Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
RC0-C02 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Pass4sure CompTIA RC0-C02 Dumps with VCE and PDF 161-170

September 19, 2017

EnsurePass
2017 Sep CompTIA Official New Released RC0-C02
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/RC0-C02.html

CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education

Question No: 161 – (Topic 3)

A business wants to start using social media to promote the corporation and to ensure that customers have a good experience with their products. Which of the following security items should the company have in place before implementation? (Select TWO).

  1. The company must dedicate specific staff to act as social media representatives of the company.

  2. All staff needs to be instructed in the proper use of social media in the work environment.

  3. Senior staff blogs should be ghost written by marketing professionals.

  4. The finance department must provide a cost benefit analysis for social media.

  5. The security policy needs to be reviewed to ensure that social media policy is properly implemented.

  6. The company should ensure that the company has sufficient bandwidth to allow for social media traffic.

Answer: A,E

Question No: 162 – (Topic 3)

A company is in the process of implementing a new front end user interface for its customers, the goal is to provide them with more self-service functionality. The application has been written by developers over the last six months and the project is currently in the test phase.

Which of the following security activities should be implemented as part of the SDL in order to provide the MOST security coverage over the solution? (Select TWO).

  1. Perform unit testing of the binary code

  2. Perform code review over a sampling of the front end source code

  3. Perform black box penetration testing over the solution

  4. Perform grey box penetration testing over the solution

  5. Perform static code review over the front end source code

Answer: D,E Explanation:

With grey box penetration testing it means that you have limited insight into the devise which would most probable by some code knowledge and this type of testing over the solution would provide the most security coverage under the circumstances.

A Code review refers to the examination of an application (the new network based software product in this case) that is designed to identify and assess threats to the organization.

With a static code review it is assumed that you have all the sources available for the application that is being examined. By performing a static code review over the front end

source code you can provide adequate security coverage over the solution.

Question No: 163 – (Topic 3)

A security administrator notices a recent increase in workstations becoming compromised by malware. Often, the malware is delivered via drive-by downloads, from malware hosting websites, and is not being detected by the corporate antivirus. Which of the following solutions would provide the BEST protection for the company?

  1. Increase the frequency of antivirus downloads and install updates to all workstations.

  2. Deploy a cloud-based content filter and enable the appropriate category to prevent further infections.

  3. Deploy a WAF to inspect and block all web traffic which may contain malware and exploits.

  4. Deploy a web based gateway antivirus server to intercept viruses before they enter the network.

Answer: B Explanation:

The undetected malware gets delivered to the company via drive-by and malware hosing websites. Display filters and Capture filters when deployed on the cloud-based content should provide the protection required.

Question No: 164 – (Topic 3)

A security firm is writing a response to an RFP from a customer that is building a new network based software product. The firm’s expertise is in penetration testing corporate networks. The RFP explicitly calls for all possible behaviors of the product to be tested, however, it does not specify any particular method to achieve this goal. Which of the following should be used to ensure the security and functionality of the product? (Select TWO).

  1. Code review

  2. Penetration testing

  3. Grey box testing

  4. Code signing

  5. White box testing

Answer: A,E Explanation:

A Code review refers to the examination of an application (the new network based software product in this case) that is designed to identify and assess threats to the organization.

White box testing assumes that the penetration test team has full knowledge of the network and the infrastructure per se thus rendering the testing to follow a more structured approach.

Question No: 165 – (Topic 3)

The latest independent research shows that cyber attacks involving SCADA systems grew an average of 15% per year in each of the last four years, but that this year’s growth has slowed to around 7%. Over the same time period, the number of attacks against applications has decreased or stayed flat each year. At the start of the measure period, the incidence of PC boot loader or BIOS based attacks was negligible. Starting two years ago, the growth in the number of PC boot loader attacks has grown exponentially. Analysis of these trends would seem to suggest which of the following strategies should be employed?

  1. Spending on SCADA protections should stay steady; application control spending should increase substantially and spending on PC boot loader controls should increase substantially.

  2. Spending on SCADA security controls should stay steady; application control spending should decrease slightly and spending on PC boot loader protections should increase substantially.

  3. Spending all controls should increase by 15% to start; spending on application controls should be suspended, and PC boot loader protection research should increase by 100%.

  4. Spending on SCADA security controls should increase by 15%; application control spending should increase slightly, and spending on PC boot loader protections should remain steady.

Answer: B Explanation:

Spending on the security controls should stay steady because the attacks are still ongoing albeit reduced in occurrence Due to the incidence of BIOS-based attacks growing exponentially as the application attacks being decreased or staying flat spending should increase in this field.

Question No: 166 – (Topic 3)

A system worth $100,000 has an exposure factor of eight percent and an ARO of four. Which of the following figures is the system’s SLE?

A. $2,000 B. $8,000 C. $12,000 D. $32,000

Answer: B Explanation:

Single Loss Expectancy (SLE) is mathematically expressed as: Asset value (AV) x Exposure Factor (EF)

SLE = AV x EF = $100 000 x 8% = $ 8 000

References: http://www.financeformulas.net/Return_on_Investment.html https://en.wikipedia.org/wiki/Risk_assessment

Question No: 167 – (Topic 3)

A business wants to start using social media to promote the corporation and to ensure that customers have a good experience with their products. Which of the following security items should the company have in place before implementation? (Select TWO).

  1. The company must dedicate specific staff to act as social media representatives of the company.

  2. All staff needs to be instructed in the proper use of social media in the work environment.

  3. Senior staff blogs should be ghost written by marketing professionals.

  4. The finance department must provide a cost benefit analysis for social media.

  5. The security policy needs to be reviewed to ensure that social media policy is properly implemented.

  6. The company should ensure that the company has sufficient bandwidth to allow for social media traffic.

Answer: A,E

Question No: 168 – (Topic 3)

A security consultant is conducting a network assessment and wishes to discover any legacy backup Internet connections the network may have. Where would the consultant find this information and why would it be valuable?

  1. This information can be found in global routing tables, and is valuable because backup connections typically do not have perimeter protection as strong as the primary connection.

  2. This information can be found by calling the regional Internet registry, and is valuable because backup connections typically do not require VPN access to the network.

  3. This information can be found by accessing telecom billing records, and is valuable because backup connections typically have much lower latency than primary connections.

  4. This information can be found by querying the network’s DNS servers, and is valuable because backup DNS servers typically allow recursive queries from Internet hosts.

Answer: A Explanation:

A routing table is a set of rules, often viewed in table format that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed. All IP- enabled devices, including routers and switches, use routing tables. Each packet contains information about its origin and destination. When a packet is received, a network device examines the packet and matches it to the routing table entry providing the best match for its destination. The table then provides the device with instructions for sending the packet to the next hop on its route across the network. Thus the security consultant can use the global routing table to get the appropriate information.

Question No: 169 – (Topic 3)

The security administrator has just installed an active\passive cluster of two firewalls for enterprise perimeter defense of the corporate network. Stateful firewall inspection is being used in the firewall implementation. There have been numerous reports of dropped connections with external clients. Which of the following is MOST likely the cause of this problem?

  1. TCP sessions are traversing one firewall and return traffic is being sent through the secondary firewall and sessions are being dropped.

  2. TCP and UDP sessions are being balanced across both firewalls and connections are being dropped because the session IDs are not recognized by the secondary firewall.

  3. Prioritize UDP traffic and associated stateful UDP session information is traversing the passive firewall causing the connections to be dropped.

  4. The firewall administrator connected a dedicated communication cable between the firewalls in order to share a single state table across the cluster causing the sessions to be

dropped.

Answer: A

Question No: 170 – (Topic 3)

The Information Security Officer (ISO) is reviewing a summary of the findings from the last COOP tabletop exercise. The Chief Information Officer (CIO) wants to determine which additional controls must be implemented to reduce the risk of an extended customer service outage due to the VoIP system being unavailable. Which of the following BEST describes the scenario presented and the document the ISO is reviewing?

  1. The ISO is evaluating the business implications of a recent telephone system failure within the BIA.

  2. The ISO is investigating the impact of a possible downtime of the messaging system within the RA.

  3. The ISO is calculating the budget adjustment needed to ensure audio/video system redundancy within the RFQ.

  4. The ISO is assessing the effect of a simulated downtime involving the telecommunication system within the AAR.

Answer: D Explanation:

VoIP is an integral part of network design and in particular remote access, that enables customers accessing and communicating with the company. If VoIP is unavailable then the company is in a situation that can be compared to downtime. And since the ISO is reviewing he summary of findings from the last COOP tabletop exercise, it can be said that the ISO is assessing the effect of a simulated downtime within the AAR.

100% Free Download!
Download Free Demo:RC0-C02 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass RC0-C02 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE