CompTIA Exam CASP CAS-002 Dumps With VCE and PDF Download (Question 616 – Question 620)

PassLeader released the NEWEST CompTIA CAS-002 exam dumps recently! Both CAS-002 VCE dumps and CAS-002 PDF dumps are available on PassLeader, either CAS-002 VCE dumps or CAS-002 PDF dumps have the NEWEST CAS-002 exam questions in it, they will help you passing CompTIA CAS-002 exam easily! You can download the valid CAS-002 dumps VCE and PDF from PassLeader here: https://www.passleader.com/cas-002.html (900 Q&As Dumps)

Also, previewing the NEWEST PassLeader CAS-002 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpenQtV3dLMDkyM0U

QUESTION 616
As a cost saving measure, a company has instructed the security engineering team to allow all consumer devices to be able to access the network. They have asked for recommendations on what is needed to secure the enterprise, yet offer the most flexibility in terms of controlling applications, and stolen devices. Which of the following is BEST suited for the requirements?

A.    MEAP with Enterprise Appstore
B.    Enterprise Appstore with client-side VPN software
C.    MEAP with TLS
D.    MEAP with MDM

Answer: D

QUESTION 617
News outlets are beginning to report on a number of retail establishments that are experiencing payment card data breaches. The data exfiltration is enabled by malware on a compromised computer. After the initial exploit network mapping and fingerprinting occurs in preparation for further exploitation. Which of the following is the MOST effective solution to protect against unrecognized malware infections, reduce detection time, and minimize any damage that might be done?

A.    Remove local admin permissions from all users and change anti-virus to a cloud aware, push technology.
B.    Implement an application whitelist at all levels of the organization.
C.    Deploy a network based heuristic IDS, configure all layer 3 switches to feed data to the IDS for more effective monitoring.
D.    Update router configuration to pass all network traffic through a new proxy server with advanced malware detection.

Answer: B

QUESTION 618
Joe, the Chief Executive Officer (CEO), was an Information security professor and a Subject Matter Expert for over 20 years. He has designed a network defense method which he says is significantly better than prominent international standards. He has recommended that the company use his cryptographic method. Which of the following methodologies should be adopted?

A.    The company should develop an in-house solution and keep the algorithm a secret.
B.    The company should use the CEO’s encryption scheme.
C.    The company should use a mixture of both systems to meet minimum standards.
D.    The company should use the method recommended by other respected information security organizations.

Answer: D

QUESTION 619
The Chief Executive Officer (CEO) of a company that allows telecommuting has challenged the Chief Security Officer’s (CSO) request to harden the corporate network’s perimeter. The CEO argues that the company cannot protect its employees at home, so the risk at work is no different. Which of the following BEST explains why this company should proceed with protecting its corporate network boundary?

A.    The corporate network is the only network that is audited by regulators and customers.
B.    The aggregation of employees on a corporate network makes it a more valuable target for attackers.
C.    Home networks are unknown to attackers and less likely to be targeted directly.
D.    Employees are more likely to be using personal computers for general web browsing when they are at home.

Answer: B

QUESTION 620
An organization has decided to reduce labor costs by outsourcing back office processing of credit applications to a provider located in another country. Data sovereignty and privacy concerns raised by the security team resulted in the third-party provider only accessing and processing the data via remote desktop sessions. To facilitate communications and improve productivity, staff at the third party has been provided with corporate email accounts that are only accessible via the remote desktop sessions. Email forwarding is blocked and staff at the third party can only communicate with staff within the organization. Which of the following additional controls should be implemented to prevent data loss? (Select THREE.)

A.    Implement hashing of data in transit
B.    Session recording and capture
C.    Disable cross session cut and paste
D.    Monitor approved credit accounts
E.    User access audit reviews
F.    Source IP whitelisting

Answer: CEF


Welcome to choose PassLeader CAS-002 dumps for 100% passing CompTIA CAS-002 exam: https://www.passleader.com/cas-002.html (900 Q&As VCE Dumps and PDF Dumps)

Also, previewing the NEWEST PassLeader CAS-002 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpenQtV3dLMDkyM0U