1.
Mike is trying to reduce the risks posed by end user activities. He is particularly concerned about how to deal with employees who take work home. Which of the following is the most likely risk posed by employees taking work home?
2.
New technologies can pose unique and new risks that must be managed. Which of the following new technologies poses the most risk due to regulatory compliance?
3.
Cloud computing is significantly impacting the definition of network perimeters. Which of the following is NOT a network perimeter issue with cloud computing?
4.
Network boundaries can be logical or physical. Which of the following are boundaries a network administrator cannot control?
5.
A partnership is a for profit business association of two or more persons. Which of the following statements are true about partnership? Each correct answer represents a complete solution. Choose all that apply.
6.
Which of the following statements are true about audit findings? Each correct answer represents a complete solution. Choose all that apply.
7.
Denial of service attacks are quite common. Whether it is an ICMP flood, Syn Flood, or SMURF "Certification Depends on Only One Thing" - www.actualanswers.com 33 CompTIA CAS-001 Exam attack, they all are based on the concept of________.
8.
Resource exhaustion includes all of the following except_____
9.
Which of the following security measures would be most effective against a memory exhaustion DoS attack?
10.
Which of the following federal regulations requires federal agencies to be able to monitor activity in a "meaningful and actionable way"?