[Free] 2019(Oct) EnsurePass CompTIA CAS-003 Dumps with VCE and PDF 131-140

Get Full Version of the Exam

Question No.131

An information security manager is concerned that connectivity used to configure and troubleshoot critical network devices could be attacked. The manager has tasked a

networksecurity engineer with meeting the following requirements:



Encrypt all traffic between the network engineer and critical devices. Segregate the different networking planes as much as possible.


Do not let access ports impact configuration tasks.

Which of the following would be the BEST recommendation for the network security engineer to present?

  1. Deploy control plane protections.

  2. Use SSH over out-of-band management.

  3. Force only TACACS to be allowed.

  4. Require the use of certificates for AAA.

Correct Answer: B

Question No.132

A security technician is incorporating the following requirements in an RFP for a new SIEM:



New security notifications must be dynamically implemented by the SIEM engine The SIEM must be able to identify traffic baselineanomalies


Anonymous attack data from all customers must augment attack detection and risk scoring Based on the above requirements, which of the following should the SIEM support? (Choose two.)

  1. Autoscaling search capability

  2. Machine learning

  3. Multisensor deployment

  4. Big Data analytics

  5. Cloud-based management

  6. Centralized log aggregation

Correct Answer: BD

Question No.133

Acompany contracts a security engineer to perform a penetration test of its client-facing web portal. Which of the following activities would be MOST appropriate?

  1. Use a protocol analyzer against the site to see if data input can be replayed from the browser

  2. Scan the website through an interception proxy and identify areas for the code injection

  3. Scan the site with a port scanner to identify vulnerable services running on the web server

  4. Use network enumeration tools to identify if the server is running behind a load balancer

Correct Answer: C

Question No.134

An information security officer isresponsible for one secure network and one office network. Recent intelligence suggests there is an opportunity for attackers to gain access to the secure network due to similar login credentials across networks. To determine the users who should change their information, the information security officer uses a tool to scan a file with hashed values on both networks and receives the following data:


Which of the following tools was used to gather this information from the hashed values in the file?

  1. Vulnerability scanner

  2. Fuzzer

  3. MD5 generator

  4. Password cracker

  5. Protocol analyzer

Correct Answer: C

Question No.135

An agency has implemented a data retention policy that requires tagging data according to type before storing it in the data repository. The policy requires all business emails be automatically deleted after two years. During an open records investigation, information was foundon an employee#39;s work computer concerning a conversation that occurred three years prior and proved damaging to the agency#39;s reputation. Which of the following MOST likely caused the data leak?

  1. The employee manually changed the email client retentionsettings to prevent deletion of emails

  2. The file that contained the damaging information was mistagged and retained on the server for longer than it should have been

  3. The email was encrypted and an exception was put in place via the data classificationapplication

  4. The employee saved a file on the computer#39;s hard drive that contained archives of emails, which were more than two years old

Correct Answer: D

Question No.136

A cybersecurity analyst is hired to review the security the posture of a company. The cybersecurity analyst notice a very high network bandwidth consumption due to SYN floodsfrom a small number of IP addresses. Which of the following would be the BEST action to take to support incident response?

  1. Increase the company#39;s bandwidth.

  2. Apply ingress filters at the routers.

  3. Install a packet capturing tool.

  4. Block all SYN packets.

Correct Answer: B

Question No.137

A forensics analyst suspects that a breach has occurred. Security logs show the company#39;s OS patch system may be compromised, and it is serving patches that contain a zero-day exploit and backdoor. The analyst extracts an executable file from a packet capture of communication between a client computer and the patch server. Which of the following should the analyst use to confirm this suspicion?

  1. File size

  2. Digital signature

  3. Checksums

  4. Anti-malware software

  5. Sandboxing

Correct Answer: B

Question No.138

A security engineer is attempting to increase the randomness of numbers used in key generation in a system. The goal of the effort is to strengthen the keys against predictive analysis attacks.

Which of the following is the BEST solution?

  1. Use an entropy-as-a-service vendor to leverage larger entropy pools.

  2. Loop multiple pseudo-random number generators in a series to produce larger numbers.

  3. Increase key length by two orders of magnitude to detect brute forcing.

  4. Shift key generation algorithms to ECC algorithms.

Correct Answer: A

Question No.139

Engineers at a company believe a certain type of data should be protected from competitors, but the data owner insists the information is not sensitive. An information security engineer is implementing controls to secure the corporate SAN. The controls require dividing data into four groups: non-sensitive, sensitive but accessible, sensitive but export-controlled, and extremely sensitive. Which of the following actions should the engineer take regarding the data?

  1. Label the data as extremely sensitive.

  2. Label the data as sensitive but accessible.

  3. Label the data as non-sensitive.

  4. Label the data as sensitive but export-controlled.

Correct Answer: C

Question No.140

Which of the following is the GREATEST security concern with respect to BYOD?

  1. The filtering of sensitive data out of data flows at geographic boundaries.

  2. Removing potential bottlenecks in data transmission paths.

  3. The transfer of corporate data onto mobile corporate devices.

  4. The migration of data into and out of the network in an uncontrolled manner.

Correct Answer: D

Get Full Version of the Exam
CAS-003 Dumps
CAS-003 VCE and PDF