Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dealsixty

CAS-003 VCE Exam Download

Page: 10 / 25
Question 40

An organization is a subsidiary of a larger firm that provides managed IT and human resources controls to the subsidiary. The subsidiary determines the contract in place between the two firms does not define and apply terms appropriate relating to the controls provided by the larger firm. Which of the following would be MOST appropriate for both firms to formally document the controls to be provided? (Select TWO.)

Options:

A.

Service-level agreement

B.

Non-disclosure agreement

C.

Interoperability agreement

D.

Master service agreement

E.

Business impact analysis

F.

Interconnection security agreement

Question 41

A company wants to analyze internal network traffic for IOCs. The security solution consists of a network collector appliance and a separate server which security analysts access via a browser to visualize and review the alerts generated from the network traffic. The company uses a collapsed core operating at Layer 2 at 100Gbps. The server win be placed in the datacenter. Which of the following architectures should be used to ensure the solution can provide visibility into all the company's internal network traffic including DNS and URL requests without impacting network traffic flow?

Options:

A.

Install the network collector appliance closer to the core switching infrastructure

B.

Install the network collector appliance closer to the distribution switches

C.

install multiple network collector appliances closer to the access layer switches

D.

Install the network collector appliance physically inline between the core switch and the firewall

Question 42

The Chief Information Security Officer (CISO) developed a robust plan to address both internal and external vulnerabilities due to an increase in ransomware attacks on the networks However the number of successful attacks continues to increase. Which of the following is the MOST likely failure?

Options:

A.

The company did not blacklist suspected websites properly

B.

The threat model was not vetted property

C.

The IDS/IPS were not updated with the latest malware signatures

D.

The organization did not conduct a business impact analysis

Question 43

A security analyst is investigating an alert arising from an impossible travel pattern Within the span of 30 minutes, the email system saw successful authentication from two IP addresses, which geolocate more than 500mi (806km) away from each other Before locking the account which of the following actions should the analyst take?

Options:

A.

Verify email server NTP synchronization status

B.

Validate GeolP data source

C.

Review VPN authentication logs

D.

Verify the user's recent travel activities

Page: 10 / 25
Exam Code: CAS-003
Exam Name: CompTIA Advanced Security Practitioner (CASP) Exam
Last Update: Apr 14, 2023
Questions: 683
CAS-003 pdf

CAS-003 PDF

$32  $80
CAS-003 Engine

CAS-003 Testing Engine

$38  $95
CAS-003 PDF + Engine

CAS-003 PDF + Testing Engine

$52  $130