CAS-002 Latest Exam BrainDumps
Test4Direct provides latest PDF questions of CompTIA CAS-002 exam. You have an opportunity to pass the CompTIA CAS-002 exam in one go. Test4Direct is most accurate source to prepare CompTIA CAS-002 exam as your success will become site’s responsibility after purchasing CAS-002 exam product. There are also lots of discounts and promotion offers that you can avail. Let’s try a free demo http://www.test4direct.com/CAS-002.html
Test4Direct provides latest PDF questions of CompTIA CAS-002 exam. You have an opportunity to pass the CompTIA CAS-002 exam in one go. Test4Direct is most accurate source to prepare CompTIA CAS-002 exam as your success will become site’s responsibility after purchasing CAS-002 exam product. There are also lots of discounts and promotion offers that you can avail. Let’s try a free demo http://www.test4direct.com/CAS-002.html
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Question: 1<br />
Which of the following would be used in forensic analysis of a compromised Linux system? (Select<br />
THREE).<br />
A. Check log files for logins from unauthorized IPs.<br />
B. Check /proc/kmem for fragmented memory segments.<br />
C. Check for unencrypted passwords in /etc/shadow.<br />
D. Check timestamps for files modified around time of compromise.<br />
E. Use lsof to determine files with future timestamps.<br />
F. Use gpg to encrypt compromised data files.<br />
G. Verify the MD5 checksum of system binaries.<br />
H. Use vmstat to look for excessive disk I/O.<br />
Question: 2<br />
Question: 3<br />
Answer: A,D,G<br />
The Chief Executive Officer (CEO) of an Internet service provider (ISP) has decided to limit the<br />
company’s contribution to worldwide Distributed Denial of Service (DDoS) attacks. Which of the<br />
following should the ISP implement? (Select TWO).<br />
A. Block traffic from the ISP’s networks destined for blacklisted IPs.<br />
B. Prevent the ISP’s customers from querying DNS servers other than those hosted by the ISP.<br />
C. Scan the ISP’s customer networks using an up-to-date vulnerability scanner.<br />
D. Notify customers when services they run are involved in an attack.<br />
E. Block traffic with an IP source not allocated to customers from exiting the ISP's network.<br />
Answer: D,E<br />
A security administrator wants to prevent sensitive data residing on corporate laptops and desktops<br />
from leaking outside of the corporate network. The company has already implemented full-disk<br />
encryption and has disabled all peripheral devices on its desktops and laptops. Which of the<br />
following additional controls MUST be implemented to minimize the risk of data leakage?<br />
(Select TWO).<br />
A. A full-system backup should be implemented to a third-party provider with strong encryption for<br />
data in transit.<br />
B. A DLP gateway should be installed at the company border.<br />
C. Strong authentication should be implemented via external biometric devices.<br />
D. Full-tunnel VPN should be required for all network communication.<br />
E. Full-drive file hashing should be implemented with hashes stored on separate storage.<br />
F. Split-tunnel VPN should be enforced when transferring sensitive data.