Lead2pass Provides Latest Exam CAS-002 Dumps VCE For Free Downloading:
The Chief Executive Officer (CEO) of a corporation decided to move all email to a cloud computing environment.
The Chief Information Security Officer (CISO) was told to research the risk involved in this environment.
Which of the following measures should be implemented to minimize the risk of hosting email in the cloud?
A. Remind users that all emails with sensitive information need be encrypted and physically
inspect the cloud computing.
B. Ensure logins are over an encrypted channel and obtain an NDA and an SLA from the
C. Ensure logins are over an encrypted channel and remind users to encrypt all emails that
contain sensitive information.
D. Obtain an NDA from the cloud provider and remind users that all emails with sensitive
information need be encrypted.
Due to a new regulation, a company has to increase active monitoring of security-related events to 24 hours a day.
The security staff only has three full time employees that work during normal business hours. Instead of hiring new security analysts to cover the remaining shifts necessary to meet the monitoring requirement, the Chief Information Officer (CIO) has hired a Managed Security Service (MSS) to monitor events.
Which of the following should the company do to ensure that the chosen MSS meets expectations?
A. Develop a memorandum of understanding on what the MSS is responsible to provide.
B. Create internal metrics to track MSS performance.
C. Establish a mutually agreed upon service level agreement.
D. Issue a RFP to ensure the MSS follows guidelines.
A system administrator needs to develop a policy for when an application server is no longer needed.
Which of the following policies would need to be developed?
A. Backup policy
B. De-provisioning policy
C. Data retention policy
D. Provisioning policy
After a security incident, an administrator revokes the SSL certificate for their web server www.company.com.
Later, users begin to inform the help desk that a few other servers are generating certificate errors: ftp.company.com, mail.company.com, and partners.company.com.
Which of the following is MOST likely the reason for this?
A. Each of the servers used the same EV certificate.
B. The servers used a wildcard certificate.
C. The web server was the CA for the domain.
D. Revoking a certificate can only be done at the domain level.
A wholesaler has decided to increase revenue streams by selling direct to the public through an on-line system.
Initially this will be run as a short term trial and if profitable, will be expanded and form part of the day to day business.
The risk manager has raised two main business risks for the initial trial:
1. IT staff has no experience with establishing and managing secure on-line credit card processing.
2. An internal credit card processing system will expose the business to additional compliance requirements.
Which of the following is the BEST risk mitigation strategy?
A. Transfer the risks to another internal department, who have more resources to accept the
B. Accept the risks and log acceptance in the risk register.
Once the risks have been accepted close them out.
C. Transfer the initial risks by outsourcing payment processing to a third party service provider.
D. Mitigate the risks by hiring additional IT staff with the appropriate experience and
An administrator notices the following file in the Linux server’s /tmp directory.
-rwsr-xr-x. 4 root root 234223 Jun 6 22:52 bash*
Which of the following should be done to prevent further attacks of this nature?
A. Never mount the /tmp directory over NFS
B. Stop the rpcidmapd service from running
C. Mount all tmp directories nosuid, noexec
D. Restrict access to the /tmp directory
Company GHI consolidated their network distribution so twelve network VLANs would be available over dual fiber links to a modular L2 switch in each of the company’s six IDFs.
The IDF modular switches have redundant switch fabrics and power supplies.
Which of the following threats will have the GREATEST impact on the network and what is the appropriate remediation step?
A. Threat: 802.1q trunking attack
Remediation: Enable only necessary VLANs for each port
B. Threat: Bridge loop
Remediation: Enable spanning tree
C. Threat: VLAN hopping
Remediation: Enable only necessary VLANs for each port
D. Threat: VLAN hopping
Remediation: Enable ACLs on the IDF switch
Within an organization, there is a known lack of governance for solution designs.
As a result there are inconsistencies and varying levels of quality for the artifacts that are produced.
Which of the following will help BEST improve this situation?
A. Ensure that those producing solution artifacts are reminded at the next team meeting that
quality is important.
B. Introduce a peer review process that is mandatory before a document can be officially
C. Introduce a peer review and presentation process that includes a review board with representation from relevant disciplines.
D. Ensure that appropriate representation from each relevant discipline approves of the solution documents before official approval.
An administrator of a secure web server has several clients with top security clearance and prefers security over performance.
By default, which of the following cipher suites would provide strong security, but at the same time the worst performance?
Corporate policy states that the systems administrator should not be present during system audits.
The security policy that states this is:
A. Separation of duties.
B. Mandatory vacation.
C. Non-disclosure agreement.
D. Least privilege.
CAS-002 dumps full version (PDF&VCE): https://www.lead2pass.com/cas-002.html
Large amount of free CAS-002 exam questions on Google Drive: https://drive.google.com/open?id=13j5iOL_XYuK24xlefcIzTQtqmeQfLY7K