Free CAS-003 Exam Braindumps (page: 18)

Page 18 of 137

A deployment manager is working with a software development group to assess the security of a new version of the organization’s internally developed ERP tool. The organization prefers to not perform assessment activities following deployment, instead focusing on assessing security throughout the life cycle. Which of the following methods would BEST assess the security of the product?

  1. Static code analysis in the IDE environment
  2. Penetration testing of the UAT environment
  3. Vulnerability scanning of the production environment
  4. Penetration testing of the production environment
  5. Peer review prior to unit testing

Answer(s): C



During a security event investigation, a junior analyst fails to create an image of a server’s hard drive before removing the drive and sending it to the forensics analyst. Later, the evidence from the analysis is not usable in the prosecution of the attackers due to the uncertainty of tampering. Which of the following should the junior analyst have followed?

  1. Continuity of operations
  2. Chain of custody
  3. Order of volatility
  4. Data recovery

Answer(s): C


Reference:

https://www.computer-forensics-recruiter.com/order-of-volatility/



A team is at the beginning stages of designing a new enterprise-wide application. The new application will have a large database and require a capital investment in hardware. The Chief Information Officer (СIO) has directed the team to save money and reduce the reliance on the datacenter, and the vendor must specialize in hosting large databases in the cloud. Which of the following cloud-hosting options would BEST meet these needs?

  1. Multi-tenancy SaaS
  2. Hybrid IaaS
  3. Single-tenancy PaaS
  4. Community IaaS

Answer(s): C



A company wants to extend its help desk availability beyond business hours. The Chief Information Officer (CIO) decides to augment the help desk with a third-party service that will answer calls and provide Tier 1 problem resolution, such as password resets and remote assistance. The security administrator implements the following firewall change:


The administrator provides the appropriate path and credentials to the third-party company. Which of the following technologies is MOST likely being used to provide access to the third company?

  1. LDAP
  2. WAYF
  3. OpenID
  4. RADIUS
  5. SAML

Answer(s): D



Page 18 of 137



Post your Comments and Discuss CompTIA CAS-003 exam with other Community members:

Nathan commented on April 20, 2020
I appreicate that you provide the Xengine software for free. But are you planning to keep it free! I really hope so!
GERMANY
upvote