Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-002 Questions & Answers

  • Question 301:

    A security administrator needs to deploy a remote access solution for both staff and contractors. Management favors remote desktop due to ease of use. The current risk assessment suggests protecting Windows as much as possible from direct ingress traffic exposure. Which of the following solutions should be selected?

    A. Deploy a remote desktop server on your internal LAN, and require an active directory integrated SSL connection for access.

    B. Change remote desktop to a non-standard port, and implement password complexity for the entire active directory domain.

    C. Distribute new IPSec VPN client software to applicable parties. Virtualize remote desktop services functionality.

    D. Place the remote desktop server(s) on a screened subnet, and implement two-factor authentication.

  • Question 302:

    Which of the following is the information owner responsible for?

    A. Developing policies, standards, and baselines.

    B. Determining the proper classification levels for data within the system.

    C. Integrating security considerations into application and system purchasing decisions.

    D. Implementing and evaluating security controls by validating the integrity of the data.

  • Question 303:

    A forensic analyst receives a hard drive containing malware quarantined by the antivirus application. After creating an image and determining the directory location of the malware file, which of the following helps to determine when the system became infected?

    A. The malware file's modify, access, change time properties.

    B. The timeline analysis of the file system.

    C. The time stamp of the malware in the swap file.

    D. The date/time stamp of the malware detection in the antivirus logs.

  • Question 304:

    The Chief Information Officer (CIO) is focused on improving IT governance within the organization to reduce system downtime. The CIO has mandated that the following improvements be implemented:

    -All business units must now identify IT risks and include them in their business risk profiles.

    -Key controls must be identified and monitored.

    -Incidents and events must be recorded and reported with management oversight.

    -Exemptions to the information security policy must be formally recorded, approved, and managed.

    -IT strategy will be reviewed to ensure it is aligned with the businesses strategy and objectives.

    In addition to the above, which of the following would BEST help the CIO meet the requirements?

    A. Establish a register of core systems and identify technical service owners

    B. Establish a formal change management process

    C. Develop a security requirement traceability matrix

    D. Document legacy systems to be decommissioned and the disposal process

  • Question 305:

    A security manager is collecting RFQ, RFP, and RFI publications to help identify the technology trends which a government will be moving towards in the future. This information is available to the public. By consolidating the information, the security manager will be able to combine several perspectives into a broader view of technology trends. This is an example of which of the following? (Select TWO).

    A. Supervisory control and data acquisition

    B. Espionage

    C. Hacktivism

    D. Data aggregation

    E. Universal description discovery and integration

    F. Open source intelligence gathering

  • Question 306:

    The sales team is considering the deployment of a new CRM solution within the enterprise. The IT and Security teams are members of the project; however, neither team has expertise or experience with the proposed system. Which of the following activities should be performed FIRST?

    A. Visit a company who already has the technology, sign an NDA, and read their latest risk assessment.

    B. Contact the top vendor, assign IT and Security to work together to implement a demo and pen test the system.

    C. Work with Finance to do a second ROI calculation before continuing further with the project.

    D. Research the market, select the top vendors and solicit RFPs from those vendors.

  • Question 307:

    An organization would like to allow employees to use their network username and password to access a third-party service. The company is using Active Directory Federated Services for their directory service. Which of the following should the company ensure is supported by the third-party? (Select TWO).

    A. LDAP/S

    B. SAML

    C. NTLM

    D. OAUTH

    E. Kerberos

  • Question 308:

    A court order has ruled that your company must surrender all the email sent and received by a certain employee for the past five years. After reviewing the backup systems, the IT administrator concludes that email backups are not kept that long. Which of the following policies MUST be reviewed to address future compliance?

    A. Tape backup policies

    B. Offsite backup policies

    C. Data retention policies

    D. Data loss prevention policies

  • Question 309:

    A system administrator has a responsibility to maintain the security of the video teleconferencing system. During a self-audit of the video teleconferencing room, the administrator notices that speakers and microphones are hard-wired and wireless enabled. Which of the following security concerns should the system administrator have about the existing technology in the room?

    A. Wired transmissions could be intercepted by remote users.

    B. Bluetooth speakers could cause RF emanation concerns.

    C. Bluetooth is an unsecure communication channel.

    D. Wireless transmission causes interference with the video signal.

  • Question 310:

    The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor

    corporate publicity. The network is mostly flat, with split staff/guest wireless functionality.

    Which of the following equipment MUST be deployed to guard against unknown threats?

    A. Cloud-based antivirus solution, running as local admin, with push technology for definition updates.

    B. Implementation of an offsite data center hosting all company data, as well as deployment of VDI for all client computing needs.

    C. Host based heuristic IPS, segregated on a management VLAN, with direct control of the perimeter firewall ACLs.

    D. Behavior based IPS with a communication link to a cloud based vulnerability and threat feed.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.