Free CAS-003 Exam Braindumps (page: 72)

Page 72 of 137

A laptop is recovered a few days after it was stolen.
Which of the following should be verified during incident response activities to determine the possible impact of the incident?

  1. Full disk encryption status
  2. TPM PCR values
  3. File system integrity
  4. Presence of UEFI vulnerabilities

Answer(s): D



Ann, a security administrator, is conducting an assessment on a new firewall, which was placed at the perimeter of a network containing PII. Ann runs the following commands on a server (10.0.1.19) behind the firewall:


From her own workstation (192.168.2.45) outside the firewall, Ann then runs a port scan against the server and records the following packet capture of the port scan:



Connectivity to the server from outside the firewall worked as expected prior to executing these commands. Which of the following can be said about the new firewall?

  1. It is correctly dropping all packets destined for the server.
  2. It is not blocking or filtering any traffic to the server.
  3. Iptables needs to be restarted.
  4. The IDS functionality of the firewall is currently disabled.

Answer(s): A



A new database application was added to a company’s hosted VM environment. Firewall ACLs were modified to allow database users to access the server remotely. The company’s cloud security broker then identified abnormal from a database user on-site. Upon further investigation, the security team noticed the user ran code on a VM that provided access to the hypervisor directly and access to other sensitive data.

Which of the following should the security team do to help mitigate future attacks within the VM environment? (Choose two.)

  1. Install the appropriate patches.
  2. Install perimeter NGFW.
  3. Configure VM isolation.
  4. Deprovision database VM.
  5. Change the user’s access privileges.
  6. Update virus definitions on all endpoints.

Answer(s): A,C



A penetration testing manager is contributing to an RFP for the purchase of a new platform. The manager has provided the following requirements:

-Must be able to MITM web-based protocols
-Must be able to find common misconfigurations and security holes

Which of the following types of testing should be included in the testing platform? (Choose two.)

  1. Reverse engineering tool
  2. HTTP intercepting proxy
  3. Vulnerability scanner
  4. File integrity monitor
  5. Password cracker
  6. Fuzzer

Answer(s): B,C



Page 72 of 137



Post your Comments and Discuss CompTIA CAS-003 exam with other Community members:

Nathan commented on April 20, 2020
I appreicate that you provide the Xengine software for free. But are you planning to keep it free! I really hope so!
GERMANY
upvote