Sample Questions:-
Question: 1
An organization is implementing a virtualized thin-client solution for normal user computing and access. During a review of the architecture, concerns were raised that an attacker could gain access to multiple user environments by simply gaining a foothold on a single one with malware. Which of the following reasons BEST explains this?
A. Malware on one virtual environment could enable pivoting to others by leveraging vulnerabilities in the hypervisor.
B. A worm on one virtual environment could spread to others by taking advantage of guest OS networking services vulnerabilities.
C. One virtual environment may have one or more application-layer vulnerabilities, which could allow an attacker to escape that environment.
D. Malware on one virtual user environment could be copied to all others by the attached network storage controller.
Answer: A
Question: 2
An online bank has contracted with a consultant to perform a security assessment of the bank’s web portal. The consultant notices the login page is linked from the main page with HTTPS, but when the URL is changed to HTTP, the browser is automatically redirected back to the HTTPS site. Which of the following is a concern for the consultant, and how can it be mitigated?
A. XSS could be used to inject code into the login page during the redirect to the HTTPS site. The consultant should implement a WAF to prevent this.
B. The consultant is concerned the site is using an older version of the SSL 3.0 protocol that is vulnerable to a variety of attacks. Upgrading the site to TLS 1.0 would mitigate this issue.
C. The HTTP traffic is vulnerable to network sniffing, which could disclose usernames and passwords to an attacker. The consultant should recommend disabling HTTP on the web server.
D. A successful MITM attack Could intercept the redirect and use sslstrip to decrypt further HTTPS traffic. Implementing HSTS on the web server would prevent this.
Answer: D
Question: 3
A security administrator wants to implement controls to harden company-owned mobile devices.
Company policy specifies the following requirements:
• Mandatory access control must be enforced by the OS.
• Devices must only use the mobile carrier data transport.
Which of the following controls should the security administrator implement? (Select three).
A. Enable DLP
B. Enable SEAndroid
C. Enable EDR
D. Enable secure boot
E. Enable remote wipe
F. Disable Bluetooth
G. Disable 802.11
H. Disable geotagging
Answer: B,F,G
For More Information:-
Visit Now:-
https://www.dumpspass4sure.com/comptia/cas-003-dumps.html
0 comments:
Post a Comment
Note: Only a member of this blog may post a comment.