Free CAS-003 Exam Braindumps (page: 79)

Page 79 of 137

A company recently implemented a variety of security services to detect various types of traffic that pose a threat to the company. The following services were enabled within the network:

-Scan of specific subsets for vulnerabilities
-Categorizing and logging of website traffic
-Enabling specific ACLs based on application traffic
-Sending suspicious files to a third-party site for validation

A report was sent to the security team that identified multiple incidents of users sharing large amounts of data from an on-premise server to a public site. A small percentage of that data also contained malware and spyware

Which of the following services MOST likely identified the behavior and sent the report?

  1. Content filter
  2. User behavioral analytics
  3. Application sandbox
  4. Web application firewall
  5. Endpoint protection
  6. Cloud security broker

Answer(s): B



An external red team member conducts a penetration test, attempting to gain physical access to a large organization's server room in a branch office. During reconnaissance, the red team member sees a clearly marked door to the server room, located next to the lobby, with a tumbler lock.

Which of the following is BEST for the red team member to bring on site to open the locked door as quickly as possible without causing significant damage?

  1. Screwdriver set
  2. Bump key
  3. RFID duplicator
  4. Rake picking

Answer(s): D



A company relies on an ICS to perform equipment monitoring functions that are federally mandated for operation of the facility. Fines for non-compliance could be costly. The ICS has known vulnerabilities and can no longer be patched or updated. Cyber-liability insurance cannot be obtained because insurance companies will not insure this equipment.

Which of the following would be the BEST option to manage this risk to the company's production environment?

  1. Avoid the risk by removing the ICS from production
  2. Transfer the risk associated with the ICS vulnerabilities
  3. Mitigate the risk by restricting access to the ICS
  4. Accept the risk and upgrade the ICS when possible

Answer(s): B



During a sprint, developers are responsible for ensuring the expected outcome of a change is thoroughly evaluated for any security impacts. Any impacts must be reported to the team lead. Before changes are made to the source code, which of the following MUST be performed to provide the required information to the team lead?

  1. Risk assessment
  2. Regression testing
  3. User story development
  4. Data abstraction
  5. Business impact assessment

Answer(s): B



Page 79 of 137



Post your Comments and Discuss CompTIA CAS-003 exam with other Community members:

Nathan commented on April 20, 2020
I appreicate that you provide the Xengine software for free. But are you planning to keep it free! I really hope so!
GERMANY
upvote