To be honest, you only master the theoretical information without practical experience is not ample at all. Together with our CompTIA CompTIA on the web training course, the crucial contents in the CompTIA certification exam will probably be within your current grasp firmly. The actual CompTIA CompTIA exam practice questions will strengthen your current knowledge, build your confidence and also boost your current proficiency.

2021 Oct CAS-001 exam answers

Q301. - (Topic 5) 

The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality. Which of the following equipment MUST be deployed to guard against unknown threats? 

A. Cloud-based antivirus solution, running as local admin, with push technology for definition updates. 

B. Implementation of an offsite data center hosting all company data, as well as deployment of VDI for all client computing needs. 

C. Host based heuristic IPS, segregated on a management VLAN, with direct control of the perimeter firewall ACLs. 

D. Behavior based IPS with a communication link to a cloud based vulnerability and threat feed. 

Answer:


Q302. - (Topic 5) 

An organization is finalizing a contract with a managed security services provider (MSSP) that is responsible for primary support of all security technologies. Which of the following should the organization require as part of the contract to ensure the protection of the organization’s technology? 

A. An operational level agreement 

B. An interconnection security agreement 

C. A non-disclosure agreement 

D. A service level agreement 

Answer:


Q303. - (Topic 2) 

The security administrator has noticed a range of network problems affecting the proxy server. Based on reviewing the logs, the administrator notices that the firewall is being targeted with various web attacks at the same time that the network problems are occurring. Which of the following strategies would be MOST effective in conducting an in-depth assessment and remediation of the problems? 

A. 1. Deploy an HTTP interceptor on the switch span port; 2. Adjust the external facing NIDS; 3. Reconfigure the firewall ACLs to block the all traffic above port 2000; 4. Verify the proxy server is configured correctly and hardened; 5. Review the logs weekly in the future. 

B. 1. Deploy a protocol analyzer on the switch span port; 2. Adjust the internal HIDS; 3. Reconfigure the firewall ACLs to block outbound HTTP traffic; 4. Reboot the proxy server; 

5. Continue to monitor the network. 

C. 1. Deploy a protocol analyzer on the switch span port; 2. Adjust the external facing IPS; 

3. Reconfigure the firewall ACLs to block unnecessary ports; 4. Verify the proxy server is configured correctly and hardened; 5. Continue to monitor the network. 

D. 1. Deploy a network fuzzer on the switch span port; 2. Adjust the external facing IPS; 3. Reconfigure the proxy server to block the attacks; 4. Verify the firewall is configured correctly and hardened. 

Answer:


Q304. - (Topic 1) 

SDLC is being used for the commissioning of a new platform. To provide an appropriate level of assurance the security requirements that were specified at the project origin need to be carried through to implementation. Which of the following would BEST help to determine if this occurred? 

A. Requirements workshop 

B. Security development lifecycle (SDL) 

C. Security requirements traceability matrix (SRTM) 

D. Secure code review and penetration test 

Answer:


Q305. - (Topic 5) 

A security engineer is a new member to a configuration board at the request of management. The company has two new major IT projects starting this year and wants to plan security into the application deployment. The board is primarily concerned with the applications’ compliance with federal assessment and authorization standards. The security engineer asks for a timeline to determine when a security assessment of both applications should occur and does not attend subsequent configuration board meetings. If the security engineer is only going to perform a security assessment, which of the following steps in system authorization has the security engineer omitted? (Select TWO). 

A. Establish the security control baseline to be assessed 

B. Build the application according to software development security standards 

C. Write the systems functionality requirements into the security requirements traceability matrix 

D. Review the results of user acceptance testing 

E. Categorize the applications according to use 

F. Consult with the stakeholders to determine which standards can be omitted 

Answer: A,E 


Renewal CAS-001 practice exam:

Q306. - (Topic 3) 

Which of the following provides the HIGHEST level of security for an integrated network providing services to authenticated corporate users? 

A. Point to point VPN tunnels for external users, three-factor authentication, a cold site, physical security guards, cloud based servers, and IPv6 networking. 

B. IPv6 networking, port security, full disk encryption, three-factor authentication, cloud based servers, and a cold site. 

C. Port security on switches, point to point VPN tunnels for user server connections, two-factor cryptographic authentication, physical locks, and a standby hot site. 

D. Port security on all switches, point to point VPN tunnels for user connections to servers, two-factor authentication, a sign-in roster, and a warm site. 

Answer:


Q307. - (Topic 3) 

A small customer focused bank with implemented least privilege principles, is concerned about the possibility of branch staff unintentionally aiding fraud in their day to day 

interactions with customers. Bank staff has been encouraged to build friendships with customers to make the banking experience feel more personal. The security and risk team have decided that a policy needs to be implemented across all branches to address the risk. Which of the following BEST addresses the security and risk team’s concerns? 

A. Information disclosure policy 

B. Awareness training 

C. Job rotation 

D. Separation of duties 

Answer:


Q308. - (Topic 2) 

Which of the following is the MOST secure way to ensure third party applications and introduce only acceptable risk? 

A. Line by line code review and simu-lation; uncovers hidden vulnerabilities and allows for behavior to be observed with minimal risk. 

B. Technical exchange meetings with the application’s vendor; vendors have more in depth knowledge of the product. 

C. Pilot trial; minimizes the impact to the enterprise while still providing services to enterprise users. 

D. Full deployment with crippled features; allows for large scale testing and observation of the applications security profile. 

Answer:


Q309. - (Topic 4) 

Company XYZ recently acquired a manufacturing plant from Company ABC which uses a different manufacturing ICS platform. Company XYZ has strict ICS security regulations while Company ABC does not. Which of the following approaches would the network security administrator for Company XYZ MOST likely proceed with to integrate the new manufacturing plant? 

A. Conduct a network vulnerability assessment of acquired plant ICS platform and correct all identified flaws during integration. 

B. Convert the acquired plant ICS platform to the Company XYZ standard ICS platform solely to eliminate potential regulatory conflicts. 

C. Conduct a risk assessment of the acquired plant ICS platform and implement any necessary or required controls during integration. 

D. Require Company ABC to bring their ICS platform into regulatory compliance prior to integrating the new plant into Company XYZ’s network. 

Answer:


Q310. - (Topic 3) 

The Chief Technology Officer (CTO) has decided that servers in the company datacenter should be virtualized to conserve physical space. The risk assurance officer is concerned that the project team in charge of virtualizing servers plans to co-mingle many guest operating systems with different security requirements to speed up the rollout and reduce the number of host operating systems or hypervisors required. 

Which of the following BEST describes the risk assurance officer’s concerns? 

A. Co-mingling guest operating system with different security requirements allows guest OS privilege elevation to occur within the guest OS via shared memory allocation with the host OS. 

B. Co-mingling of guest operating systems with different security requirements increases the risk of data loss if the hypervisor fails. 

C. A weakly protected guest OS combined with a host OS exploit increases the chance of a successful VMEscape attack being executed, compromising the hypervisor and other guest OS. 

D. A weakly protected host OS will allow the hypervisor to become corrupted resulting in data throughput performance issues. 

Answer: