Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-002 Questions & Answers

  • Question 361:

    A University uses a card transaction system that allows students to purchase goods using their student ID. Students can put money on their ID at terminals throughout the campus. The security administrator was notified that computer science students have been using the network to illegally put money on their cards. The administrator would like to attempt to reproduce what the students are doing. Which of the following is the BEST course of action?

    A. Notify the transaction system vendor of the security vulnerability that was discovered.

    B. Use a protocol analyzer to reverse engineer the transaction system's protocol.

    C. Contact the computer science students and threaten disciplinary action if they continue their actions.

    D. Install a NIDS in front of all the transaction system terminals.

  • Question 362:

    A financial company implements end-to-end encryption via SSL in the DMZ, and only IPSec in transport mode with AH enabled and ESP disabled throughout the internal network. The company has hired a security consultant to analyze the network infrastructure and provide a solution for intrusion prevention. Which of the following recommendations should the consultant provide to the security administrator?

    A. Switch to TLS in the DMZ. Implement NIPS on the internal network, and HIPS on the DMZ.

    B. Switch IPSec to tunnel mode. Implement HIPS on the internal network, and NIPS on the DMZ.

    C. Disable AH. Enable ESP on the internal network, and use NIPS on both networks.

    D. Enable ESP on the internal network, and place NIPS on both networks.

  • Question 363:

    Staff from the sales department have administrator rights to their corporate standard operating environment, and often connect their work laptop to customer networks when onsite during meetings and presentations. This increases the risk and likelihood of a security incident when the sales staff reconnects to the corporate LAN. Which of the following controls would BEST protect the corporate network?

    A. Implement a network access control (NAC) solution that assesses the posture of the laptop before granting network access.

    B. Use an independent consulting firm to provide regular network vulnerability assessments and biannually qualitative risk assessments.

    C. Provide sales staff with a separate laptop with no administrator access just for sales visits.

    D. Update the acceptable use policy and ensure sales staff read and acknowledge the policy.

  • Question 364:

    The VoIP administrator starts receiving reports that users are having problems placing phone calls. The VoIP administrator cannot determine the issue, and asks the security administrator for help. The security administrator reviews the switch interfaces and does not see an excessive amount of network traffic on the voice network. Using a protocol analyzer, the security administrator does see an excessive number of SIP INVITE packets destined for the SIP proxy. Based on the information given, which of the following types of attacks is underway and how can it be remediated?

    A. Man in the middle attack; install an IPS in front of SIP proxy.

    B. Man in the middle attack; use 802.1x to secure voice VLAN.

    C. Denial of Service; switch to more secure H.323 protocol.

    D. Denial of Service; use rate limiting to limit traffic.

  • Question 365:

    A data processing server uses a Linux based file system to remotely mount physical disks on a shared SAN. The server administrator reports problems related to processing of files where the file appears to be incompletely written to the disk. The network administration team has conducted a thorough review of all network infrastructure and devices and found everything running at optimal performance. Other SAN customers are unaffected. The data being processed consists of millions of small files being written to disk from a network source one file at a time. These files are then accessed by a local Java program for processing before being transferred over the network to a SE Linux host for processing. Which of the following is the MOST likely cause of the processing problem?

    A. The administrator has a PERL script running which disrupts the NIC by restarting the CRON process every 65 seconds.

    B. The Java developers accounted for network latency only for the read portion of the processing and not the write process.

    C. The virtual file system on the SAN is experiencing a race condition between the reads and writes of network files.

    D. The Linux file system in use cannot write files as fast as they can be read by the Java program resulting in the errors.

  • Question 366:

    A data breach has occurred at Company A and as a result, the Chief Information Officer (CIO) has resigned. The CIO's laptop, cell phone and PC were all wiped of data per company policy. A month later, prosecutors in litigation with Company A suspect the CIO knew about the data breach long before it was discovered and have issued a subpoena requesting all the CIO's email from the last 12 months. The corporate retention policy recommends keeping data for no longer than 90 days. Which of the following should occur?

    A. Restore the CIO's email from an email server backup and provide the last 90 days from the date of the subpoena request.

    B. Inform the litigators that the CIOs information has been deleted as per corporate policy.

    C. Restore the CIO's email from an email server backup and provide the last 90 days from the date of the CIO resignation.

    D. Restore the CIO's email from an email server backup and provide whatever is available up to the last 12 months from the subpoena date.

  • Question 367:

    After connecting to a secure payment server at https://pay.xyz.com, an auditor notices that the SSL certificate was issued to *.xyz.com. The auditor also notices that many of the internal development servers use the same certificate. After installing the certificate on dev1.xyz.com, one of the developers reports misplacing the USB thumb-drive where the SSL certificate was stored. Which of the following should the auditor recommend FIRST?

    A. Generate a new public key on both servers.

    B. Replace the SSL certificate on dev1.xyz.com.

    C. Generate a new private key password for both servers.

    D. Replace the SSL certificate on pay.xyz.com.

  • Question 368:

    A team is established to create a secure connection between software packages in order to list employee's remaining or unused benefits on their paycheck stubs. Which of the following business roles would be MOST effective on this team?

    A. Network Administrator, Database Administrator, Programmers

    B. Network Administrator, Emergency Response Team, Human Resources

    C. Finance Officer, Human Resources, Security Administrator

    D. Database Administrator, Facilities Manager, Physical Security Manager

  • Question 369:

    A small customer focused bank with implemented least privilege principles, is concerned about the possibility of branch staff unintentionally aiding fraud in their day to day interactions with customers. Bank staff has been encouraged to build friendships with customers to make the banking experience feel more personal. The security and risk team have decided that a policy needs to be implemented across all branches to address the risk. Which of the following BEST addresses the security and risk team's concerns?

    A. Information disclosure policy

    B. Awareness training

    C. Job rotation

    D. Separation of duties

  • Question 370:

    Due to cost and implementation time pressures, a security architect has allowed a NAS to be used instead of a SAN for a non-critical, low volume database. Which of the following would make a NAS unsuitable for a business critical, high volume database application that required a high degree of data confidentiality and data availability? (Select THREE).

    A. File level transfer of data

    B. Zoning and LUN security

    C. Block level transfer of data

    D. Multipath

    E. Broadcast storms

    F. File level encryption

    G. Latency

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.