Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
sale

Want to Unlock All Questions for this Exam?

Full Exam Access, Discussions, No Robots Checks

CompTIA CAS-002 Exam Actual Questions

The questions for CAS-002 were last updated on March 25, 2024.
  • Viewing page 1 out of 48 pages.
  • Viewing questions 1-5 out of 243 questions

Topic 1 - Enterprise Security

Question #1 Topic 1

An administrator wants to enable policy based flexible mandatory access controls on an open source OS to prevent abnormal application modifications or executions. Which of the following would BEST accomplish this?

  • A. Access control lists
  • B. SELinux
  • C. IPtables firewall
  • D. HIPS
Reveal Solution Hide Solution   Discussion   4

Correct Answer: B 🗳️

Question #2 Topic 1

Company ABCs SAN is nearing capacity, and will cause costly downtimes if servers run out disk space. Which of the following is a more cost effective alternative to buying a new SAN?

  • A. Enable multipath to increase availability
  • B. Enable deduplication on the storage pools
  • C. Implement snapshots to reduce virtual disk size
  • D. Implement replication to offsite datacenter
Reveal Solution Hide Solution   Discussion   1

Correct Answer: B 🗳️

Question #3 Topic 1

A systems administrator establishes a CIFS share on a UNIX device to share data to Windows systems. The security authentication on the Windows domain is set to the highest level. Windows users are stating that they cannot authenticate to the UNIX share. Which of the following settings on the UNIX server would correct this problem?

  • A. Refuse LM and only accept NTLMv2
  • B. Accept only LM
  • C. Refuse NTLMv2 and accept LM
  • D. Accept only NTLM
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #4 Topic 1

A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store cryptographic keys used to sign code and code modules on the VMs. Which of the following will meet this goal without requiring any hardware pass-through implementations?

  • A. vTPM
  • B. HSM
  • C. TPM
  • D. INE
Reveal Solution Hide Solution   Discussion   1

Correct Answer: A 🗳️

Question #5 Topic 1

A user has a laptop configured with multiple operating system installations. The operating systems are all installed on a single SSD, but each has its own partition and logical volume. Which of the following is the BEST way to ensure confidentiality of individual operating system data?

  • A. Encryption of each individual partition
  • B. Encryption of the SSD at the file level
  • C. FDE of each logical volume on the SSD
  • D. FDE of the entire SSD as a single disk
Reveal Solution Hide Solution   Discussion   1

Correct Answer: A 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...