Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-002 Questions & Answers

  • Question 321:

    The Chief Information Security Officer (CISO) at a software development company is concerned about the lack of introspection during a testing cycle of the company's flagship product. Testing was conducted by a small offshore consulting firm and the report by the consulting firm clearly indicates that limited test cases were used and many of the code paths remained untested.

    The CISO raised concerns about the testing results at the monthly risk committee meeting, highlighting the need to get to the bottom of the product behaving unexpectedly in only some large enterprise deployments.

    The Security Assurance and Development teams highlighted their availability to redo the testing if required.

    Which of the following will provide the MOST thorough testing?

    A. Have the small consulting firm redo the Black box testing.

    B. Use the internal teams to perform Grey box testing.

    C. Use the internal team to perform Black box testing.

    D. Use the internal teams to perform White box testing.

    E. Use a larger consulting firm to perform Black box testing.

  • Question 322:

    Company XYZ recently acquired a manufacturing plant from Company ABC which uses a different manufacturing ICS platform. Company XYZ has strict ICS security regulations while Company ABC does not. Which of the following approaches would the network security administrator for Company XYZ MOST likely proceed with to integrate the new manufacturing plant?

    A. Conduct a network vulnerability assessment of acquired plant ICS platform and correct all identified flaws during integration.

    B. Convert the acquired plant ICS platform to the Company XYZ standard ICS platform solely to eliminate potential regulatory conflicts.

    C. Conduct a risk assessment of the acquired plant ICS platform and implement any necessary or required controls during integration.

    D. Require Company ABC to bring their ICS platform into regulatory compliance prior to integrating the new plant into Company XYZ's network.

  • Question 323:

    Three companies want to allow their employees to seamlessly connect to each other's wireless corporate networks while keeping one consistent wireless client configuration. Each company wants to maintain its own authentication infrastructure and wants to ensure that an employee who is visiting the other two companies is authenticated by the home office when connecting to the other companies' wireless network. All three companies have agreed to standardize on 802.1x EAP- PEAP-MSCHAPv2 for client configuration. Which of the following should the three companies implement?

    A. The three companies should agree on a single SSID and configure a hierarchical RADIUS system which implements trust delegation.

    B. The three companies should implement federated authentication through Shibboleth connected to an LDAP backend and agree on a single SSID.

    C. The three companies should implement a central portal-based single sign-on and agree to use the same CA when issuing client certificates.

    D. All three companies should use the same wireless vendor to facilitate the use of a shared cloud based wireless controller.

  • Question 324:

    A new IDS device is generating a very large number of irrelevant events. Which of the following would BEST remedy this problem?

    A. Change the IDS to use a heuristic anomaly filter.

    B. Adjust IDS filters to decrease the number of false positives.

    C. Change the IDS filter to data mine the false positives for statistical trending data.

    D. Adjust IDS filters to increase the number of false negatives.

  • Question 325:

    A Security Administrator has some concerns about the confidentiality of data when using SOAP. Which of the following BEST describes the Security Administrator's concerns?

    A. The SOAP header is not encrypted and allows intermediaries to view the header data. The body can be partially or completely encrypted.

    B. The SOAP protocol supports weak hashing of header information. As a result the header and body can easily be deciphered by brute force tools.

    C. The SOAP protocol can be easily tampered with, even though the header is encrypted.

    D. The SOAP protocol does not support body or header encryption which allows assertions to be viewed in clear text by intermediaries.

  • Question 326:

    The Chief Executive Officer (CEO) of a large prestigious enterprise has decided to reduce business costs by outsourcing to a third party company in another country. Functions to be outsourced include: business analysts, testing, software development and back office functions that deal with the processing of customer data. The Chief Risk Officer (CRO) is concerned about the outsourcing plans. Which of the following risks are MOST likely to occur if adequate controls are not implemented?

    A. Geographical regulation issues, loss of intellectual property and interoperability agreement issues

    B. Improper handling of client data, interoperability agreement issues and regulatory issues

    C. Cultural differences, increased cost of doing business and divestiture issues

    D. Improper handling of customer data, loss of intellectual property and reputation damage

  • Question 327:

    A company has been purchased by another agency and the new security architect has identified new security goals for the organization. The current location has video surveillance throughout the building and entryways. The following requirements must be met:

    1.

    Ability to log entry of all employees in and out of specific areas

    2.

    Access control into and out of all sensitive areas

    3.

    Two-factor authentication

    Which of the following would MOST likely be implemented to meet the above requirements and provide a secure solution? (Select TWO).

    A. Proximity readers

    B. Visitor logs

    C. Biometric readers

    D. Motion detection sensors

    E. Mantrap

  • Question 328:

    Company ABC will test connecting networks with Company XYZ as part of their upcoming merger and are both concerned with minimizing security exposures to each others network throughout the test. Which of the following is the FIRST thing both sides should do prior to connecting the networks?

    A. Create a DMZ to isolate the two companies and provide a security inspection point for all inter- company network traffic.

    B. Determine the necessary data flows between the two companies.

    C. Implement a firewall that restricts everything except the IPSec VPN traffic connecting the two companies.

    D. Implement inline NIPS on the connection points between the two companies.

  • Question 329:

    In a SPML exchange, which of the following BEST describes the three primary roles?

    A. The Provisioning Service Target (PST) entity makes the provisioning request, the Provisioning Service Provider (PSP) responds to the PST requests, and the Provisioning Service Target (PST) performs the provisioning.

    B. The Provisioning Service Provider (PSP) entity makes the provisioning request, the Provisioning Service Target (PST) responds to the PSP requests, and the Provisioning Service Provider (PSP) performs the provisioning.

    C. The Request Authority (RA) entity makes the provisioning request, the Provisioning Service Target (PST) responds to the RA requests, and the Provisioning Service Provider (PSP) performs the provisioning.

    D. The Request Authority (RA) entity makes the provisioning request, the Provisioning Service Provider (PSP) responds to the RA requests, and the Provisioning Service Target (PST) performs the provisioning.

  • Question 330:

    A medium-sized company has recently launched an online product catalog. It has decided to keep the credit card purchasing in-house as a secondary potential income stream has been identified in relation to sales leads. The company has decided to undertake a PCI assessment in order to determine the amount of effort required to meet the business objectives. Which compliance category would this task be part of?

    A. Government regulation

    B. Industry standard

    C. Company guideline

    D. Company policy

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.