A global company has decided to implement a cross-platform baseline of security settings for all company laptops. A security engineer is planning and executing the project. Which of the following should the security engineer recommend?
A. Replace each laptop in the company's environment with a standardized laptop that is preconfigured to match the baseline settings
B. Create batch script files that will enable the baseline security settings and distribute them to global employees for execution
C. Send each laptop to a regional IT office to be reimaged with the new baseline security settings enabled and then redeployed
D. Establish GPO configurations for each baseline setting, test that each works as expected, and have each setting deployed to the laptops.
E. Leverage an MDM solution to apply the baseline settings and deploy continuous monitoring of security configurations.
An organization is moving internal core data-processing functions related to customer data to a global public cloud provider that uses aggregated services from other partner organizations. Which of the following compliance issues will MOST likely be introduced as a result of the migration?
A. Internal data integrity standards and outsourcing contracts and partnerships
B. Data ownership, internal data classification, and risk profiling of outsourcers
C. Company audit functions, cross-boarding jurisdictional challenges, and export controls
D. Data privacy regulations, data sovereignty, and third-party providers
The security administrator of a small firm wants to stay current on the latest security vulnerabilities and attack vectors being used by crime syndicates and nation-states. The information must be actionable and reliable. Which of the following would BEST meet the needs of the security administrator?
A. Software vendor threat reports
B. White papers
C. Security blogs
D. Threat data subscription
A security analyst has received the following requirements for the implementation of enterprise credential management software.
1.
The software must have traceability back to an individual
2.
Credentials must remain unknown to the vendor at all times
3.
There must be forced credential changes upon ID checkout
4.
Complexity requirements must be enforced.
5.
The software must be quickly and easily scalable with max mum availability
Which of the following vendor configurations would BEST meet these requirements?
A. Credentials encrypted in transit and then stored, hashed and salted in a vendor's cloud, where the vendor handles key management
B. Credentials stored, hashed, and salted on each local machine
C. Credentials encrypted in transit and stored in a vendor's cloud, where the enterprise retains the keys
D. Credentials encrypted in transit and stored on an internal network server with backups that are taken on a weekly basis
A security engineer is looking at a DNS server following a known incident. The engineer sees the following command as the most recent entry in the server's shell history:
id ^f=iev/sda of=/dev/sdb
Which of the following MOST likely occurred?
A. A tape backup of the server was performed.
B. The drive was cloned for forensic analysis.
C. The hard drive was formatted after the incident.
D. The DNS log files were rolled daily as expected
A company wants to secure a newly developed application that is used to access sensitive information and data from corporate resources The application was developed by a third- party organization, and it is now being used heavily despite lacking the following controls:
1.
Certificate pinning
2.
Tokenization
3.
Biometric authentication
The company has already implemented the following controls:
1.
Full device encryption
2.
Screen lock
3.
Device password
4.
Remote wipe
The company wants to defend against interception of data attacks Which of the following compensating controls should the company implement NEXT?
A. Enforce the use of a VPN when using the newly developed application.
B. Implement a geofencing solution that disables the application according to company requirements.
C. Implement an out-of-band second factor to authenticate authorized users
D. Install the application in a secure container requiring additional authentication controls.
A company has deployed MFA Some employees, however, report they ate not gelling a notification on their mobile device Other employees report they downloaded a common authenticates application but when they tap the code in the application it just copies the code to memory instead of confirming the authentication attempt Which of the following are the MOST likely explanations for these scenarios? (Select TWO)
A. The company is using a claims-based authentication system for MFA
B. These are symptoms of known compatibility issues with OAuth 1 0
C. OpenID Connect requires at least one factor to be a biometric
D. The company does not allow an SMS authentication method
E. The WAYF method requires a third factor before the authentication process can complete
F. A vendor-specific authenticator application is needed for push notifications
A new employee is plugged into the network on a BYOD machine but cannot access the network Which of the following must be configured so the employee can connect to the network?
A. Port security
B. Firewall
C. Remote access
D. VPN
As part of a systems modernization program, the use of a weak encryption algorithm is identified m a wet se-vices API The client using the API is unable to upgrade the system on its end which would support the use of a secure algorithm set As a temporary workaround the client provides its IP space and the network administrator Limits access to the API via an ACL to only the IP space held by the client. Which of the following is the use of the ACL in this situation an example of?
A. Avoidance
B. Transference
C. Mitigation
D. Acceptance
E. Assessment
Following the merger of two large companies the newly combined security team is overwhelmed by the volume of logs flowing from the IT systems The company's data retention schedule complicates the issue by requiring detailed logs to be collected and available for months Which of the following designs BEST meets the company's security and retention requirement?
A. Forward logs to both a SlEM and a cheaper longer-term storage and then delete logs from the SlEM after 14 days
B. Reduce the log volume by disabling logging of routine maintenance activities or failed authentication attempts
C. Send logs to a SlEM that correlates security data and store only the alerts and relevant data arising from that system.
D. Maintain both companies' logging and SlEM solutions separately but merge the resulting alerts and reports.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.