Try CompTIA CAS-003 Exam Questions – [Updated May 2018]

By | May 15, 2018

Are you having difficulties looking for reliable CompTIA CAS-003 exam preparation materials for CompTIA CAS-003 exam Certification Exam? Don’t look any further. We are here to offer you the only review CompTIA CAS-003 exam questions that can guarantee your success in CompTIA CAS-003 exam. It is our commitment to being the sole provider of CompTIA Advanced Security Practitioner CompTIA CAS-003 exam test preparation materials for every IT professional. All CompTIA Advanced Security Practitioner CAS-003 exam dumps preparation material prepared by the subject matter experts who formulate, evaluate, and update our products.

Vendor: CompTIA
Certifications: CompTIA Advanced Security Practitioner
Exam Name: CompTIA Advanced Security Practitioner
Exam Code: CAS-003
Total Questions: 247

♥ 2018 Valid CAS-003 Exam Questions ♥

CAS-003 exam questions, CAS-003 PDF dumps; CAS-003 exam dumps:: (247 Q&A) (New Questions Are 100% Available! Also Free Practice Test Software!)

Latest and Most Accurate CompTIA CAS-003 Dumps Exam Questions and Answers:

Question: 21

Wireless users are reporting issues with the company’s video conferencing and VoIP systems. The security administrator notices DOS attacks on the network that are affecting the company’s VoIP system (i.e. premature call drops and garbled call signals). The security administrator also notices that the SIP servers are unavailable during these attacks. Which of the following security controls will MOST likely mitigate the VoIP DOS attacks on the network? (Select TWO).

A. Configure 802.11b on the network
B. Configure 802.1q on the network
C. Configure 802.11e on the network
D. Update the firewall managing the SIP servers
E. Update the HIDS managing the SIP servers

Answer: C, D

Question: 22

A company has decided to use the SDLC for the creation and production of a new information system. The security administrator is training all users on how to protect company information while using the new system, along with being able to recognize social engineering attacks. Senior Management must also formally approve of the system prior to it going live. In which of the following phases would these security controls take place?

A. Operations and Maintenance
B. Implementation
C. Acquisition and Development
D. Initiation

Answer: B

Question: 23

A security consultant is evaluating forms which will be used on a company website. Which of the following techniques or terms is MOST effective at preventing malicious individuals from successfully exploiting programming flaws in the website?

A. Anti-spam software
B. Application sandboxing
C. Data loss prevention
D. Input validation

Answer: D

Question: 24

A security audit has uncovered that some of the encryption keys used to secure the company B2B financial transactions with its partners may be too weak. The security administrator needs to implement a process to ensure that financial transactions will not be compromised if a weak encryption key is found. Which of the following should the security administrator implement?

A. Entropy should be enabled on all SSLv2 transactions.
B. AES256-CBC should be implemented for all encrypted data.
C. PFS should be implemented on all VPN tunnels.
D. PFS should be implemented on all SSH connections.

Answer: C

Question: 25

A company provides on-demand virtual computing for a sensitive project. The company implements a fully virtualized datacenter and terminal server access with two-factor authentication for access to sensitive data. The security administrator at the company has uncovered a breach in data confidentiality. Sensitive data was found on a hidden directory within the hypervisor. Which of the following has MOST likely occurred?

A. A stolen two factor token and a memory mapping RAM exploit were used to move data from one virtual guest to an unauthorized similar token.
B. An employee with administrative access to the virtual guests was able to dump the guest memory onto their mapped disk.
C. A host server was left un-patched and an attacker was able to use a VMEscape attack to gain unauthorized access.
D. A virtual guest was left un-patched and an attacker was able to use a privilege escalation attack to gain unauthorized access.

Answer: C

Question: 26

Company XYZ provides residential television cable service across a large region.
The company’s board of directors is in the process of approving a deal with the following three companies:
A National landline telephone provider
A Regional wireless telephone provider
An international Internet service provider
The board of directors at Company XYZ wants to keep the companies and billing separated.
While the Chief Information Officer (CIO) at Company XYZ is concerned about the confidentiality of Company XYZ’s customer data and wants to share only minimal information about its customers for the purpose of accounting, billing, and customer authentication.
The proposed solution must use open standards and must make it simple and seamless for Company XYZ’s customers to receive all four services.
Which of the following solutions is BEST suited for this scenario?

A. All four companies must implement a TACACS+ web based single sign-on solution with associated captive portal technology.
B. Company XYZ must implement VPN and strict access control to allow the other three companies to access the internal LDAP.
C. Company XYZ needs to install the SP, while the partner companies need to install the WAYF portion of a Federated identity solution.
D. Company XYZ needs to install the IdP, while the partner companies need to install the SP portion of a Federated identity solution.

Answer: D

New Updated CAS-003 Exam Questions CAS-003 PDF dumps CAS-003 practice exam dumps: