11.02.2016 Views

CAS-002 Latest Exam BrainDumps

Test4Direct provides latest PDF questions of CompTIA CAS-002 exam. You have an opportunity to pass the CompTIA CAS-002 exam in one go. Test4Direct is most accurate source to prepare CompTIA CAS-002 exam as your success will become site’s responsibility after purchasing CAS-002 exam product. There are also lots of discounts and promotion offers that you can avail. Let’s try a free demo http://www.test4direct.com/CAS-002.html

Test4Direct provides latest PDF questions of CompTIA CAS-002 exam. You have an opportunity to pass the CompTIA CAS-002 exam in one go. Test4Direct is most accurate source to prepare CompTIA CAS-002 exam as your success will become site’s responsibility after purchasing CAS-002 exam product. There are also lots of discounts and promotion offers that you can avail. Let’s try a free demo http://www.test4direct.com/CAS-002.html

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Question: 1<br />

Which of the following would be used in forensic analysis of a compromised Linux system? (Select<br />

THREE).<br />

A. Check log files for logins from unauthorized IPs.<br />

B. Check /proc/kmem for fragmented memory segments.<br />

C. Check for unencrypted passwords in /etc/shadow.<br />

D. Check timestamps for files modified around time of compromise.<br />

E. Use lsof to determine files with future timestamps.<br />

F. Use gpg to encrypt compromised data files.<br />

G. Verify the MD5 checksum of system binaries.<br />

H. Use vmstat to look for excessive disk I/O.<br />

Question: 2<br />

Question: 3<br />

Answer: A,D,G<br />

The Chief Executive Officer (CEO) of an Internet service provider (ISP) has decided to limit the<br />

company’s contribution to worldwide Distributed Denial of Service (DDoS) attacks. Which of the<br />

following should the ISP implement? (Select TWO).<br />

A. Block traffic from the ISP’s networks destined for blacklisted IPs.<br />

B. Prevent the ISP’s customers from querying DNS servers other than those hosted by the ISP.<br />

C. Scan the ISP’s customer networks using an up-to-date vulnerability scanner.<br />

D. Notify customers when services they run are involved in an attack.<br />

E. Block traffic with an IP source not allocated to customers from exiting the ISP's network.<br />

Answer: D,E<br />

A security administrator wants to prevent sensitive data residing on corporate laptops and desktops<br />

from leaking outside of the corporate network. The company has already implemented full-disk<br />

encryption and has disabled all peripheral devices on its desktops and laptops. Which of the<br />

following additional controls MUST be implemented to minimize the risk of data leakage?<br />

(Select TWO).<br />

A. A full-system backup should be implemented to a third-party provider with strong encryption for<br />

data in transit.<br />

B. A DLP gateway should be installed at the company border.<br />

C. Strong authentication should be implemented via external biometric devices.<br />

D. Full-tunnel VPN should be required for all network communication.<br />

E. Full-drive file hashing should be implemented with hashes stored on separate storage.<br />

F. Split-tunnel VPN should be enforced when transferring sensitive data.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!