the network may have. Where would the consultant find this information and why would it be valuable?
A. This information can be found in global routing tables, and is valuable because backup connections typically do not
have perimeter protection as strong as the primary connection.
B. This information can be found by calling the regional Internet registry, and is valuable because backup connections
typically do not require VPN access to the network.
C. This information can be found by accessing telecom billing records, and is valuable because backup connections
typically have much lower latency than primary connections.
D. This information can be found by querying the network\\’s DNS servers, and is valuable because backup DNS
servers typically allow recursive queries from Internet hosts.
Correct Answer: A

QUESTION 39
A Security Manager is part of a team selecting web conferencing systems for internal use. The system will only be used
for internal employee collaboration. Which of the following are the MAIN concerns of the security manager? (Select
THREE).
A. Security of data storage
B. The cost of the solution
C. System availability
D. User authentication strategy
E. PBX integration of the service
F. Operating system compatibility
Correct Answer: ACD

QUESTION 40
Company policy requires that all company laptops meet the following baseline requirements: Software requirements:
Antivirus Anti-malware Anti-spyware Log monitoring Full-disk encryption Terminal services enabled for RDP
Administrative access for local users
Hardware restrictions: Bluetooth disabled FireWire disabled WiFi adapter disabled Ann, a web developer, reports
performance issues with her laptop and is not able to access any network resources. After further investigation, a bootkit
was discovered and it was trying to access external websites. Which of the following
hardening techniques should be applied to mitigate this specific issue from reoccurring? (Select TWO).
A. Group policy to limit web access
B. Restrict VPN access for all mobile users
C. Remove full-disk encryption
D. Remove administrative access to local users
E. Restrict/disable TELNET access to network resources
F. Perform vulnerability scanning on a daily basis
G. Restrict/disable USB access
Correct Answer: DG

We offer more ways to make it easier for everyone to learn, and YouTube is the best tool in the video. Follow channels: https://www.youtube.com/channel/UCXg-xz6fddo6wo1Or9eHdIQ/videos get more useful exam content.

Latest CompTIA CASP CAS-002 YouTube videos:

Meetexams updates the latest effective exam dumps throughout the year (cisco,microsoft,oracle,CompTIA,comptia,VMware …) ! Share 40 valid CompTIA CASP CAS-002 exam dumps for free to get the full CAS-002 Dumps: https://www.leads4pass.com/cas-002.html (Total Questions:733 Q&As)

[PDF] Free CompTIA CASP CAS-002 pdf dumps download from Google Drive: https://drive.google.com/open?id=1fm0O5FZH2TD4aFhVhdjTexLr1D9SMYCr

[PDF] Free Full CompTIA pdf dumps download from Google Drive: https://drive.google.com/open?id=1cFeWWpiWzsSWZqeuRVlu9NtAcFT4WsiG

leads4pass Promo Code 12% Off

leads4pass CAS-002 coupon

related: https://www.dumpinside.com/cisco-ccna-data-center-640-916-dumps-exam/

Latest CompTIA Security+ SY0-401 dumps exam training resources in PDF format download free try from leads4pass. “CompTIA Security+ Certification” is the name of CompTIA Security+ https://www.leads4pass.com/sy0-401.html exam dumps which covers all the knowledge points of the real CompTIA exam. High quality CompTIA Security+ SY0-401 dumps vce youtube demo update free shared. 100% success and guarantee to pass CompTIA SY0-401 exam.

Get your CompTIA Security+ SY0-401 dumps exam preparation questions in form of SY0-401 PDF. If you want to get success with good grades then these CompTIA Security+ SY0-401 dumps exam question and answers are splendid platform for you I personally review this web many times that’s why I am suggesting you this one.

Vendor: CompTIA
Certifications: Security+
Exam Name: CompTIA Security+ Certification
Exam Code: SY0-401
Total Questions: 1776 Q&As

Download latest CompTIA SY0-401 dumps pdf training resources: https://drive.google.com/open?id=0B_7qiYkH83VRMEhpY1lTQnR4NDA

Download latest CompTIA SY0-101 dumps pdf training resources: https://drive.google.com/open?id=0B_7qiYkH83VRWm1VeWl0ZVhINkk

Best CompTIA Security+ SY0-401 Dumps Exam Questions And Answers (Q1-Q40)

QUESTION 1
Ann is the data owner of financial records for a company. She has requested that she have the ability to assign read and write privileges to her folders. The network administrator is tasked with setting up the initial access control system and handing Ann’s administrative capabilities. Which of the following systems should be deployed?
A. Role-based
B. Mandatory
C. Discretionary
D. Rule-based
Correct Answer: C

QUESTION 2
A password history value of three means which of the following?
A. Three different passwords are used before one can be reused.
B. A password cannot be reused once changed for three years.
C. After three hours a password must be re-entered to continue.
D. The server stores passwords in the database for three days.
Correct Answer: A

QUESTION 3
A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator planning to implement across the organization?
A. LDAP
B. RADIUS
C. Kerberos
D. XTACACS
Correct Answer: C

QUESTION 4
A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted?
A. RADIUS
B. TACACS+
C. Kerberos
D. LDAP
Correct Answer: B

QUESTION 5
Which of the following authentication services requires the use of a ticket-granting ticket (TGT) server in order to complete the authentication process?
A. TACACS+
B. Secure LDAP
C. RADIUS
D. Kerberos
Correct Answer: D

QUESTION 6
An organization has introduced token-based authentication to system administrators due to risk of password compromise. The tokens have a set of numbers that automatically change every 30 seconds. Which of the following type of authentication mechanism is this?
A. TOTP
B. Smart card
C. CHAP
D. HOTP
Correct Answer: A

QUESTION 7
The security department has implemented a new laptop encryption product in the environment. The product requires one user name and password at the time of boot up and also another password after the operating system has finished loading. This setup is using which of the following authentication types?
A. Two-factor authentication
B. Single sign-on
C. Multifactor authentication
D. Single factor authentication
Correct Answer: D

QUESTION 8
A company hired Joe, an accountant. The IT administrator will need to create a new account for Joe. The company uses groups for ease of management and administration of user accounts. SY0-401 dumps
Joe will need network access to all directories, folders and files within the accounting department.
Which of the following configurations will meet the requirements?
A. Create a user account and assign the user account to the accounting group.
B. Create an account with role-based access control for accounting.
C. Create a user account with password reset and notify Joe of the account creation.
D. Create two accounts: a user account and an account with full network administration rights.
Correct Answer: B

QUESTION 9
Which of the following access controls enforces permissions based on data labeling at specific levels?
A. Mandatory access control
B. Separation of duties access control
C. Discretionary access control
D. Role based access control
Correct Answer: A

QUESTION 10
A system administrator needs to ensure that certain departments have more restrictive controls to their shared folders than other departments. Which of the following security controls would be implemented to restrict those departments?
A. User assigned privileges
B. Password disablement
C. Multiple account creation
D. Group based privileges
Correct Answer: D

QUESTION 11
Ann was reviewing her company’s event logs and observed several instances of GUEST accessing the company print server, file server, and archive database. As she continued to investigate, Ann noticed that it seemed to happen at random intervals throughout the day, but mostly after the weekly automated patching and often logging in at the same time. Which of the following would BEST mitigate this issue?
A. Enabling time of day restrictions
B. Disabling unnecessary services
C. Disabling unnecessary accounts
D. Rogue machine detection
Correct Answer: C

QUESTION 12
An administrator implements SELinux on a production web server. After implementing this, the web server no longer serves up files from users’ home directories. To rectify this, the administrator creates a new policy as the root user. This is an example of which of the following? (Select TWO).
A. Enforcing SELinux in the OS kernel is role-based access control
B. Enforcing SELinux in the OS kernel is rule-based access control
C. The policy added by the root user is mandatory access control
D. Enforcing SELinux in the OS kernel is mandatory access control
E. The policy added by the root user is role-based access control
F. The policy added by the root user is rule-based access control
Correct Answer: DF

QUESTION 13
Jane, a security administrator, has been tasked with explaining authentication services to the company’s management team. The company runs an active directory infrastructure. Which of the following solutions BEST relates to the host authentication protocol within the company’s environment?
A. Kerberos
B. Least privilege
C. TACACS+
D. LDAP
Correct Answer: A

QUESTION 14
Which of the following is an example of multifactor authentication?
A. Credit card and PIN
B. Username and password
C. Password and PIN
D. Fingerprint and retina scan
Correct Answer: A

QUESTION 15
Which of the following should be used to authenticate and log connections from wireless users connecting with EAP-TLS?
A. Kerberos
B. LDAP
C. SAML
D. RADIUS
Correct Answer: D

QUESTION 16
Which of the following authentication services uses a ticket granting system to provide access?
A. RADIUS
B. LDAP
C. TACACS+
D. Kerberos
Correct Answer: D

QUESTION 17
Which of the following was based on a previous X.500 specification and allows either unencrypted authentication or encrypted authentication through the use of TLS?
A. Kerberos
B. TACACS+
C. RADIUS
D. LDAP
Correct Answer: D

QUESTION 18
Which of the following types of security services are used to support authentication for remote users and devices?
A. Biometrics
B. HSM
C. RADIUS
D. TACACS
Correct Answer: C

QUESTION 19
A hacker has discovered a simple way to disrupt business for the day in a small company which relies on staff working remotely. In a matter of minutes the hacker was able to deny remotely working staff access to company systems with a script. Which of the following security controls is the hacker exploiting?
A. DoS
B. Account lockout
C. Password recovery
D. Password complexity
Correct Answer: B

QUESTION 20
A technician is reviewing the logical access control method an organization uses. One of the senior managers requests that the technician prevent staff members from logging on during nonworking days. Which of the following should the technician implement to meet managements request?
A. Enforce Kerberos
B. Deploy smart cards
C. Time of day restrictions
D. Access control lists
Correct Answer: C

QUESTION 21
Which of the following is the BEST reason for placing a password lock on a mobile device?
A. Prevents an unauthorized user from accessing owner’s data
B. Enables remote wipe capabilities
C. Stops an unauthorized user from using the device again
D. Prevents an unauthorized user from making phone calls
Correct Answer: A

QUESTION 22
Which of the following is mainly used for remote access into the network?
A. XTACACS
B. TACACS+
C. Kerberos
D. RADIUS
Correct Answer: D

QUESTION 23
Which of the following protocols uses TCP instead of UDP and is incompatible with all previous versions?
A. TACACS
B. XTACACS
C. RADIUS
D. TACACS+
Correct Answer: D

QUESTION 24
The system administrator is tasked with changing the administrator password across all 2000 computers in the organization. SY0-401 dumps Which of the following should the system administrator implement to accomplish this task?
A. A security group
B. A group policy
C. Key escrow
D. Certificate revocation
Correct Answer: B

QUESTION 25
The IT department has setup a website with a series of questions to allow end users to reset their own accounts. Which of the following account management practices does this help?
A. Account Disablements
B. Password Expiration
C. Password Complexity
D. Password Recovery
Correct Answer: D

QUESTION 26
Use of group accounts should be minimized to ensure which of the following?
A. Password security
B. Regular auditing
C. Baseline management
D. Individual accountability
Correct Answer: D

QUESTION 27
One of the most basic ways to protect the confidentiality of data on a laptop in the event the device is physically stolen is to implement which of the following?
A. File level encryption with alphanumeric passwords
B. Biometric authentication and cloud storage
C. Whole disk encryption with two-factor authentication
D. BIOS passwords and two-factor authentication
Correct Answer: C

QUESTION 28
A security analyst implemented group-based privileges within the company active directory. Which of the following account management techniques should be undertaken regularly to ensure least privilege principles?
A. Leverage role-based access controls.
B. Perform user group clean-up.
C. Verify smart card access controls.
D. Verify SHA-256 for password hashes.
Correct Answer: B

QUESTION 29
An internal auditing team would like to strengthen the password policy to support special characters. Which of the following types of password controls would achieve this goal?
A. Add reverse encryption
B. Password complexity
C. Increase password length
D. Allow single sign on
Correct Answer: B

QUESTION 30
Which of the following is best practice to put at the end of an ACL?
A. Implicit deny
B. Time of day restrictions
C. Implicit allow
D. SNMP string
Correct Answer: A

QUESTION 31
Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure protocol, which can utilize EAP. Which of the following would BEST fit her objective?
A. CHAP
B. SAML
C. Kerberos
D. Diameter
Correct Answer: D

QUESTION 32
Jane, a security administrator, needs to implement a secure wireless authentication method that uses a remote RADIUS server for authentication.
Which of the following is an authentication method Jane should use?
A. WPA2-PSK
B. WEP-PSK
C. CCMP
D. LEAP
Correct Answer: D

QUESTION 33
A network administrator is configuring access control for the sales department which has high employee turnover. Which of the following is BEST suited when assigning user rights to individuals in the sales department?
A. Time of day restrictions
B. Group based privileges
C. User assigned privileges
D. Domain admin restrictions
Correct Answer: B

QUESTION 34
A security technician is working with the network firewall team to implement access controls at the company’s demarc as part of the initiation of configuration management processes. One of the network technicians asks the security technician to explain the access control type found in a firewall. With which of the following should the security technician respond?
A. Rule based access control
B. Role based access control
C. Discretionary access control
D. Mandatory access control
Correct Answer: A

QUESTION 35
A security administrator has been tasked to ensure access to all network equipment is controlled by a central server such as TACACS+. This type of implementation supports which of the following risk mitigation strategies?
A. User rights and permissions review
B. Change management
C. Data loss prevention
D. Implement procedures to prevent data theft
Correct Answer: A

QUESTION 36
Which of the following is an XML based open standard used in the exchange of authentication and authorization information between different parties?
A. LDAP
B. SAML
C. TACACS+
D. Kerberos
Correct Answer: B

QUESTION 37
The security manager wants to unify the storage of credential, phone numbers, office numbers, and address information into one system. Which of the following is a system that will support the requirement on its own?
A. LDAP
B. SAML
C. TACACS
D. RADIUS
Correct Answer: A

QUESTION 38
LDAP and Kerberos are commonly used for which of the following?
A. To perform queries on a directory service
B. To store usernames and passwords for Federated Identity
C. To sign SSL wildcard certificates for subdomains
D. To utilize single sign-on capabilities
Correct Answer: D

QUESTION 39
A user reports being unable to access a file on a network share. SY0-401 dumps The security administrator determines that the file is marked as confidential and that the user does not have the appropriate access level for that file. Which of the following is being implemented?
A. Mandatory access control
B. Discretionary access control
C. Rule based access control
D. Role based access control
Correct Answer: A

QUESTION 40
Users report that they are unable to access network printing services. The security technician checks the router access list and sees that web, email, and secure shell are allowed. Which of the following is blocking network printing?
A. Port security
B. Flood guards
C. Loop protection
D. Implicit deny
Correct Answer: D

Useful CompTIA Security+ SY0-401 dumps pdf practice files and study guides free download from leads4pass. The best and most updated latest CompTIA Security+ https://www.leads4pass.com/sy0-401.html dumps pdf training resources which are the best for clearing SY0-401 exam test, and to get certified by CompTIA Security+. If you are looking to get CompTIA Security+ Certification by passing exam SY0-401 then you can pass it in one go.

High quality CompTIA Security+ SY0-401 dumps vce youtube demo:

https://youtu.be/Ti0gVvsg5eI

The Following Are Some Reviews From Our Customers:

SY0-401 dumps
You can click here to have a review about us: https://www.resellerratings.com/store/leads4pass

Why Select leads4pass?

leads4pass is the best provider of IT learning materials and the right choice for you to prepare for CompTIA Security+ SY0-401 exam. Other brands started earlier, but the price is relatively expensive and the questions are not the newest. leads4pass provide the latest real questions and answers with lowest prices, help you pass CompTIA SY0-401 exam easily at first try.
SY0-401 dumps