This page was exported from Easily Pass By Training Lead2pass Latest Dumps [ https://www.freebraindump.com ] Export date:Wed Jul 3 3:52:47 2024 / +0000 GMT ___________________________________________________ Title: [March 2018] Lead2pass Exam Collection CAS-002 Dumps And CAS-002 New Questions 900q --------------------------------------------------- Lead2pass Free CAS-002 Exam Dumps With PDF And VCE Download: https://www.lead2pass.com/cas-002.html QUESTION 11Driven mainly by cost, many companies outsource computing jobs which require a large amount of processor cycles over a short duration to cloud providers. This allows the company to avoid a large investment in computing resources which will only be used for a short time.Assuming the provisioned resources are dedicated to a single company, which of the following is the MAIN vulnerability associated with on-demand provisioning? A.    Traces of proprietary data which can remain on the virtual machine and be exploitedB.    Remnants of network data from prior customers on the physical servers during a compute jobC.    Exposure of proprietary data when in-transit to the cloud provider through IPSec tunnelsD.    Failure of the de-provisioning mechanism resulting in excessive charges for the resourcesAnswer: A QUESTION 12A company contracts with a third party to develop a new web application to process credit cards. Which of the following assessments will give the company the GREATEST level of assurance for the web application? A.    Social EngineeringB.    Penetration TestC.    Vulnerability AssessmentD.    Code Review Answer: D QUESTION 13A security audit has uncovered that some of the encryption keys used to secure the company B2B financial transactions with its partners may be too weak. The security administrator needs to implement a process to ensure that financial transactions will not be compromised if a weak encryption key is found. Which of the following should the security administrator implement? A.    Entropy should be enabled on all SSLv2 transactions.B.    AES256-CBC should be implemented for all encrypted data.C.    PFS should be implemented on all VPN tunnels.D.    PFS should be implemented on all SSH connections. Answer: C QUESTION 14Company Z is merging with Company A to expand its global presence and consumer base. This purchase includes several offices in different countries. To maintain strict internal security and compliance requirements, all employee activity may be monitored and reviewed. Which of the following would be the MOST likely cause for a change in this practice? A.    The excessive time it will take to merge the company's information systems.B.    Countries may have different legal or regulatory requirements.C.    Company A might not have adequate staffing to conduct these reviews.D.    The companies must consolidate security policies during the merger. Answer: B QUESTION 15A business is currently in the process of upgrading its network infrastructure to accommodate a personnel growth of over fifty percent within the next six months. All preliminary planning has been completed and a risk assessment plan is being adopted to decide which security controls to put in place throughout each phase.Which of the following risk responses is MOST likely being considered if the business is creating an SLA with a third party? A.    Accepting riskB.    Mitigating riskC.    Identifying riskD.    Transferring risk Answer: D QUESTION 16Which of the following must be taken into consideration for e-discovery purposes when a legal case is first presented to a company? A.    Data ownership on all filesB.    Data size on physical disksC.    Data retention policies on only file serversD.    Data recovery and storage Answer: D QUESTION 17Based on the results of a recent audit, a company rolled out a standard computer image in an effort to provide consistent security configurations across all computers. Which of the following controls provides the GREATEST level of certainty that unauthorized changes are not occurring? A.    Schedule weekly vulnerability assessmentsB.    Implement continuous log monitoringC.    Scan computers weekly against the baselineD.    Require monthly reports showing compliance with configuration and updates Answer: C QUESTION 18A new project initiative involves replacing a legacy core HR system, and is expected to touch many major operational systems in the company. A security administrator is engaged in the project to provide security consulting advice. In addition, there are database, network, application, HR, and transformation management consultants engaged on the project as well. The administrator has established the security requirements. Which of the following is the NEXT logical step? A.    Document the security requirements in an email and move on to the next most urgent task.B.    Organize for a requirements workshop with the non-technical project members, being the HR and transformation management consultants.C.    Communicate the security requirements with all stakeholders for discussion and buy-in.D.    Organize for a requirements workshop with the technical project members, being the database, network, and application consultants. Answer: C QUESTION 19A small company has a network with 37 workstations, 3 printers, a 48 port switch, an enterprise class router, and a firewall at the boundary to the ISP. The workstations have the latest patches and all have up-to-date anti-virus software. User authentication is a two-factor system with fingerprint scanners and passwords. Sensitive data on each workstation is encrypted. The network is configured to use IPv4 and is a standard Ethernet network. The network also has a captive portal based wireless hot-spot to accommodate visitors. Which of the following is a problem with the security posture of this company? A.    No effective controls in placeB.    No transport security controls are implementedC.    Insufficient user authentication controls are implementedD.    IPv6 is not incorporated in the network Answer: B QUESTION 20Which of the following authentication types is used primarily to authenticate users through the use of tickets? A.    LDAPB.    RADIUSC.    TACACS+D.    Kerberos Answer: D CAS-002 dumps full version (PDF&VCE): https://www.lead2pass.com/cas-002.html Large amount of free CAS-002 exam questions on Google Drive: https://drive.google.com/open?id=13j5iOL_XYuK24xlefcIzTQtqmeQfLY7K --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2018-03-02 08:39:47 Post date GMT: 2018-03-02 08:39:47 Post modified date: 2018-03-02 08:39:47 Post modified date GMT: 2018-03-02 08:39:47 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com