[26/Dec/2018 Updated] 100% Valid CAS-003 Exam Questions and Answers Everyone Want To Download

26 Dec

New Updated CAS-003 Exam Questions from PassLeader CAS-003 PDF dumps! Welcome to download the newest PassLeader CAS-003 VCE dumps: https://www.passleader.com/cas-003.html (396 Q&As)

Keywords: CAS-003 exam dumps, CAS-003 exam questions, CAS-003 VCE dumps, CAS-003 PDF dumps, CAS-003 practice tests, CAS-003 study guide, CAS-003 braindumps, CompTIA Advanced Security Practitioner (CASP) Exam

P.S. New CAS-003 dumps PDF: https://drive.google.com/open?id=1bfoVeMAPqLPPEtiIibD38-i-xMle-2O0

Users have been reporting unusual automated phone calls, including names and phone numbers, that appear to come from devices internal to the company. What of the following should the systems administrators do to BEST address this problem? (Choose two.)

A.    Add an ACL to the Firewall to block VoIP.
B.    Change the settings on the phone system to use SIP-TLS.
C.    Have the phones download new configuration over TFTP.
D.    Enable QoS configuration on the phone VLAN.

Answer: AB

A network engineer is upgrading the network perimeter and installing a new firewall, IDS, and external edge router. The IDS is reporting elevated UDP traffic and the Internal Routers are reporting high utilization. Which of the following is the BEST solution?

A.    Reconfigure the firewall to block external UDP traffic.
B.    Establish a security baseline on the IDS.
C.    Block echo reply traffic at the firewall.
D.    Modify the edge router to not forward broadcast traffic

Answer: D

An engineer needs to provide access to company resources for several offshore contractors. The contractors require:
– Access to a number of applications, including internal websites.
– Access to database data and the ability to manipulate it.
– The ability to log into Linux and Windows servers remotely.
Which of the following remote access technologies are the BEST choices to provide all of this access securely? (Choose two.)

A.    VTC
B.    VRRP
C.    VLAN
D.    VDI
E.    VPN
F.    Telnet

Answer: DE

An administrator has noticed mobile devices from an adjacent company on the corporate wireless network. Malicious activity is being reported from those devices. To add another layer of security in an enterprise environment an administrator wants to add contextual authentication to allow users to access enterprise resources only while present in corporate buildings. Which of the following technologies would accomplish this?

A.    Port security.
B.    Rogue device detection
C.    Bluetooth
D.    GPS

Answer: B

A security consultant is improving the physical security of a sensitive site and takes pictures of the unbranded building to include in the report. Two weeks later, the security consultant misplaces the phone, which only has one hour of charge left on it. The person who finds the phone removes the MicroSD card in an attempt to discover the owner to return it. The person extracts the following data from the phone and EXIF data from some files:
– DCIM images folder
– Audio books folder
– Torrents
– My TAN xls file
– Consultancy HR Manual doc file
– Camera: SM-G950F
– Exposure time: 1/60 s
– Location: 3500 Lacey Road USA
Which of the following BEST describes the security problem?

A.    MicroSD is not encrypted and also contains personal data.
B.    MicroSD contains a mixture of personal and work data.
C.    MicroSD is nor encrypted and contains geotagging information.
D.    MicroSD contains pirated software and is not encrypted.

Answer: A

A Chief Information Officer (CIO) has mandated that all web-based applications the company uses are required to be hosted on the newest stable operating systems and application stack. Additionally, a monthly report must be generated and provided to the audit department. Which of the following security tools should a security analyst use to provide the BEST information?

A.    Protocol analyzer
B.    Network enumerator
C.    Penetration testing platform
D.    Vulnerability scanner
E.    GRC software

Answer: D

During the deployment of a new system, the implementation team determines that APIs used to integrate the new system with a legacy system are not functioning properly. Further investigation shows there is a misconfigured encryption algorithm used to secure data transfers between systems. Which of the following should the project manager use to determine the source of the defined algorithm in use?

A.    Code repositories.
B.    Security requirements traceability matrix.
C.    Software development life cycle.
D.    Data design diagram.
E.    Roles matrix.
F.    Implementation guide.

Answer: E

As part of an organization’s compliance program, administrators must complete a hardening checklist and note any potential improvements. The process of noting potential improvements in the checklist is MOST likely driven by ____.

A.    the collection of data as part of the continuous monitoring program
B.    adherence to policies associated with incident response
C.    the organization’s software development life cycle
D.    changes in operating systems or industry trends

Answer: C

A protect manager is working with a team that is tasked to develop software applications in a structured environment and host them in a vendor’s cloud-based Infrastructure. The organization will maintain responsibility for the software but wit not manage the underlying server applications. Which of the following does the organization plan to leverage?

A.    SaaS
B.    PaaS
C.    IaaS
D.    Hybrid cloud
E.    Network virtualization

Answer: A

A security engineer has been hired to design a device that will enable the exfiltration of data from within a well-defended network perimeter ding an authorized test. The device must bypass all firewalls and NIDS place as well as allow in the upload of commands from a cent, allied command and control server. The total cost of the deuce must be kept to a minimum in case the device is discovered doing an assessment. Which of the following tools should the engineer load onto the device being designed?

A.    Custom firmware with routing key generation.
B.    Automatic MITM proxy.
C.    TCP beacon broadcast software.
D.    Reverse shell endpoint listener.

Answer: D

A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?

A.    Vulnerability scanner
B.    TPM
C.    Host-based firewall
D.    File integrity monitor
E.    NIPS

Answer: C

The finance department has started to use a new payment system that requires strict Pll security restrictions on various network devices. The company decides to enforce the restrictions and configure all devices appropriately. Which of the following risk response strategies is being used?

A.    Avoid
B.    Mitigate
C.    Transfer
D.    Accept

Answer: A


Download the newest PassLeader CAS-003 dumps from passleader.com now! 100% Pass Guarantee!

CAS-003 PDF dumps & CAS-003 VCE dumps: https://www.passleader.com/cas-003.html (396 Q&As) (New Questions Are 100% Available and Wrong Answers Have Been Corrected! Free VCE simulator!)

P.S. New CAS-003 dumps PDF: https://drive.google.com/open?id=1bfoVeMAPqLPPEtiIibD38-i-xMle-2O0