An organization is facing budget constraints The Chief Technology Officer (CTO) wants to add a new marketing platform but the organization does not have the resources to obtain separate servers to run the new platform. The CTO recommends running the new marketing platform on a virtualized video-conferencing server because video conferencing is rarely used The Chief Information Security Officer (CISO) denies this request Which of the following BEST explains the reason why the CISO has not approved the request?
A. Privilege escalation attacks
B. Performance and availability
C. Weak DAR encryption
D. Disparate security requirements
Several days after deploying an MDM for smartphone control, an organization began noticing anomalous behavior across the enterprise Security analysts observed the following:
1.
Unauthorized certificate issuance
2.
Access to mutually authenticated resources utilizing valid but unauthorized certificates
3.
Granted access to internal resources via the SSL VPN
To address the immediate problem security analysts revoked the erroneous certificates. Which of the following describes the MOST likely root cause of the problem and offers a solution?
A. The VPN and web resources are configured with too weak a cipher suite and should be rekeyed to support AES 256 in GCM and ECC for digital signatures and key exchange
B. A managed mobile device is rooted exposing its keystore and the MDM should be reconfigured to wipe these devices and disallow access to corporate resources
C. SCEP is configured insecurely which should be enabled for device onboarding against a PKI for mobile-exclusive use
D. The CA is configured to sign any received CSR from mobile users and should be reconfigured to permit CSR signings only from domain administrators.
The Chief Executive Officer (CEO) of a fast-growing company no longer knows all the employees and is concerned about the company's intellectual property being stolen by an employee. Employees are allowed to work remotely with flexible hours, creating unpredictable schedules. Roles are poorly defined due to frequent shifting needs across the company. Which of the following new initiatives by the information security team would BEST secure the company and mitigate the CEO's concerns?
A. Begin simulated phishing campaigns for employees and follow up with additional security awareness training.
B. Seed company fileshares and servers with text documents containing fake passwords and then monitor for their use.
C. Implement DLP to monitor data transfer between employee accounts and external parties and services
D. Report data from a user-behavior monitoring tool and assign security analysts to review it daily
A video-game developer has received reports of players who are cheating. All game players each have five capabilities that are ranked on a scale of 1 to 10 points, with 10 total points available for balance. Players can move these points between capabilities at any time The programming logic is as follows:
1.
A player asks to move points from one capability to another
2.
The source capability must have enough points to allow the move
3.
The destination capability must not exceed 10 after the move
4.
The move from source capability to destination capability is then completed
The time stamps of the game logs show each step of the transfer process takes about 900ms However, the time stamps of the cheating players show capability transfers at the exact same time. The cheating players have 10 points in multiple capabilities. Which of the following is MOST likely being exploited to allow these capability transfers?
A. TOC/TOU
B. CSRF
C. Memory leak
D. XSS
E. SQL injection
F. Integer overflow
An attacker exploited an unpatched vulnerability in a web framework, and then used an application service account that had an insecure configuration to download a rootkit The attacker was unable to obtain root privileges Instead the attacker then downloaded a crypto-currency mining program and subsequently was discovered The server was taken offline, rebuilt, and patched. Which of the following should the security engineer suggest to help prevent a similar scenario in the future?
A. Remove root privileges from the application service account
B. Implement separation of duties.
C. Properly configure SELinux and set it to enforce.
D. Use cron to schedule regular restarts of the service to terminate sessions.
E. Perform regular uncredentialed vulnerability scans
A penetration tester is given an assignment lo gain physical access to a secure facility with perimeter cameras. The secure facility does not accept visitors and entry is available only through a door protected by an RFID key and a guard stationed inside the door Which of the following would be BEST for the penetration tester to attempt?
A. Gam entry into the building by posing as a contractor who is performing routine building maintenance
B. Tailgate into the facility with an employee who has a valid RFID badge to enter
C. Duplicate an employees RFID badge and use an IR camera to see when the guard leaves the post
D. Look for an open window that can be used to gain unauthorized entry into the facility
A development team releases updates to an application regularly. The application is compiled with several standard open-source security products that require a minimum version for compatibility. During the security review portion of the development cycle, which of the following should be done to minimize possible application vulnerabilities?
A. The developers should require an exact version of the open-source security products, preventing the introduction of new vulnerabilities.
B. The application development team should move to an Agile development approach to identify security concerns faster
C. The change logs for the third-party libraries should be reviewed for security patches, which may need to be included in the release.
D. The application should eliminate the use of open-source libraries and products to prevent known vulnerabilities from being included.
The Chief Executive Officer )CEO) of a small company decides to use cloud computing to host critical corporate data for protection from natural disasters. The recommended solution is to adopt the public cloud for its cost savings If the CEO insists on adopting the public cloud model, which of the following would be the BEST advice?
A. Ensure the cloud provider supports a secure virtual desktop infrastructure
B. Ensure the colocation facility implements a robust DRP to help with business continuity planning.
C. Ensure the on-premises datacenter employs fault tolerance and load balancing capabilities.
D. Ensure the ISP is using a standard help-desk ticketing system to respond to any system outages
During an audit, it was determined from a sample that four out of 20 former employees were still accessing their email accounts An information security analyst is reviewing the access to determine if the audit was valid Which of the following would assist with the validation and provide the necessary documentation to audit?
A. Examining the termination notification process from human resources and employee account access logs
B. Checking social media platforms for disclosure of company sensitive and proprietary information
C. Sending a test email to the former employees to document an undeliverable email and review the ERP access
D. Reviewing the email global account list and the collaboration platform for recent activity
A healthcare company wants to increase the value of the data it collects on its patients by making the data available to third-party researchers for a fee Which of the following BEST mitigates the risk to the company?
A. Log all access to the data and correlate with the researcher
B. Anonymize identifiable information using keyed strings
C. Ensure all data is encrypted in transit to the researcher
D. Ensure all researchers sign and abide by non-disclosure agreements
E. Sanitize date and time stamp information in the records.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.