Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-002 Questions & Answers

  • Question 141:

    Company A has a remote work force that often includes independent contractors and out of state full time employees. Company A's security engineer has been asked to implement a solution allowing these users to collaborate on projects with the following goals: All communications between parties need to be encrypted in transport

    Users must all have the same application sets at the same version

    All data must remain at Company A's site

    All users must not access the system between 12:00 and 1:00 as that is the maintenance window

    Easy to maintain, patch and change application environment

    Which of the following solutions should the security engineer recommend to meet the MOST goals?

    A. Create an SSL reverse proxy to a collaboration workspace. Use remote installation service to maintain application version. Have users use full desktop encryption. Schedule server downtime from 12:00 to

    1:00 PM.

    B. Install an SSL VPN to Company A's datacenter, have users connect to a standard virtual workstation image, set workstation time of day restrictions.

    C. Create an extranet web portal using third party web based office applications. Ensure that Company A maintains the administrative access.

    D. Schedule server downtime from 12:00 to 1:00 PM, implement a Terminal Server Gateway, use remote installation services to standardize application on user's laptops.

  • Question 142:

    An administrator receives reports that the network is running slow for users connected to a certain switch. Viewing the network traffic, the administrator reviews the following:

    18:51:59.042108 IP linuxwksta.55467 > dns.company.com.domain: 39462+ PTR? 222.17.4.10.in- addr.arpa. (42)

    18:51:59.055732 IP dns.company.com.domain > linuxwksta.55467: 39462 NXDomain 0/0/0 (42)

    18:51:59.055842 IP linuxwksta.48287 > dns.company.com.domain: 46767+ PTR? 255.19.4.10.in- addr.arpa. (42)

    18:51:59.069816 IP dns.company.com.domain > linuxwksta.48287: 46767 NXDomain 0/0/0 (42)

    18:51:59.159060 IP linuxwksta.42491 > 10.4.17.72.iscsi-target: Flags [P.], seq 1989625106:1989625154, ack 2067334822, win 1525, options [nop,nop,TS val 16021424 ecr 215646227], length 48

    18:51:59.159145 IP linuxwksta.48854 > dns.company.com.domain: 3834+ PTR? 72.17.4.10.in-addr.arpa.

    (41)

    18:51:59.159314 IP 10.4.17.72.iscsi-target > linuxwksta.42491: Flags [P.], seq 1:49, ack 48, win 124, options [nop,nop,TS val 215647479 ecr 16021424], length

    18:51:59.159330 IP linuxwksta.42491 > 10.4.17.72.iscsi-target: Flags [.], ack 49, win 1525, options [nop,nop,TS val 16021424 ecr 215647479], length 0

    18:51:59.165342 IP dns.company.com.domain > linuxwksta.48854: 3834 NXDomain 0/0/0 (41)

    18:51:59.397461 ARP, Request who-has 10.4.16.58 tell 10.4.16.1, length 46

    18:51:59.397597 IP linuxwksta.37684 > dns.company.com.domain: 15022+ PTR? 58.16.4.10.in-addr.arpa.

    (41)

    Given the traffic report, which of the following is MOST likely causing the slow traffic?

    A.

    DNS poisoning

    B.

    Improper network zoning

    C.

    ARP poisoning

    D.

    Improper LUN masking

  • Question 143:

    A morphed worm carrying a 0-day payload has infiltrated the company network and is now spreading across the organization. The security administrator was able to isolate the worm communication and payload distribution channel to TCP port 445. Which of the following can the administrator do in the short term to minimize the attack?

    A. Deploy the following ACL to the HIPS: DENY - TCP - ANY - ANY ?445.

    B. Run a TCP 445 port scan across the organization and patch hosts with open ports.

    C. Add the following ACL to the corporate firewall: DENY - TCP - ANY - ANY - 445.

    D. Force a signature update and full system scan from the enterprise anti-virus solution.

  • Question 144:

    At 10:35 a.m. a malicious user was able to obtain a valid authentication token which allowed read/write access to the backend database of a financial company. At

    10:45 a.m. the security administrator received multiple alerts from the company's statistical anomaly- based IDS about a company database administrator performing unusual transactions. At

    10:55

    a.m. the security administrator resets the database administrator's password.

    At 11:00 a.m. the security administrator is still receiving alerts from the IDS about unusual transactions from the same user. Which of the following is MOST likely the cause of the alerts?

    A.

    The IDS logs are compromised.

    B.

    The new password was compromised.

    C.

    An input validation error has occurred.

    D.

    A race condition has occurred.

  • Question 145:

    An organization has had six security incidents over the past year against their main web application. Each time the organization was able to determine the cause of the incident and restore operations within a few hours to a few days. Which of the following provides the MOST comprehensive method for reducing the time to recover?

    A. Create security metrics that provide information on response times and requirements to determine the best place to focus time and money.

    B. Conduct a loss analysis to determine which systems to focus time and money towards increasing security.

    C. Implement a knowledge management process accessible to the help desk and finance departments to estimate cost and prioritize remediation.

    D. Develop an incident response team, require training for incident remediation, and provide incident reporting and tracking metrics.

  • Question 146:

    An administrator is reviewing logs and sees the following entry:

    Message: Access denied with code 403 (phase 2). Pattern match "\bunion\b.{1,100}?\bselect\b" at ARGS:$id. [data "union all select"] [severity "CRITICAL"] [tag "WEB_ATTACK"] [tag "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"] Action: Intercepted (phase 2) Apache- Handler: php5-script Which of the following attacks was being attempted?

    A. Session hijacking

    B. Cross-site script

    C. SQL injection

    D. Buffer overflow

  • Question 147:

    In single sign-on, the secondary domain needs to trust the primary domain to do which of the following? (Select TWO).

    A. Correctly assert the identity and authorization credentials of the end user.

    B. Correctly assert the authentication and authorization credentials of the end user.

    C. Protect the authentication credentials used to verify the end user identity to the secondary domain for unauthorized use.

    D. Protect the authentication credentials used to verify the end user identity to the secondary domain for authorized use.

    E. Protect the accounting credentials used to verify the end user identity to the secondary domain for unauthorized use.

    F. Correctly assert the identity and authentication credentials of the end user.

  • Question 148:

    Within the company, there is executive management pressure to start advertising to a new target market. Due to the perceived schedule and budget inefficiencies of engaging a technology business unit to commission a new micro-site, the

    marketing department is engaging third parties to develop the site in order to meet time-to-market demands. From a security perspective, which of the following options BEST balances the needs between marketing and risk management?

    A. The third party should be contractually obliged to perform adequate security activities, and evidence of those activities should be confirmed by the company prior to launch.

    B. Outsourcing is a valid option to increase time-to-market. If a security incident occurs, it is not of great concern as the reputational damage will be the third party's responsibility.

    C. The company should never outsource any part of the business that could cause a security or privacy incident. It could lead to legal and compliance issues.

    D. If the third party has an acceptable record to date on security compliance and is provably faster and cheaper, then it makes sense to outsource in this specific situation.

  • Question 149:

    The security manager of a company has hired an external consultant to conduct a security assessment of the company network. The contract stipulates that the consultant is not allowed to transmit any data on the company network while performing wired and wireless security assessments. Which of the following technical means can the consultant use to determine the manufacturer and likely operating system of the company wireless and wired network devices, as well as the computers connected to the company network?

    A. Social engineering

    B. Protocol analyzer

    C. Port scanner

    D. Grey box testing

  • Question 150:

    Company A is purchasing Company B. Company A uses a change management system for all IT processes while Company B does not have one in place. Company B's IT staff needs to purchase a third party product to enhance production. Which of the following NEXT steps should be implemented to address the security impacts this product may cause?

    A. Purchase the product and test it in a lab environment before installing it on any live system.

    B. Allow Company A and B's IT staff to evaluate the new product prior to purchasing it.

    C. Purchase the product and test it on a few systems before installing it throughout the entire company.

    D. Use Company A's change management process during the evaluation of the new product.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.