Free CAS-003 Exam Braindumps (page: 24)

Page 24 of 137

Security policies that are in place at an organization prohibit USB drives from being utilized across the entire enterprise, with adequate technical controls in place to block them. As a way to still be able to work from various locations on different computing resources, several sales staff members have signed up for a web- based storage solution without the consent of the IT department. However, the operations department is required to use the same service to transmit certain business partner documents.

Which of the following would BEST allow the IT department to monitor and control this behavior?

  1. Enabling AAA
  2. Deploying a CASB
  3. Configuring an NGFW
  4. Installing a WAF
  5. Utilizing a vTPM

Answer(s): B



Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic records for 2000 sales force employees. Source records will be email, PC, network shares, and applications.

After all restrictions have been lifted, which of the following should the information manager review?

  1. Data retention policy
  2. Legal hold
  3. Chain of custody
  4. Scope statement

Answer(s): A



As a security administrator, you are asked to harden a server running Red Hat Enterprise Server 5.5 64-bit. This server is being used as a DNS and time server. It is not used as a database, web server, or print server. There are no wireless connections to the server, and it does not need to print.
The command window will be provided along with root access. You are connected via a secure shell with root access.
You may query help for a list of commands.

Instructions:
You need to disable and turn off unrelated services and processes.
It is possible to simulate a crash of your server session. The simulation can be reset, but the server cannot be rebooted. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

  1. Please refer to Explanation below for the answer.

Answer(s): A

Explanation:

Step 1:
The ps command is the “process status” command. By using ps -A, you can list all currently running services, including their Process Identifiers (PID).

You can disable services using the kill command, such as, for example, kill -9 1125, which would stop whichever process is PID 1125.

Step 2:
The chkconfig –list command displays a list of system services and whether they are started (on) or stopped (off) in runlevels 0-6.

Step 3:
Importantly, chkconfig –list will allow you to see what services are running at level 3 (which means they will re- enable at restart) and you can use chkconfig –level 3 off to turn off the services you just killed. Once you do this, the sim is done and you can move on.



The legal department has required that all traffic to and from a company’s cloud-based word processing and email system is logged. To meet this requirement, the Chief Information Security Officer (CISO) has implemented a next-generation firewall to perform inspection of the secure traffic and has decided to use a cloud-based log aggregation solution for all traffic that is logged.

Which of the following presents a long-term risk to user privacy in this scenario?

  1. Confidential or sensitive documents are inspected by the firewall before being logged.
  2. Latency when viewing videos and other online content may increase.
  3. Reports generated from the firewall will take longer to produce due to more information from inspected traffic.
  4. Stored logs may contain non-encrypted usernames and passwords for personal websites.

Answer(s): A



Page 24 of 137



Post your Comments and Discuss CompTIA CAS-003 exam with other Community members:

Nathan commented on April 20, 2020
I appreicate that you provide the Xengine software for free. But are you planning to keep it free! I really hope so!
GERMANY
upvote