CAS-003 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam

Question No.1

An organization is engaged in international business operations and is required to comply with various legal frameworks. In addition to changes in legal frameworks, which of thefollowing is a primary purpose of a compliance management program?

  1. Following new requirements that result from contractual obligations

  2. Answering requests from auditors that relate to e-discovery

  3. Responding to changes in regulatory requirements

  4. Developing organizational policies that relate to hiring and termination procedures

Correct Answer: C

Question No.2

A security engineer is working with a software development team. The engineer is tasked with ensuring all security requirements are adhered to by the developers. Which of the following BEST describes the contents of the supporting documentthe engineer is creating?

  1. A series of ad-hoc tests that each verify security control functionality of the entire system at once.

  2. A series of discrete tasks that, when viewed in total, can be used to verify and document each individual constraint from the SRTM.

  3. A set of formal methods that apply to one or more of the programing languages used on the development project.

  4. A methodology to verify each security control in each unit of developed code prior to committing the code.

Correct Answer: D

Question No.3

The legal department has required that all traffic to and from a company#39;s cloud-based word processing and email system islogged. To meet this requirement, the Chief Information Security Officer (CISO) has implemented a next-generation firewall to perform inspection of the secure traffic and has decided to use a cloud-based log aggregation solution for all traffic that is logged. Which of the following presents a long-term risk to user privacy in this scenario?

  1. Confidential or sensitive documents are inspected by the firewall before being logged.

  2. Latency when viewing videos and other online content may increase.

  3. Reports generated from the firewall will take longer to produce due to more information from inspected traffic.

  4. Stored logs may contain non-encrypted usernames and passwords for personal websites.

Correct Answer: A

Question No.4

A security engineer has been hired to design a device that will enable the exfiltration of data from within a well-defended network perimeter during an authorized test. The device must bypass all firewalls and NIDS in place, as well as allow for the upload of commands from a centralized command and control answer. The total cost of the device must be kept to a minimum in case the device is discovered during an assessment. Which of the following tools should the engineer load onto the device being designed?

  1. Custom firmware with rotating key generation

  2. Automatic MITM proxy

  3. TCP beacon broadcast software

  4. Reverse shell endpoint listener

Correct Answer: B

Question No.5

After investigating virus outbreaks that have cost the company $1,000 per incident, the company#39;s Chief Information Security Officer (CISO) has been researching new antivirus software solutions to use and be fully supported for the next two years. The CISO has narrowed down the potential solutions to four candidates that meet all the company#39;s performance and capability requirements:


Using the table above, which of the following would be the BEST business-driven choice among five possible solutions?

  1. Product A

  2. Product B

  3. Product C

  4. Product D

  5. Product E

Correct Answer: E

Question No.6

A security analyst is reviewing the corporate MDM settings and notices some disabled settings, which consequently permit users to download programs from untrusted developers and manually install them. After someconversations, it is confirmed that these settings were disabled to support the internal development of mobile applications. The security analyst is now recommending that developers and testers have a separate device profile allowing this, and that the rest of the organization#39;s users do not have the ability to manually download and install untrusted applications. Which of the following settings should be toggled to achieve the goal? (Choose two.)

  1. OTA updates

  2. Remote wiping

  3. Side loading

  4. Sandboxing

  5. Containerization

  6. Signed applications

Correct Answer: EF

Question No.7

A security engineer must establish amethod to assess compliance with company security policies as they apply to the unique configuration of individual endpoints, as well as to the shared configuration policies of common devices.


Which of the following tools is the security engineer usingto produce the above output?

  1. Vulnerability scanner

  2. SIEM

  3. Port scanner

  4. SCAP scanner

Correct Answer: B

Question No.8

A security analyst has been asked to create a list of external IT security concerns, which are applicable to the organization. The intent is to show the different types of external actors, their attack vectors, and the types of vulnerabilities that would cause business impact. The Chief Information Security Officer (CISO) will then present this list to the board to request funding for controls in areas that have insufficient coverage. Which of the following exercise types should the analyst perform?

  1. Summarize the most recently disclosed vulnerabilities.

  2. Research industry best practices and latest RFCs.

  3. Undertake an external vulnerability scan and penetration test.

  4. Conduct a threat modeling exercise.

Correct Answer: D

Question No.9

A company wants to extend its help desk availability beyond business hours. The Chief Information Officer (CIO) decides to augment the help desk with a third-party service that will answer calls and provide Tier 1 problem resolution, suchas password resets and remote assistance. The security administrator implements the following firewall change:


The administrator provides the appropriate path and credentials to the third-party company. Which of the following technologies is MOST likelybeing used to provide access to the third company?

  1. LDAP

  2. WAYF

  3. OpenID


  5. SAML

Correct Answer: D

Question No.10

A large enterprise with thousands of users is experiencing a relatively high frequency of malicious activity from the insider threats. Much of the activity appears to involve internal reconnaissance that results in targeted attacks against privileged users and network file shares. Given this scenario, which of the following would MOST likely prevent or deter these attacks? (Choose two.)

  1. Conduct role-based training for privileged users that highlights common threats against them and covers best practices to thwart attacks

  2. Increase the frequency at which host operating systems are scanned for vulnerabilities, and decrease the amount of time permitted between vulnerability identification and the application of corresponding patches

  3. Enforce command shell restrictions via group policies for all workstations by default to limit which native operating system tools are available for use

  4. Modify the existing rules of behavior to include an explicit statement prohibiting users from enumerating user and file directories using available tools and/or accessing visible resources that do not directly pertain to their job functions

  5. For all workstations, implement full-disk encryption andconfigure UEFI instances to require complex passwords for authentication

  6. Implement application blacklisting enforced by the operating systems of all machines in the enterprise

Correct Answer: CD

Get Full Version of CAS-003 Dumps