Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-002 Questions & Answers

  • Question 711:

    A new web application system was purchased from a vendor and configured by the internal development team. Before the web application system was moved into production, a vulnerability assessment was conducted. A review of the vulnerability assessment report indicated that the testing team discovered a minor security issue with the configuration of the web application. The security issue should be reported to:

    A. CISO immediately in an exception report.

    B. Users of the new web application system.

    C. The vendor who supplied the web application system.

    D. Team lead in a weekly report.

  • Question 712:

    A database administrator comes across the below records in one of the databases during an internal audit of the payment system:

    UserIDAddressCredit Card No.Password

    jsmith123 fake street55XX-XXX-XXXX-1397Password100 jqdoe234 fake street42XX-XXX-XXXX-202717DEC12

    From a security perspective, which of the following should be the administrator's GREATEST concern, and what will correct the concern?

    A. Concern: Passwords are stored in plain text. Correction: Require a minimum of 8 alphanumeric characters and hash the password.

    B. Concern: User IDs are also usernames, and could be enumerated, thereby disclosing sensitive account information. Correction: Require user IDs to be more complex by using alphanumeric characters and hash the UserIDs.

    C. Concern: User IDs are confidential private information. Correction: Require encryption of user IDs.

    D. Concern: More than four digits within a credit card number are stored. Correction: Only store the last four digits of a credit card to protect sensitive financial information.

  • Question 713:

    Company ABC is planning to outsource its Customer Relationship Management system (CRM) and marketing / leads management to Company XYZ.

    Which of the following is the MOST important to be considered before going ahead with the service?

    A. Internal auditors have approved the outsourcing arrangement.

    B. Penetration testing can be performed on the externally facing web system.

    C. Ensure there are security controls within the contract and the right to audit.

    D. A physical site audit is performed on Company XYZ's management / operation.

  • Question 714:

    A security manager is developing new policies and procedures. Which of the following is a best practice in end user security?

    A. Employee identity badges and physical access controls to ensure only staff are allowed onsite.

    B. A training program that is consistent, ongoing, and relevant.

    C. Access controls to prevent end users from gaining access to confidential data.

    D. Access controls for computer systems and networks with two-factor authentication.

  • Question 715:

    A corporation has expanded for the first time by integrating several newly acquired businesses.

    Which of the following are the FIRST tasks that the security team should undertake? (Select TWO).

    A. Remove acquired companies Internet access.

    B. Federate identity management systems.

    C. Install firewalls between the businesses.

    D. Re-image all end user computers to a standard image.

    E. Develop interconnection policy.

    F. Conduct a risk analysis of each acquired company's networks.

  • Question 716:

    A financial institution wants to reduce the costs associated with managing and troubleshooting employees' desktops and applications, while keeping employees from copying data onto external storage. The Chief Information Officer (CIO) has asked the security team to evaluate four solutions submitted by the change management group. Which of the following BEST accomplishes this task?

    A. Implement desktop virtualization and encrypt all sensitive data at rest and in transit.

    B. Implement server virtualization and move the application from the desktop to the server.

    C. Implement VDI and disable hardware and storage mapping from the thin client.

    D. Move the critical applications to a private cloud and disable VPN and tunneling.

  • Question 717:

    A security administrator must implement a SCADA style network overlay to ensure secure remote management of all network management and infrastructure devices. Which of the following BEST describes the rationale behind this architecture?

    A. A physically isolated network that allows for secure metric collection.

    B. A physically isolated network with inband management that uses two factor authentication.

    C. A logically isolated network with inband management that uses secure two factor authentication.

    D. An isolated network that provides secure out-of-band remote management.

  • Question 718:

    A team of security engineers has applied regulatory and corporate guidance to the design of a corporate network. The engineers have generated an SRTM based on their work and a thorough analysis of the complete set of functional and performance requirements in the network specification. Which of the following BEST describes the purpose of an SRTM in this scenario?

    A. To ensure the security of the network is documented prior to customer delivery

    B. To document the source of all functional requirements applicable to the network

    C. To facilitate the creation of performance testing metrics and test plans

    D. To allow certifiers to verify the network meets applicable security requirements

  • Question 719:

    A developer is coding the crypto routine of an application that will be installed on a standard headless and diskless server connected to a NAS housed in the datacenter. The developer has written the following six lines of code to add entropy to the routine:

    1 - If VIDEO input exists, use video data for entropy

    2 - If AUDIO input exists, use audio data for entropy 3 - If MOUSE input exists, use mouse data for entropy

    4 - IF KEYBOARD input exists, use keyboard data for entropy

    5 - IF IDE input exists, use IDE data for entropy

    6 - IF NETWORK input exists, use network data for entropy

    Which of the following lines of code will result in the STRONGEST seed when combined?

    A. 2 and 1

    B. 3 and 5

    C. 5 and 2

    D. 6 and 4

  • Question 720:

    A large corporation which is heavily reliant on IT platforms and systems is in financial difficulty and needs to drastically reduce costs in the short term to survive. The Chief Financial Officer (CFO) has mandated that all IT and architectural functions will be outsourced and a mixture of providers will be selected. One provider will manage the desktops for five years, another provider will manage the network for ten years, another provider will be responsible for security for four years, and an offshore provider will perform day to day business processing functions for two years. At the end of each contract the incumbent may be renewed or a new provider may be selected. Which of the following are the MOST likely risk implications of the CFO's business decision?

    A. Strategic architecture will be adversely impacted through the segregation of duties between the providers. Vendor management costs will remain unchanged. The risk position of the organization will decline as specialists now maintain the environment. The implementation of security controls and security updates will improve. Internal knowledge of IT systems will improve as providers maintain system documentation.

    B. Strategic architecture will improve as more time can be dedicated to strategy. System stability will improve as providers use specialists and tested processes to maintain systems. Vendor management costs will increase and the organization's flexibility to react to new market conditions will be reduced slightly. Internal knowledge of IT systems will improve as providers maintain system documentation. The risk position of the organization will remain unchanged.

    C. Strategic architecture will not be impacted in the short term, but will be adversely impacted in the long term through the segregation of duties between the providers. Vendor management costs will stay the same and the organization's flexibility to react to new market conditions will be improved through best of breed technology implementations. Internal knowledge of IT systems will decline over time. The implementation of security controls and security updates will not change.

    D. Strategic architecture will be adversely impacted through the segregation of duties between the providers. Vendor management costs will increase and the organization's flexibility to react to new market conditions will be reduced. Internal knowledge of IT systems will decline and decrease future platform development. The implementation of security controls and security updates will take longer as responsibility crosses multiple boundaries.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.