An incident responder wants to capture volatile memory comprehensively from a running machine for forensic purposes. The machine is running a very recent release of the Linux OS.Which of the following technical approaches would be the MOST feasible way to accomplish this capture?
Answer(s): D
A request has been approved for a vendor to access a new internal server using only HTTPS and SSH to manage the back-end system for the portal. Internal users just need HTTP and HTTPS access to all internal web servers. All other external access to the new server and its subnet is not allowed. The security manager must ensure proper access is configured.Below is a snippet from the firewall related to that server (access is provided in a top-down model): Which of the following lines should be configured to allow the proper access? (Choose two.)
Answer(s): A,F
A firewall specialist has been newly assigned to participate in red team exercises and needs to ensure the skills represent real-world threats.Which of the following would be the BEST choice to help the new team member learn bleeding-edge techniques?
Answer(s): A
An organization is implementing a virtualized thin-client solution for normal user computing and access. During a review of the architecture, concerns were raised that an attacker could gain access to multiple user environments by simply gaining a foothold on a single one with malware. Which of the following reasons BEST explains this?
Answer(s): C
Post your Comments and Discuss CompTIA CAS-003 exam with other Community members:
Nathan commented on April 20, 2020 I appreicate that you provide the Xengine software for free. But are you planning to keep it free! I really hope so! GERMANY upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the CAS-003 content, but please register or login to continue.