최신 CompTIA Advanced Security Practitioner CAS-001 무료샘플문제:
1. DRAG DROP
Drag and Drop the following information types on to the appropriate CIA category
2. A corporation implements a mobile device policy on smartphones that utilizes a white list for allowed applications. Recently, the security administrator notices that a consumer cloud based storage application has been added to the mobile device white list. Which of the following security implications should the security administrator cite when recommending the application's removal from the white list?
A) Consumer cloud storage systems could allow users to download applications to the smartphone. Installing applications this way would circumvent the application white list.
B) Consumer cloud storage systems retain local copies of each file on the smartphone, as well as in the cloud, causing a potential data breach if the phone is lost or stolen.
C) Smartphones using consumer cloud storage are more likely to have sensitive data remnants on them when they are repurposed.
D) Smartphones can export sensitive data or import harmful data with this application causing the potential for DLP or malware issues.
3. An administrator receives a notification from legal that an investigation is being performed on members of the finance department. As a precaution, legal has advised a legal hold on all documents for an unspecified period of time. Which of the following policies will MOST likely be violated? (Select TWO).
A) Data Storage Policy
B) Corporate Confidentiality Policy
C) Corporate Privacy Policy
D) Data Retention Policy
E) Data Breach Mitigation Policy
4. ---- -
Company A has a remote work force that often includes independent contractors and out of state full time employees.
Company A's security engineer has been asked to implement a solution allowing these users to collaborate on projects with the following goals:
All communications between parties need to be encrypted in transport Users must all have the same application sets at the same version All data must remain at Company A's site All users must not access the system between 12:00 and 1:00 as that is the maintenance window Easy to maintain, patch and change application environment
Which of the following solutions should the security engineer recommend to meet the MOST goals?
A) Create an SSL reverse proxy to a collaboration workspace. Use remote installation service to maintain application version. Have users use full desktop encryption. Schedule server downtime from 12:00 to 1:00 PM.
B) Create an extranet web portal using third party web based office applications. Ensure that Company A maintains the administrative access.
C) Schedule server downtime from 12:00 to 1:00 PM, implement a Terminal Server Gateway, use remote installation services to standardize application on user's laptops.
D) Install an SSL VPN to Company A's datacenter, have users connect to a standard virtual workstation image, set workstation time of day restrictions.
5. A medium-sized company has recently launched an online product catalog. It has decided to keep the credit card purchasing in-house as a secondary potential income stream has been identified in relation to sales leads. The company has decided to undertake a PCI assessment in order to determine the amount of effort required to meet the business objectives. Which compliance category would this task be part of?
A) Industry standard
B) Company guideline
C) Company policy
D) Government regulation
질문과 대답:
질문 # 1 정답: 회원만 볼 수 있음 | 질문 # 2 정답: D | 질문 # 3 정답: A,D | 질문 # 4 정답: D | 질문 # 5 정답: A |