Free CAS-003 Exam Braindumps (page: 47)

Page 47 of 137

A security analyst who is concerned about sensitive data exfiltration reviews the following:


Which of the following tools would allow the analyst to confirm if data exfiltration is occuring?

  1. Port scanner
  2. SCAP tool
  3. File integrity monitor
  4. Protocol analyzer

Answer(s): D



As part of the development process for a new system, the organization plans to perform requirements analysis and risk assessment. The new system will replace a legacy system, which the organization has used to perform data analytics.

Which of the following is MOST likely to be part of the activities conducted by management during this phase of the project?

  1. Static code analysis and peer review of all application code
  2. Validation of expectations relating to system performance and security
  3. Load testing the system to ensure response times is acceptable to stakeholders
  4. Design reviews and user acceptance testing to ensure the system has been deployed properly
  5. Regression testing to evaluate interoperability with the legacy system during the deployment

Answer(s): B



A system owner has requested support from data owners to evaluate options for the disposal of equipment containing sensitive data. Regulatory requirements state the data must be rendered unrecoverable via logical means or physically destroyed.

Which of the following factors is the regulation intended to address?

  1. Sovereignty
  2. E-waste
  3. Remanence
  4. Deduplication

Answer(s): C



During a criminal investigation, the prosecutor submitted the original hard drive from the suspect’s computer as evidence. The defense objected during the trial proceedings, and the evidence was rejected. Which of the following practices should the prosecutor’s forensics team have used to ensure the suspect’s data would be admissible as evidence? (Select TWO.)

  1. Follow chain of custody best practices
  2. Create an identical image of the original hard drive, store the original securely, and then perform forensics only on the imaged drive.
  3. Use forensics software on the original hard drive and present generated reports as evidence
  4. Create a tape backup of the original hard drive and present the backup as evidence
  5. Create an exact image of the original hard drive for forensics purposes, and then place the original back in service

Answer(s): A,B



Page 47 of 137



Post your Comments and Discuss CompTIA CAS-003 exam with other Community members:

Nathan commented on April 20, 2020
I appreicate that you provide the Xengine software for free. But are you planning to keep it free! I really hope so!
GERMANY
upvote