Free CAS-003 Exam Braindumps (page: 38)

Page 38 of 137

The government is concerned with remote military missions being negatively impacted by the use of technology that may fail to protect operational security. To remediate this concern, a number of solutions have been implemented, including the following:

-End-to-end encryption of all inbound and outbound communication, including personal email and chat sessions that allow soldiers to securely communicate with families.
-Layer 7 inspection and TCP/UDP port restriction, including firewall rules to only allow TCP port 80 and 443 and approved applications
-A host-based whitelist of approved websites and applications that only allow mission-related tools and sites
-The use of satellite communication to include multiple proxy servers to scramble the source IP address

Which of the following is of MOST concern in this scenario?

  1. Malicious actors intercepting inbound and outbound communication to determine the scope of the mission
  2. Family members posting geotagged images on social media that were received via email from soldiers
  3. The effect of communication latency that may negatively impact real-time communication with mission control
  4. The use of centrally managed military network and computers by soldiers when communicating with external parties

Answer(s): B



Given the following code snippet:


Of which of the following is this snippet an example?

  1. Data execution prevention
  2. Buffer overflow
  3. Failure to use standard libraries
  4. Improper filed usage
  5. Input validation

Answer(s): E



A company has created a policy to allow employees to use their personally owned devices. The Chief Information Security Officer (CISO) is getting reports of company data appearing on unapproved forums and an increase in theft of personal electronic devices.

Which of the following security controls would BEST reduce the risk of exposure?

  1. Disk encryption on the local drive
  2. Group policy to enforce failed login lockout
  3. Multifactor authentication
  4. Implementation of email digital signatures

Answer(s): A



After a large organization has completed the acquisition of a smaller company, the smaller company must implement new host-based security controls to connect its employees’ devices to the network. Given that the network requires 802.1X EAP-PEAP to identify and authenticate devices, which of the following should the security administrator do to integrate the new employees’ devices into the network securely?

  1. Distribute a NAC client and use the client to push the company’s private key to all the new devices.
  2. Distribute the device connection policy and a unique public/private key pair to each new employee’s device.
  3. Install a self-signed SSL certificate on the company’s RADIUS server and distribute the certificate’s public key to all new client devices.
  4. Install an 802.1X supplicant on all new devices and let each device generate a self-signed certificate to use for network access.

Answer(s): C



Page 38 of 137



Post your Comments and Discuss CompTIA CAS-003 exam with other Community members:

Nathan commented on April 20, 2020
I appreicate that you provide the Xengine software for free. But are you planning to keep it free! I really hope so!
GERMANY
upvote