Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner Exam
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Advanced Security Practitioner CAS-002 Questions & Answers

  • Question 21:

    Which of the following displays an example of a buffer overflow attack?

    A.

    B. Checksums-Sha1:7be9e9bac3882beab1abb002bb5cd2302c76c48d 1157 xfig_3.2.5.b-1.dsc e0e3c9a9df6fac8f1536c2209025577edb1d1d9e 5770796 xfig_3.2.5.b.orig.tar.gz d474180fbeb6955e79bfc67520ad775a87b68d80 46856 xfig_3.2.5.b-1.diff.gz ddcba53dffd08e5d37492fbf99fe93392943c7b0 3363512 xfig-doc_3.2.5.b-1_all.deb 7773821c1a925978306d6c75ff5c579b018a2ac6 1677778 xfig-libs_3.2.5.b-1_all.deb b26c18cfb2ee2dc071b0e3bed6205c1fc0655022 739228 xfig_3.2.5.b-1_amd64.deb

    C. #include char *code = "AAAABBBBCCCCDDD"; //including the character '\0' size = 16 bytes void main() {char buf[8]; strcpy(buf, code); }

    D.

    Username: PassworD.

  • Question 22:

    A company currently does not use any type of authentication or authorization service for remote access. The new security policy states that all remote access must be locked down to only authorized personnel. The policy also dictates that only authorized external networks will be allowed to access certain internal resources.

    Which of the following would MOST likely need to be implemented and configured on the company's perimeter network to comply with the new security policy? (Select TWO).

    A. VPN concentrator

    B. Firewall

    C. Proxy server

    D. WAP

    E. Layer 2 switch

  • Question 23:

    The security administrator is receiving numerous alerts from the internal IDS of a possible Conficker infection spreading through the network via the Windows file sharing services. Given the size of the company which deploys over 20,000 workstations and 1,000 servers, the security engineer believes that the best course of action is to block the file sharing service across the organization by placing ACLs on the internal routers.

    Which of the following should the security administrator do before applying the ACL?

    A. Quickly research best practices with respect to stopping Conficker infections and implement the solution.

    B. Consult with the rest of the security team and get approval on the solution by all the team members and the team manager.

    C. Apply the ACL immediately since this is an emergency that could lead to a widespread data compromise.

    D. Call an emergency change management meeting to ensure the ACL will not impact core business functions.

  • Question 24:

    A security engineer is responsible for monitoring company applications for known vulnerabilities. Which of the following is a way to stay current on exploits and information security news?

    A. Update company policies and procedures

    B. Subscribe to security mailing lists

    C. Implement security awareness training

    D. Ensure that the organization vulnerability management plan is up-to-date

  • Question 25:

    The technology steering committee is struggling with increased requirements stemming from an increase in telecommuting. The organization has not addressed telecommuting in the past. The implementation of a new SSL-VPN and a VOIP phone solution enables personnel to work from remote locations with corporate assets. Which of the following steps must the committee take FIRST to outline senior management's directives?

    A. Develop an information classification scheme that will properly secure data on corporate systems.

    B. Implement database views and constrained interfaces so remote users will be unable to access PII from personal equipment.

    C. Publish a policy that addresses the security requirements for working remotely with company equipment.

    D. Work with mid-level managers to identify and document the proper procedures for telecommuting.

  • Question 26:

    Company A has a remote work force that often includes independent contractors and out of state full time employees. Company A's security engineer has been asked to implement a solution allowing these users to collaborate on projects with the following goals: All communications between parties need to be encrypted in transport Users must all have the same application sets at the same version

    All data must remain at Company A's site

    All users must not access the system between 12:00 and 1:00 as that is the maintenance window

    Easy to maintain, patch and change application environment

    Which of the following solutions should the security engineer recommend to meet the MOST goals?

    A. Create an SSL reverse proxy to a collaboration workspace. Use remote installation service to maintain application version. Have users use full desktop encryption. Schedule server downtime from 12:00 to

    1:00 PM.

    B. Install an SSL VPN to Company A's datacenter, have users connect to a standard virtual workstation image, set workstation time of day restrictions.

    C. Create an extranet web portal using third party web based office applications. Ensure that Company A maintains the administrative access.

    D. Schedule server downtime from 12:00 to 1:00 PM, implement a Terminal Server Gateway, use remote installation services to standardize application on user's laptops.

  • Question 27:

    An ecommerce application on a Linux server does not properly track the number of incoming connections to the server and may leave the server vulnerable to which of following?

    A. Buffer Overflow Attack

    B. Storage Consumption Attack

    C. Denial of Service Attack

    D. Race Condition

  • Question 28:

    Company ABC has a 100Mbps fiber connection from headquarters to a remote office 200km (123 miles) away. This connection is provided by the local cable television company. ABC would like to extend a secure VLAN to the remote office, but the cable company says this is impossible since they already use VLANs on their internal network. Which of the following protocols should the cable company be using to allow their customers to establish VLANs to other sites?

    A. IS-IS

    B. EIGRP

    C. MPLS

    D. 802.1q

  • Question 29:

    Company ABC has entered into a marketing agreement with Company XYZ, whereby ABC will share some of its customer information with XYZ. However, XYZ can only contact ABC customers who explicitly agreed to being contacted by third parties. Which of the following documents would contain the details of this marketing agreement?

    A. BPA

    B. ISA

    C. NDA

    D. SLA

  • Question 30:

    An administrator notices the following file in the Linux server's /tmp directory.

    -rwsr-xr-x. 4 root root 234223 Jun 6 22:52 bash*

    Which of the following should be done to prevent further attacks of this nature?

    A. Never mount the /tmp directory over NFS

    B. Stop the rpcidmapd service from running

    C. Mount all tmp directories nosuid, noexec

    D. Restrict access to the /tmp directory

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.