Question no. 6
Company ABC’s SAN is nearing capacity, and will cause costly downtimes if servers run
out disk space. Which of the following is a more cost effective alternative to buying a new
SAN?
A. Enable multipath to increase availability
B. Enable deduplication on the storage pools
C. Implement snapshots to reduce virtual disk size
D. Implement replication to offsite datacenter
Answer: B
Question no. 7
A systems administrator establishes a CIFS share on a UNIX device to share data to
Windows systems. The security authentication on the Windows domain is set to the highest
level. Windows users are stating that they cannot authenticate to the UNIX share. Which of
the following settings on the UNIX server would correct this problem?
A. Refuse LM and only accept NTLMv2
B. Accept only LM
C. Refuse NTLMv2 and accept LM
D. Accept only NTLM
Answer: A
Question no. 8
Two universities are making their 802.11n wireless networks available to the other
university’s students. The infrastructure will pass the student’s credentials back to the
home school for authentication via the Internet.
The requirements are:
Mutual authentication of clients and authentication server
The design should not limit connection speeds Authentication must be delegated to the home school
No passwords should be sent unencrypted
The following design was implemented:
WPA2 Enterprise using EAP-PEAP-MSCHAPv2 will be used for wireless security
RADIUS proxy servers will be used to forward authentication requests to the home school
The RADIUS servers will have certificates from a common public certificate authority
A strong shared secret will be used for RADIUS server authentication
Which of the following security considerations should be added to the design?
A. The transport layer between the RADIUS servers should be secured
B. WPA Enterprise should be used to decrease the network overhead
C. The RADIUS servers should have local accounts for the visiting students
D. Students should be given certificates to use for authentication to the network
Answer: A
Question no.9
A large organization has recently suffered a massive credit card breach. During the months
of Incident Response, there were multiple attempts to assign blame for whose fault it was
that the incident occurred. In which part of the incident response phase would this be
addressed in a controlled and productive manner?
A. During the Identification Phase
B. During the Lessons Learned phase
C. During the Containment Phase
D. During the Preparation Phase
Answer: B
Question no.10
Three companies want to allow their employees to seamlessly connect to each other’s
wireless corporate networks while keeping one consistent wireless client configuration.Each company wants to maintain its own authentication infrastructure and wants to ensure
that an employee who is visiting the other two companies is authenticated by the home
office when connecting to the other companies’ wireless network. All three companies have
agreed to standardize on 802.1x EAP-PEAP-MSCHAPv2 for client configuration. Which of
the following should the three companies implement?
A. The three companies should agree on a single SSID and configure a hierarchical
RADIUS system which implements trust delegation.
B. The three companies should implement federated authentication through Shibboleth
connected to an LDAP backend and agree on a single SSID.
C. The three companies should implement a central portal-based single sign-on and agree
to use the same CA when issuing client certificates.
D. All three companies should use the same wireless vendor to facilitate the use of a
shared cloud based wireless controller.
Answer: A
Though it was challenging for me to attempt for CAS-002 exam, but CAS-002 questions, answers made it easy with accurately broadly presented knowledge of the field. The experts at Exam4Help.com were always there for help. CAS-002 dumps PDF gave me a full understanding of the field.
ReplyDelete