PdfPrep.com

CompTIA Advanced Security Practitioner (CASP) CAS-003 Exam Online Dumps

CAS-003 exam is a required test for CompTIA CASP+ certification. We all know that CASP+ certification is a hot one in CompTIA certifications. Passing CAS-003 exam is a first step for you to get certified. We provide the latest CompTIA Advanced Security Practitioner (CASP) CAS-003 exam online dumps, which can guarantee you success on the first attempt.

Page 1 of 14

Loading... Loading...
1. Ann, a corporate executive, has been the recent target of increasing attempts to obtain corporate secrets by competitors through advanced, well-funded means. Ann frequently leaves her laptop unattended and physically unsecure in hotel rooms during travel. A security engineer must find a practical solution for Ann that minimizes the need for user training.

Which of the following is the BEST solution in this scenario?

Loading... Loading...
2. An internal application has been developed to increase the efficiency of an operational process of a global manufacturer. New code was implemented to fix a security bug, but it has caused operations to halt. The executive team has decided fixing the security bug is less important than continuing operations.

Which of the following would BEST support immediate rollback of the failed fix? (Choose two.)

Loading... Loading...
3. An analyst is investigating anomalous behavior on a corporate-owned, corporate-managed mobile device with application whitelisting enabled, based on a name string. The employee to whom the device is assigned reports the approved email client is displaying warning messages that can launch browser windows and is adding unrecognized email addresses to the “compose” window.

Which of the following would provide the analyst the BEST chance of understanding and characterizing the malicious behavior?

Loading... Loading...
4. A security appliance vendor is reviewing an RFP that is requesting solutions for the defense of a set of web-based applications. This RFP is from a financial institution with very strict performance requirements. The vendor would like to respond with its solutions.

Before responding, which of the following factors is MOST likely to have an adverse effect on the vendor’s qualifications?

Loading... Loading...
5. A vulnerability was recently announced that allows a malicious user to gain root privileges on other virtual machines running within the same hardware cluster.

Customers of which of the following cloud-based solutions should be MOST concerned about this vulnerability?

Loading... Loading...
6. Company leadership believes employees are experiencing an increased number of cyber attacks; however, the metrics do not show this. Currently, the company uses “Number of successful phishing attacks” as a KRI, but it does not show an increase.

Which of the following additional information should be the Chief Information Security Officer (CISO) include in the report?

Loading... Loading...
7. An organization’s network security administrator has been using an SSH connection to manage switches and routers for several years. After attempting to connect to a router, an alert appears on the terminal emulation software, warning that the SSH key has changed.

After confirming the administrator is using the typical workstation and the router has not been replaced, which of the following are the MOST likely explanations for the warning message? (Choose two.)

Loading... Loading...
8. Following a recent outage, a systems administrator is conducting a study to determine a suitable bench stock on server hard drives.

Which of the following metrics is MOST valuable to the administrator in determining how many hard drives to keep-on hand?

Loading... Loading...
9. A school contracts with a vendor to devise a solution that will enable the school library to lend out tablet computers to students while on site. The tablets must adhere to string security and privacy practices.

The school’s key requirements are to:

- Maintain privacy of students in case of loss

- Have a theft detection control in place

- Be compliant with defined disability requirements

- Have a four-hour minimum battery life

Which of the following should be configured to BEST meet the requirements? (Choose two.)

Loading... Loading...
10. A project manager is working with a software development group to collect and evaluate user scenarios related to the organization’s internally designed data analytics tool. While reviewing stakeholder input, the project manager would like to formally document the needs of the various stakeholders and the associated organizational compliance objectives supported by the project.

Which of the following would be MOST appropriate to use?

Page 2 of 14

Loading... Loading...
11. A laptop is recovered a few days after it was stolen.

Which of the following should be verified during incident response activities to determine the possible impact of the incident?

Loading... Loading...
12. Ann, a security administrator, is conducting an assessment on a new firewall, which was placed at the perimeter of a network containing PII.

Ann runs the following commands on a server (10.0.1.19) behind the firewall:





From her own workstation (192.168.2.45) outside the firewall, Ann then runs a port scan against the server and records the following packet capture of the port scan:





Connectivity to the server from outside the firewall worked as expected prior to executing these commands.

Which of the following can be said about the new firewall?

Loading... Loading...
13. A new database application was added to a company’s hosted VM environment. Firewall ACLs were modified to allow database users to access the server remotely. The company’s cloud security broker then identified abnormal from a database user on-site. Upon further investigation, the security team noticed the user ran code on a VM that provided access to the hypervisor directly and access to other sensitive data.

Which of the following should the security team do to help mitigate future attacks within the VM environment? (Choose two.)

Loading... Loading...
14. A penetration testing manager is contributing to an RFP for the purchase of a new platform.

The manager has provided the following requirements:

- Must be able to MITM web-based protocols

- Must be able to find common misconfigurations and security holes

Which of the following types of testing should be included in the testing platform? (Choose two.)

Loading... Loading...
15. An incident responder wants to capture volatile memory comprehensively from a running machine for forensic purposes. The machine is running a very recent release of the Linux OS.

Which of the following technical approaches would be the MOST feasible way to accomplish this capture?

Loading... Loading...
16. A request has been approved for a vendor to access a new internal server using only HTTPS and SSH to manage the back-end system for the portal. Internal users just need HTTP and HTTPS access to all internal web servers. All other external access to the new server and its subnet is not allowed.

The security manager must ensure proper access is configured.





Below is a snippet from the firewall related to that server (access is provided in a top-down model):





Which of the following lines should be configured to allow the proper access? (Choose two.)

Loading... Loading...
17. A firewall specialist has been newly assigned to participate in red team exercises and needs to ensure the skills represent real-world threats.

Which of the following would be the BEST choice to help the new team member learn bleeding-edge techniques?

Loading... Loading...
18. An organization is implementing a virtualized thin-client solution for normal user computing and access. During a review of the architecture, concerns were raised that an attacker could gain access to multiple user environments by simply gaining a foothold on a single one with malware.

Which of the following reasons BEST explains this?

Loading... Loading...
19. An online bank has contracted with a consultant to perform a security assessment of the bank’s web portal. The consultant notices the login page is linked from the main page with HTTPS, but when the URL is changed to HTTP, the browser is automatically redirected back to the HTTPS site.

Which of the following is a concern for the consultant, and how can it be mitigated?

Loading... Loading...
20. A security administrator wants to implement controls to harden company-owned mobile devices.

Company policy specifies the following requirements:

- Mandatory access control must be enforced by the OS.

- Devices must only use the mobile carrier data transport.

Which of the following controls should the security administrator implement? (Choose three.)

Page 3 of 14

Loading... Loading...
21. While conducting online research about a company to prepare for an upcoming penetration test, a security analyst discovers detailed financial information on an investor website the company did not make public. The analyst shares this information with the Chief Financial Officer (CFO), who confirms the information is accurate, as it was recently discussed at a board of directors meeting. Many of the details are verbatim discussion comments captured by the board secretary for purposes of transcription on a mobile device.

Which of the following would MOST likely prevent a similar breach in the future?

Loading... Loading...
22. An organization wants to allow its employees to receive corporate email on their own smartphones.

A security analyst is reviewing the following information contained within the file system of an employee’s smartphone:

FamilyPix.jpg

Taxreturn.tax

paystub.pdf

employeesinfo.xls

SoccerSchedule.doc

RecruitmentPlan.xls

Based on the above findings, which of the following should the organization implement to prevent further exposure? (Select two).

Loading... Loading...
23. The data will be hosted and managed outside of the energy organization’s geographical location.

The number of users accessing the system will be small, and no sensitive data will be hosted in the SaaS platform.

Which of the following should the project’s security consultant recommend as the NEXT step?

Loading... Loading...
24. A developer emails the following output to a security administrator for review:





Which of the following tools might the security administrator use to perform further security assessment of this issue?

Loading... Loading...
25. A software development company lost customers recently because of a large number of software issues. These issues were related to integrity and availability defects, including buffer overflows, pointer dereferences, and others.

Which of the following should the company implement to improve code quality? (Choose two.)

Loading... Loading...
26. An enterprise is trying to secure a specific web-based application by forcing the use of multifactor authentication. Currently, the enterprise cannot change the application’s sign-in page to include an extra field.

However, the web-based application supports SAML.

Which of the following would BEST secure the application?

Loading... Loading...
27. After significant vulnerabilities and misconfigurations were found in numerous production web applications, a security manager identified the need to implement better development controls.

Which of the following controls should be verified? (Choose two.)

Loading... Loading...
28. An organization wants to arm its cybersecurity defensive suite automatically with intelligence on zero-day threats shortly after they emerge.

Acquiring tools and services that support which of the following data standards would BEST enable the organization to meet this objective?

Loading... Loading...
29. A financial institution’s information security officer is working with the risk management officer to determine what to do with the institution’s residual risk after all security controls have been implemented.

Considering the institution’s very low risk tolerance, which of the following strategies would be BEST?

Loading... Loading...
30. A large, public university has recently been experiencing an increase in ransomware attacks against computers connected to its network. Security engineers have discovered various staff members receiving seemingly innocuous files in their email that are being run.

Which of the following would BEST mitigate this attack method?

Page 4 of 14

Loading... Loading...
31. A security architect is reviewing the code for a company’s financial website.

The architect suggests adding the following HTML element, along with a server-side function, to generate a random number on the page used to initiate a funds transfer:

<input type=”hidden” name=”token” value=generateRandomNumber()>

Which of the following attacks is the security architect attempting to prevent?

Loading... Loading...
32. A security engineer is assessing the controls that are in place to secure the corporate-Internet-facing DNS server. The engineer notices that security ACLs exist but are not being used properly. The DNS server should respond to any source but only provide information about domains it has authority over. Additionally, the DNS administrator have identified some problematic IP addresses that should not be able to make DNS requests.

Given the ACLs below:





Which of the following should the security administrator configure to meet the DNS security needs?

Which of the following should the security administrator configure to meet the DNS security needs?

A)





B)





C)





D)



Loading... Loading...
33. Following a recent and very large corporate merger, the number of log files an SOC needs to review has approximately tripled. The Chief Information Security Officer (CISO) has not been allowed to hire any more staff for the SOC, but is looking for other ways to automate the log review process so the SOC receives less noise.

Which of the following would BEST reduce log noise for the SOC?

Loading... Loading...
34. An organization is deploying IoT locks, sensors, and cameras, which operate over 802.11, to replace legacy building access control systems. These devices are capable of triggering physical access changes, including locking and unlocking doors and gates. Unfortunately, the devices have known vulnerabilities for which the vendor has yet to provide firmware updates.

Which of the following would BEST mitigate this risk?

Loading... Loading...
35. A security administrator is updating corporate policies to respond to an incident involving collusion between two systems administrators that went undetected for more than six months.

Which of the following policies would have MOST likely uncovered the collusion sooner? (Choose two.)

Loading... Loading...
36. A core router was manipulated by a credentialed bypass to send all network traffic through a secondary router under the control of an unauthorized user connected to the network by WiFi.

Which of the following would BEST reduce the risk of this attack type occurring?

Loading... Loading...
37. The data will be hosted and managed outside of the company’s geographical location.

The number of users accessing the system will be small, and no sensitive data will be hosted in the solution.

As the security consultant of the project, which of the following should the project’s security consultant recommend as the NEXT step?

Loading... Loading...
38. A security analyst works for a defense contractor that produces classified research on drones. The contractor faces nearly constant attacks from sophisticated nation-state actors and other APIs.

Which of the following would help protect the confidentiality of the research data?

Loading... Loading...
39. A company recently implemented a variety of security services to detect various types of traffic that pose a threat to the company.

The following services were enabled within the network:

- Scan of specific subsets for vulnerabilities

- Categorizing and logging of website traffic

- Enabling specific ACLs based on application traffic

- Sending suspicious files to a third-party site for validation

A report was sent to the security team that identified multiple incidents of users sharing large amounts of data from an on-premise server to a public site. A small percentage of that data also contained malware and spyware

Which of the following services MOST likely identified the behavior and sent the report?

Loading... Loading...
40. An external red team member conducts a penetration test, attempting to gain physical access to a large organization's server room in a branch office. During reconnaissance, the red team member sees a clearly marked door to the server room, located next to the lobby, with a tumbler lock.

Which of the following is BEST for the red team member to bring on site to open the locked door as quickly as possible without causing significant damage?

Page 5 of 14

Loading... Loading...
41. A company relies on an ICS to perform equipment monitoring functions that are federally mandated for operation of the facility. Fines for non-compliance could be costly. The ICS has known vulnerabilities and can no longer be patched or updated. Cyber-liability insurance cannot be obtained because insurance companies will not insure this equipment.

Which of the following would be the BEST option to manage this risk to the company's production environment?

Loading... Loading...
42. During a sprint, developers are responsible for ensuring the expected outcome of a change is thoroughly evaluated for any security impacts. Any impacts must be reported to the team lead.

Before changes are made to the source code, which of the following MUST be performed to provide the required information to the team lead?

Loading... Loading...
43. An organization is currently working with a client to migrate data between a legacy ERP system and a cloud-based ERP tool using a global PaaS provider. As part of the engagement, the organization is performing data deduplication and sanitization of client data to ensure compliance with regulatory requirements.

Which of the following is the MOST likely reason for the need to sanitize the client data? (Choose two.)

Loading... Loading...
44. A company recently implemented a new cloud storage solution and installed the required synchronization client on all company devices. A few months later, a breach of sensitive data was discovered. Root cause analysis shows the data breach happened from a lost personal mobile device.

Which of the following controls can the organization implement to reduce the risk of similar breaches?

Loading... Loading...
45. A vendor develops a mobile application for global customers. The mobile application supports advanced encryption of data between the source (the mobile device) and the destination (the organization’s ERP system).

As part of the vendor’s compliance program, which of the following would be important to take into account?

Loading... Loading...
46. A security engineer is working to secure an organization’s VMs. While reviewing the workflow for creating VMs on demand, the engineer raises a concern about the integrity of the secure boot process of the VM guest.

Which of the following would BEST address this concern?

Loading... Loading...
47. When implementing a penetration testing program, the Chief Information Security Officer (CISO) designates different organizational groups within the organization as having different responsibilities, attack vectors, and rules of engagement. First, the CISO designates a team to operate from within the corporate environment.

This team is commonly referred to as:

Loading... Loading...
48. An enterprise’s Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) are meeting to discuss ongoing capacity and resource planning issues. The enterprise has experienced rapid, massive growth over the last 12 months, and the technology department is stretched thin for resources. A new accounting service is required to support the enterprise’s growth, but the only available compute resources that meet the accounting service requirements are on the virtual platform, which is hosting the enterprise’s website.

Which of the following should the CISO be MOST concerned about?

Loading... Loading...
49. A regional transportation and logistics company recently hired its first Chief Information Security Officer (CISO). The CISO’s first project after onboarding involved performing a vulnerability assessment against the company’s public facing network. The completed scan found a legacy collaboration platform application with a critically rated vulnerability. While discussing this issue with the line of business, the CISO learns the vulnerable application cannot be updated without the company incurring significant losses due to downtime or new software purchases.

Which of the following BEST addresses these concerns?

Loading... Loading...
50. Ann, a retiring employee, cleaned out her desk. The next day, Ann’s manager notices company equipment that was supposed to remain at her desk is now missing.

Which of the following would reduce the risk of this occurring in the future?

Page 6 of 14

Loading... Loading...
51. A security analyst for a bank received an anonymous tip on the external banking website showing the following:

- Protocols supported

- TLS 1.0

- SSL 3

- SSL 2

- Cipher suites supported

- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA-ECDH p256r1

- TLS_DHE_RSA_WITH_AES_256_CBC_SHA-DH 1024bit

- TLS_RSA_WITH_RC4_128_SHA

- TLS_FALLBACK_SCSV non supported

- POODLE

- Weak PFS

- OCSP stapling supported

Which of the following should the analyst use to reproduce these findings comprehensively?

Loading... Loading...
52. A company is moving all of its web applications to an SSO configuration using SAML. Some employees report that when signing in to an application, they get an error message on the login screen after entering their username and password, and are denied access. When they access another system that has been converted to the new SSO authentication model, they are able to authenticate successfully without being prompted for login.

Which of the following is MOST likely the issue?

Loading... Loading...
53. A penetration tester is trying to gain access to a remote system. The tester is able to see the secure login page and knows one user account and email address, but has not yet discovered a password.

Which of the following would be the EASIEST method of obtaining a password for the known account?

Loading... Loading...
54. A technician is reviewing the following log:





Which of the following tools should the organization implement to reduce the highest risk identified in this log?

Loading... Loading...
55. A Chief Information Security Officer (CISO) is creating a security committee involving multiple business units of the corporation.

Which of the following is the BEST justification to ensure collaboration across business units?

Loading... Loading...
56. Due to a recent acquisition, the security team must find a way to secure several legacy applications.

During a review of the applications, the following issues are documented:

- The applications are considered mission-critical.

- The applications are written in code languages not currently supported by the development staff.

- Security updates and patches will not be made available for the applications.

- Username and passwords do not meet corporate standards.

- The data contained within the applications includes both PII and PHI.

- The applications communicate using TLS 1.0.

- Only internal users access the applications.

Which of the following should be utilized to reduce the risk associated with these applications and their current architecture?

Loading... Loading...
57. A new security policy states all wireless and wired authentication must include the use of certificates when connecting to internal resources within the enterprise LAN by all employees.

Which of the following should be configured to comply with the new security policy? (Choose two.)

Loading... Loading...
58. A security consultant was hired to audit a company’s password are account policy.

The company implements the following controls:

- Minimum password length: 16

- Maximum password age: 0

- Minimum password age: 0

- Password complexity: disabled

- Store passwords in plain text: disabled

- Failed attempts lockout: 3

- Lockout timeout: 1 hour

The password database uses salted hashes and PBKDF2.

Which of the following is MOST likely to yield the greatest number of plain text passwords in the shortest amount of time?

Loading... Loading...
59. As part of the asset management life cycle, a company engages a certified equipment disposal vendor to appropriately recycle and destroy company assets that are no longer in use.

As part of the company’s vendor due diligence, which of the following would be MOST important to obtain from the vendor?

Loading... Loading...
60. Following a complete outage of the electronic medical record system for more than 18 hours, the hospital’s Chief Executive Officer (CEO) has requested that the Chief Information Security Officer (CISO) perform an investigation into the possibility of a disgruntled employee causing the outage maliciously. To begin the investigation, the CISO pulls all event logs and device configurations from the time of the outage. The CISO immediately notices the configuration of a top-of-rack switch from one day prior to the outage does not match the configuration that was in place at the time of the outage.

However, none of the event logs show who changed the switch configuration, and seven people have the ability to change it. Because of this, the investigation is inconclusive.

Which of the following processes should be implemented to ensure this information is available for future investigations?

Page 7 of 14

Loading... Loading...
61. A company’s user community is being adversely affected by various types of emails whose authenticity cannot be trusted. The Chief Information Security Officer (CISO) must address the problem.

Which of the following solutions would BEST support trustworthy communication solutions?

Loading... Loading...
62. The audit team was only provided the physical and logical addresses of the network without any type of access credentials.

Which of the following methods should the audit team use to gain initial access during the security assessment? (Choose two.)

Loading... Loading...
63. A product manager is concerned about the unintentional sharing of the company’s intellectual property through employees’ use of social media.

Which of the following would BEST mitigate this risk?

Loading... Loading...
64. An organization is evaluating options related to moving organizational assets to a cloud-based environment using an IaaS provider. One engineer has suggested connecting a second cloud environment within the organization’s existing facilities to capitalize on available datacenter space and resources. Other project team members are concerned about such a commitment of organizational assets, and ask the Chief Security Officer (CSO) for input.

The CSO explains that the project team should work with the engineer to evaluate the risks associated with using the datacenter to implement:

Loading... Loading...
65. A company uses an application in its warehouse that works with several commercially available tablets and can only be accessed inside the warehouse. The support department would like the selection of tablets to be limited to three models to provide better support and ensure spares are on hand. Users often keep the tablets after they leave the department, as many of them store personal media items.

Which of the following should the security engineer recommend to meet these requirements?

Loading... Loading...
66. During a recent incident, sensitive data was disclosed and subsequently destroyed through a properly secured, cloud-based storage platform. An incident response technician is working with management to develop an after action report that conveys critical metrics regarding the incident.

Which of the following would be MOST important to senior leadership to determine the impact of the breach?

Loading... Loading...
67. After an employee was terminated, the company discovered the employee still had access to emails and attached content that should have been destroyed during the off-boarding. The employee’s laptop and cell phone were confiscated and accounts were disabled promptly. Forensic investigation suggests the company’s DLP was effective, and the content in question was not sent outside of work or transferred to removable media. Personality owned devices are not permitted to access company systems or information.

Which of the following would be the MOST efficient control to prevent this from occurring in the future?

Loading... Loading...
68. A cybersecurity consulting company supports a diverse customer base.

Which of the following types of constraints is MOST important for the consultancy to consider when advising a regional healthcare provider versus a global conglomerate?

Loading... Loading...
69. A systems administrator has deployed the latest patches for Windows-based machines.

However, the users on the network are experiencing exploits from various threat actors, which the patches should have corrected.

Which of the following is the MOST likely scenario?

Loading... Loading...
70. DRAG DROP

Drag and drop the cloud deployment model to the associated use-case scenario. Options may be used only once or not at all.



Page 8 of 14

Loading... Loading...
71. DRAG DROP

A security consultant is considering authentication options for a financial institution. The following authentication options are available.

Drag and drop the security mechanism to the appropriate use case. Options may be used once.



Loading... Loading...
72. A company’s Chief Operating Officer (COO) is concerned about the potential for competitors to infer proprietary information gathered from employees’ social media accounts.

Which of the following methods should the company use to gauge its own social media threat level without targeting individual employees?

Loading... Loading...
73. DRAG DROP

A security administrator must configure the database server shown below to comply with the four requirements listed. Drag and drop the appropriate ACL that should be configured on the database server to its corresponding requirement. Answer options may be used once or not at all.









Loading... Loading...
74. A security administrator is hardening a TrustedSolaris server that processes sensitive data.

The data owner has established the following security requirements:

- The data is for internal consumption only and shall not be distributed to outside individuals

- The systems administrator should not have access to the data processed by the server

- The integrity of the kernel image is maintained

Which of the following host-based security controls BEST enforce the data owner’s requirements? (Choose three.)

Loading... Loading...
75. An SQL database is no longer accessible online due to a recent security breach. An investigation reveals that unauthorized access to the database was possible due to an SQL injection vulnerability.

To prevent this type of breach in the future, which of the following security controls should be put in place before bringing the database back online? (Choose two.)

Loading... Loading...
76. A company has entered into a business agreement with a business partner for managed human resources services. The Chief Information Security Officer (CISO) has been asked to provide documentation that is required to set up a business-to-business VPN between the two organizations.

Which of the following is required in this scenario?

Loading... Loading...
77. Given the following output from a local PC:





Which of the following ACLs on a stateful host-based firewall would allow the PC to serve an intranet website?

Loading... Loading...
78. A penetration tester has been contracted to conduct a physical assessment of a site.

Which of the following is the MOST plausible method of social engineering to be conducted during this engagement?

Loading... Loading...
79. A penetration tester is conducting an assessment on Comptia.org and runs the following command from a coffee shop while connected to the public Internet:





Which of the following should the penetration tester conclude about the command output?

Loading... Loading...
80. Two new technical SMB security settings have been enforced and have also become policies that increase secure communications.

Network Client: Digitally sign communication

Network Server: Digitally sign communication

A storage administrator in a remote location with a legacy storage array, which contains time-sensitive data, reports employees can no longer connect to their department shares.

Which of the following mitigation strategies should an information security manager recommend to the data owner?

Page 9 of 14

Loading... Loading...
81. A security engineer is designing a system in which offshore, outsourced staff can push code from the development environment to the production environment securely. The security engineer is concerned with data loss, while the business does not want to slow down its development process.

Which of the following solutions BEST balances security requirements with business need?

Loading... Loading...
82. A systems security engineer is assisting an organization’s market survey team in reviewing requirements for an upcoming acquisition of mobile devices. The engineer expresses concerns to the survey team about a particular class of devices that uses a separate SoC for baseband radio I/O.

For which of the following reasons is the engineer concerned?

Loading... Loading...
83. During a security assessment, an organization is advised of inadequate control over network segmentation. The assessor explains that the organization’s reliance on VLANs to segment traffic is insufficient to provide segmentation based on regulatory standards.

Which of the following should the organization consider implementing along with VLANs to provide a greater level of segmentation?

Loading... Loading...
84. A security administrator was informed that a server unexpectedly rebooted.

The administrator received an export of syslog entries for analysis:





Which of the following does the log sample indicate? (Choose two.)

Loading... Loading...
85. An organization has employed the services of an auditing firm to perform a gap assessment in preparation for an upcoming audit. As part of the gap assessment, the auditor supporting the assessment recommends the organization engage with other industry partners to share information about emerging attacks to organizations in the industry in which the organization functions.

Which of the following types of information could be drawn from such participation?

Loading... Loading...
86. A recent penetration test identified that a web server has a major vulnerability. The web server hosts a critical shipping application for the company and requires 99.99% availability. Attempts to fix the vulnerability would likely break the application. The shipping application is due to be replaced in the next three months.

Which of the following would BEST secure the web server until the replacement web server is ready?

Loading... Loading...
87. To prepare for an upcoming audit, the Chief Information Security Officer (CISO) asks for all 1200 vulnerabilities on production servers to be remediated. The security engineer must determine which vulnerabilities represent real threats that can be exploited so resources can be prioritized to migrate the most dangerous risks. The CISO wants the security engineer to act in the same manner as would an external threat, while using vulnerability scan results to prioritize any actions.

Which of the following approaches is described?

Loading... Loading...
88. An engineer is evaluating the control profile to assign to a system containing PII, financial, and proprietary data.





Based on the data classification table above, which of the following BEST describes the overall classification?

Loading... Loading...
89. A security analyst is reviewing the corporate MDM settings and notices some disabled settings, which consequently permit users to download programs from untrusted developers and manually install them. After some conversations, it is confirmed that these settings were disabled to support the internal development of mobile applications. The security analyst is now recommending that developers and testers have a separate device profile allowing this, and that the rest of the organization’s users do not have the ability to manually download and install untrusted applications.

Which of the following settings should be toggled to achieve the goal? (Choose two.)

Loading... Loading...
90. A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline.

Which of the following tools should be implemented to detect similar attacks?

Page 10 of 14

Loading... Loading...
91. There is a lack of understanding of what is within the SCADA network.

Which of the following capabilities would BEST improve the security position?

Loading... Loading...
92. A company has hired an external security consultant to conduct a thorough review of all aspects of corporate security. The company is particularly concerned about unauthorized access to its physical offices resulting in network compromises.

Which of the following should the consultant recommend be performed to evaluate potential risks?

Loading... Loading...
93. A server (10.0.0.2) on the corporate network is experiencing a DoS from a number of marketing desktops that have been compromised and are connected to a separate network segment.

The security engineer implements the following configuration on the management router:





Which of the following is the engineer implementing?

Loading... Loading...
94. An internal penetration tester was assessing a recruiting page for potential issues before it was pushed to the production website. The penetration tester discovers an issue that must be corrected before the page goes live. The web host administrator collects the log files below and gives them to the development team so improvements can be made to the security design of the website.





Which of the following types of attack vectors did the penetration tester use?

Loading... Loading...
95. The Chief Information Security Officer (CISO) for an organization wants to develop custom IDS rulesets faster, prior to new rules being released by IDS vendors.

Which of the following BEST meets this objective?

Loading... Loading...
96. A user workstation was infected with a new malware variant as a result of a drive-by download.

The security administrator reviews key controls on the infected workstation and discovers the following:





Which of the following would BEST prevent the problem from reoccurring in the future? (Choose two.)

Loading... Loading...
97. An engineer is assisting with the design of a new virtualized environment that will house critical company services and reduce the datacenter’s physical footprint. The company has expressed concern about the integrity of operating systems and wants to ensure a vulnerability exploited in one datacenter segment would not lead to the compromise of all others.

Which of the following design objectives should the engineer complete to BEST mitigate the company’s concerns? (Choose two.)

Loading... Loading...
98. After embracing a BYOD policy, a company is faced with new security challenges from unmanaged mobile devices and laptops.

The company’s IT department has seen a large number of the following incidents:

- Duplicate IP addresses

- Rogue network devices

- Infected systems probing the company’s network

Which of the following should be implemented to remediate the above issues? (Choose two.)

Loading... Loading...
99. Following a security assessment, the Chief Information Security Officer (CISO) is reviewing the results of the assessment and evaluating potential risk treatment strategies. As part of the CISO’s evaluation, a judgment of potential impact based on the identified risk is performed. To prioritize response actions, the CISO uses past experience to take into account the exposure factor as well as the external accessibility of the weakness identified.

Which of the following is the CISO performing?

Loading... Loading...
100. A Chief Information Officer (CIO) publicly announces the implementation of a new financial system.

As part of a security assessment that includes a social engineering task, which of the following tasks should be conducted to demonstrate the BEST means to gain information to use for a report on social vulnerability details about the financial system?

Page 11 of 14

Loading... Loading...
101. A recent assessment identified that several users’ mobile devices are running outdated versions of endpoint security software that do not meet the company’s security policy.

Which of the following should be performed to ensure the users can access the network and meet the company’s security requirements?

Loading... Loading...
102. A systems administrator at a medical imaging company discovers protected health information (PHI) on a general-purpose file server.

Which of the following steps should the administrator take NEXT?

Loading... Loading...
103. A Chief Information Security Officer (CISO) is reviewing the results of a gap analysis with an outside cybersecurity consultant.

The gap analysis reviewed all procedural and technical controls and found the following:

- High-impact controls implemented: 6 out of 10

- Medium-impact controls implemented: 409 out of 472

- Low-impact controls implemented: 97 out of 1000

The report includes a cost-benefit analysis for each control gap.

The analysis yielded the following information:

- Average high-impact control implementation cost: $15,000; Probable ALE for each high-impact control gap: $95,000

- Average medium-impact control implementation cost: $6,250; Probable ALE for each medium-impact control gap: $11,000

Due to the technical construction and configuration of the corporate enterprise, slightly more than 50% of the medium-impact controls will take two years to fully implement.

Which of the following conclusions could the CISO draw from the analysis?

Loading... Loading...
104. After investigating virus outbreaks that have cost the company $1000 per incident, the company’s Chief Information Security Officer (CISO) has been researching new antivirus software solutions to use and be fully supported for the next two years.

The CISO has narrowed down the potential solutions to four candidates that meet all the company’s performance and capability requirements:





Using the table above, which of the following would be the BEST business-driven choice among the five possible solutions?

Loading... Loading...
105. A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via rootkit. Post-incident analysis is ongoing, and the incident responders and systems administrators are working to determine a strategy to reduce the risk of recurrence. The firm’s systems are running modern operating systems and feature UEFI and TPMs.

Which of the following technical options would provide the MOST preventive value?

Loading... Loading...
106. A company monitors the performance of all web servers using WMI. A network administrator informs the security engineer that web servers hosting the company’s client-facing portal are running slowly today. After some investigation, the security engineer notices a large number of attempts at enumerating host information via SNMP from multiple IP addresses.

Which of the following would be the BEST technique for the security engineer to employ in an attempt to prevent reconnaissance activity?

Loading... Loading...
107. One of the objectives of a bank is to instill a security awareness culture.

Which of the following are techniques that could help to achieve this? (Choose two.)

Loading... Loading...
108. The risk subcommittee of a corporate board typically maintains a master register of the most prominent risks to the company. A centralized holistic view of risk is particularly important to the corporate Chief Information Security Officer (CISO) because:

Loading... Loading...
109. An insurance company has two million customers and is researching the top transactions on its customer portal. It identifies that the top transaction is currently password reset. Due to users not remembering their secret questions, a large number of calls are consequently routed to the contact center for manual password resets. The business wants to develop a mobile application to improve customer engagement in the future, continue with a single factor of authentication, minimize management overhead of the solution, remove passwords, and eliminate to the contact center.

Which of the following techniques would BEST meet the requirements? (Choose two.)

Loading... Loading...
110. A security engineer has implemented an internal user access review tool so service teams can baseline user accounts and group memberships. The tool is functional and popular among its initial set of onboarded teams.

However, the tool has not been built to cater to a broader set of internal teams yet.

The engineer has sought feedback from internal stakeholders, and a list of summarized requirements is as follows:

- The tool needs to be responsive so service teams can query it, and then perform an automated response action.

- The tool needs to be resilient to outages so service teams can perform the user access review at any point in time and meet their own SLAs.

- The tool will become the system-of-record for approval, reapproval, and removal life cycles of group memberships and must allow for data retrieval after failure.

Which of the following need specific attention to meet the requirements listed above? (Choose three.)

Page 12 of 14

Loading... Loading...
111. The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board meeting.

Which of the following would be the BEST methods to prepare this report? (Choose two.)

Loading... Loading...
112. Apply machine learning algorithms

Loading... Loading...
113. A software development team is conducting functional and user acceptance testing of internally developed web applications using a COTS solution. For automated testing, the solution uses valid user credentials from the enterprise directory to authenticate to each application. The solution stores the username in plain text and the corresponding password as an encoded string in a script within a file, located on a globally accessible network share. The account credentials used belong to the development team lead.

To reduce the risks associated with this scenario while minimizing disruption to ongoing testing, which of the following are the BEST actions to take? (Choose two.)

Loading... Loading...
114. A security consultant is attempting to discover if the company is utilizing databases on client machines to store the customer data.

The consultant reviews the following information:





Which of the following commands would have provided this output?

Loading... Loading...
115. Management is reviewing the results of a recent risk assessment of the organization’s policies and procedures. During the risk assessment it is determined that procedures associated with background checks have not been effectively implemented. In response to this risk, the organization elects to revise policies and procedures related to background checks and use a third-party to perform background checks on all new employees.

Which of the following risk management strategies has the organization employed?

Loading... Loading...
116. A company wants to perform analysis of a tool that is suspected to contain a malicious payload.

A forensic analyst is given the following snippet:

^32^[34fda19(fd^43gfd/home/user/lib/module.so.343jk^rfw(342fds43g

Which of the following did the analyst use to determine the location of the malicious payload?

Loading... Loading...
117. An advanced threat emulation engineer is conducting testing against a client’s network. The engineer conducts the testing in as realistic a manner as possible. Consequently, the engineer has been gradually ramping up the volume of attacks over a long period of time.

Which of the following combinations of techniques would the engineer MOST likely use in this testing? (Choose three.)

Loading... Loading...
118. A security engineer must establish a method to assess compliance with company security policies as they apply to the unique configuration of individual endpoints, as well as to the shared configuration policies of common devices.





Which of the following tools is the security engineer using to produce the above output?

Loading... Loading...
119. A newly hired systems administrator is trying to connect a new and fully updated, but very customized, Android device to access corporate resources.

However, the MDM enrollment process continually fails. The administrator asks a security team member to look into the issue.

Which of the following is the MOST likely reason the MDM is not allowing enrollment?

Loading... Loading...
120. A hospital uses a legacy electronic medical record system that requires multicast for traffic between the application servers and databases on virtual hosts that support segments of the application. Following a switch upgrade, the electronic medical record is unavailable despite physical connectivity between the hypervisor and the storage being in place. The network team must enable multicast traffic to restore access to the electronic medical record. The ISM states that the network team must reduce the footprint of multicast traffic on the network.





Using the above information, on which VLANs should multicast be enabled?

Page 13 of 14

Loading... Loading...
121. A security administrator wants to allow external organizations to cryptographically validate the company’s domain name in email messages sent by employees.

Which of the following should the security administrator implement?

Loading... Loading...
122. An organization is preparing to develop a business continuity plan. The organization is required to meet regulatory requirements relating to confidentiality and availability, which are well-defined. Management has expressed concern following initial meetings that the organization is not fully aware of the requirements associated with the regulations.

Which of the following would be MOST appropriate for the project manager to solicit additional resources for during this phase of the project?

Loading... Loading...
123. A SaaS-based email service provider often receives reports from legitimate customers that their IP netblocks are on blacklists and they cannot send email. The SaaS has confirmed that affected customers typically have IP addresses within broader network ranges and some abusive customers within the same IP ranges may have performed spam campaigns.

Which of the following actions should the SaaS provider perform to minimize legitimate customer impact?

Loading... Loading...
124. An agency has implemented a data retention policy that requires tagging data according to type before storing it in the data repository. The policy requires all business emails be automatically deleted after two years. During an open records investigation, information was found on an employee’s work computer concerning a conversation that occurred three years prior and proved damaging to the agency’s reputation.

Which of the following MOST likely caused the data leak?

Loading... Loading...
125. A forensics analyst suspects that a breach has occurred. Security logs show the company’s OS patch system may be compromised, and it is serving patches that contain a zero-day exploit and backdoor. The analyst extracts an executable file from a packet capture of communication between a client computer and the patch server.

Which of the following should the analyst use to confirm this suspicion?

Loading... Loading...
126. A company is acquiring incident response and forensic assistance from a managed security service provider in the event of a data breach. The company has selected a partner and must now provide required documents to be reviewed and evaluated.

Which of the following documents would BEST protect the company and ensure timely assistance? (Choose two.)

Loading... Loading...
127. A security architect is implementing security measures in response to an external audit that found vulnerabilities in the corporate collaboration tool suite. The report identified the lack of any mechanism to provide confidentiality for electronic correspondence between users and between users and group mailboxes.

Which of the following controls would BEST mitigate the identified vulnerability?

Loading... Loading...
128. Which of the following BEST represents a risk associated with merging two enterprises during an acquisition?

Loading... Loading...
129. Two competing companies experienced similar attacks on their networks from various threat actors. To improve response times, the companies wish to share some threat intelligence about the sources and methods of attack.

Which of the following business documents would be BEST to document this engagement?

Loading... Loading...
130. A company is developing requirements for a customized OS build that will be used in an embedded environment. The company procured hardware that is capable of reducing the likelihood of successful buffer overruns while executables are processing.

Which of the following capabilities must be included for the OS to take advantage of this critical hardware-based countermeasure?

Page 14 of 14

Loading... Loading...
131. A software development team has spent the last 18 months developing a new web-based front-end that will allow clients to check the status of their orders as they proceed through manufacturing. The marketing team schedules a launch party to present the new application to the client base in two weeks. Before the launch, the security team discovers numerous flaws that may introduce dangerous vulnerabilities, allowing direct access to a database used by manufacturing. The development team did not plan to remediate these vulnerabilities during development.

Which of the following SDLC best practices should the development team have followed?

Loading... Loading...
132. An engineer maintains a corporate-owned mobility infrastructure, and the organization requires that all web browsing using corporate-owned resources be monitored.

Which of the following would allow the organization to meet its requirement? (Choose two.)

Loading... Loading...
133. After multiple service interruptions caused by an older datacenter design, a company decided to migrate away from its datacenter. The company has successfully completed the migration of all datacenter servers and services to a cloud provider.

The migration project includes the following phases:

- Selection of a cloud provider

- Architectural design

- Microservice segmentation

- Virtual private cloud

- Geographic service redundancy

- Service migration

The Chief Information Security Officer (CISO) is still concerned with the availability requirements of critical company applications.

Which of the following should the company implement NEXT?

Loading... Loading...
134. A security controls assessor intends to perform a holistic configuration compliance test of networked assets.

The assessor has been handed a package of definitions provided in XML format, and many of the files have two common tags within them: “<object object_ref=… />” and “<state state_ref=… />”.

Which of the following tools BEST supports the use of these definitions?

Loading... Loading...
135. Legal authorities notify a company that its network has been compromised for the second time in two years. The investigation shows the attackers were able to use the same vulnerability on different systems in both attacks.

Which of the following would have allowed the security team to use historical information to protect against the second attack?

Loading... Loading...
136. A web developer has implemented HTML5 optimizations into a legacy web application.

One of the modifications the web developer made was the following client side optimization:

localStorage.setItem(“session-cookie”, document.cookie);

Which of the following should the security engineer recommend?

Loading... Loading...
137. A hospital’s security team recently determined its network was breached and patient data was accessed by an external entity.

The Chief Information Security Officer (CISO) of the hospital approaches the executive management team with this information, reports the vulnerability that led to the breach has already been remediated, and explains the team is continuing to follow the appropriate incident response plan. The executive team is concerned about the hospital’s brand reputation and asks the CISO when the incident should be disclosed to the affected patients.

Which of the following is the MOST appropriate response?

Loading... Loading...
138. A deployment manager is working with a software development group to assess the security of a new version of the organization’s internally developed ERP tool. The organization prefers to not perform assessment activities following deployment, instead focusing on assessing security throughout the life cycle.

Which of the following methods would BEST assess the security of the product?

Loading... Loading...

 

Exit mobile version