Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-002 Questions & Answers

  • Question 381:

    The network administrator at an enterprise reported a large data leak. One compromised server was used to aggregate data from several critical application servers and send it out to the Internet using HTTPS. Upon investigation, there have been no user logins over the previous week and the endpoint protection software is not reporting any issues. Which of the following BEST provides insight into where the compromised server collected the information?

    A. Review the flow data against each server's baseline communications profile.

    B. Configure the server logs to collect unusual activity including failed logins and restarted services.

    C. Correlate data loss prevention logs for anomalous communications from the server.

    D. Setup a packet capture on the firewall to collect all of the server communications.

  • Question 382:

    A company has noticed recently that its corporate information has ended up on an online forum. An investigation has identified that internal employees are sharing confidential corporate information on a daily basis. Which of the following are the MOST effective security controls that can be implemented to stop the above problem? (Select TWO).

    A. Implement a URL filter to block the online forum

    B. Implement NIDS on the desktop and DMZ networks

    C. Security awareness compliance training for all employees

    D. Implement DLP on the desktop, email gateway, and web proxies

    E. Review of security policies and procedures

  • Question 383:

    A Chief Information Security Officer (CISO) has requested that a SIEM solution be implemented. The CISO wants to know upfront what the projected TCO would be before looking further into this concern. Two vendor proposals have been received:

    Vendor A: product-based solution which can be purchased by the pharmaceutical company. Capital expenses to cover central log collectors, correlators, storage and management consoles expected to be $150,000. Operational expenses are expected to be a 0.5 full time employee (FTE) to manage the solution, and 1 full time employee to respond to incidents per year. Vendor B: managed service-based solution which can be the outsourcer for the pharmaceutical company's needs.

    Bundled offering expected to be $100,000 per year.

    Operational expenses for the pharmaceutical company to partner with the vendor are expected to be a 0.5 FTE per year.

    Internal employee costs are averaged to be $80,000 per year per FTE. Based on calculating TCO of the two vendor proposals over a 5 year period, which of the following options is MOST accurate?

    A. Based on cost alone, having an outsourced solution appears cheaper.

    B. Based on cost alone, having an outsourced solution appears to be more expensive.

    C. Based on cost alone, both outsourced an in-sourced solutions appear to be the same.

    D. Based on cost alone, having a purchased product solution appears cheaper.

  • Question 384:

    A company with 2000 workstations is considering purchasing a HIPS to minimize the impact of a system compromise from malware. Currently, the company projects a total cost of $50,000 for the next three years responding to and eradicating workstation malware. The Information Security Officer (ISO) has received three quotes from different companies that provide HIPS.

    The first quote requires a $10,000 one-time fee, annual cost of $6 per workstation, and a 10% annual support fee based on the number of workstations. The second quote requires a $15,000 one-time fee, an annual cost of $5 per workstation, and a 12% annual fee based on the number of workstations. The third quote has no one-time fee, an annual cost of $8 per workstation, and a 15% annual fee based on the number of workstations.

    Which solution should the company select if the contract is only valid for three years?

    A. First quote

    B. Second quote

    C. Third quote

    D. Accept the risk

  • Question 385:

    A critical system audit shows that the payroll system is not meeting security policy due to missing OS security patches. Upon further review, it appears that the system is not being patched at all. The vendor states that the system is only supported on the current OS patch level. Which of the following compensating controls should be used to mitigate the vulnerability of missing OS patches on this system?

    A. Isolate the system on a secure network to limit its contact with other systems

    B. Implement an application layer firewall to protect the payroll system interface

    C. Monitor the system's security log for unauthorized access to the payroll application

    D. Perform reconciliation of all payroll transactions on a daily basis

  • Question 386:

    A security services company is scoping a proposal with a client. They want to perform a general security audit of their environment within a two week period and consequently have the following requirements:

    Requirement 1 -Ensure their server infrastructure operating systems are at their latest patch levels

    Requirement 2 -Test the behavior between the application and database

    Requirement 3 -Ensure that customer data can not be exfiltrated

    Which of the following is the BEST solution to meet the above requirements?

    A. Penetration test, perform social engineering and run a vulnerability scanner

    B. Perform dynamic code analysis, penetration test and run a vulnerability scanner

    C. Conduct network analysis, dynamic code analysis, and static code analysis

    D. Run a protocol analyzer perform static code analysis and vulnerability assessment

  • Question 387:

    A multi-national company has a highly mobile workforce and minimal IT infrastructure. The company utilizes a BYOD and social media policy to integrate presence technology into global collaboration tools by individuals and teams. As a result of the dispersed employees and frequent international travel, the company is concerned about the safety of employees and their families when moving in and out of certain countries. Which of the following could the company view as a downside of using presence technology?

    A. Insider threat

    B. Network reconnaissance

    C. Physical security

    D. Industrial espionage

  • Question 388:

    A system administrator has just installed a new Linux distribution. The distribution is configured to be "secure out of the box". The system administrator cannot make updates to certain system files and services. Each time changes are attempted, they are denied and a system error is generated. Which of the following troubleshooting steps should the security administrator suggest?

    A. Review settings in the SELinux configuration files

    B. Reset root permissions on systemd files

    C. Perform all administrative actions while logged in as root

    D. Disable any firewall software before making changes

  • Question 389:

    A company has adopted a BYOD program. The company would like to protect confidential information. However, it has been decided that when an employee leaves, the company will not completely wipe the personal device. Which of the following would MOST likely help the company maintain security when employees leave?

    A. Require cloud storage on corporate servers and disable access upon termination

    B. Whitelist access to only non-confidential information

    C. Utilize an MDM solution with containerization

    D. Require that devices not have local storage

  • Question 390:

    A port in a fibre channel switch failed, causing a costly downtime on the company's primary website. Which of the following is the MOST likely cause of the downtime?

    A. The web server iSCSI initiator was down.

    B. The web server was not multipathed.

    C. The SAN snapshots were not up-to-date.

    D. The SAN replication to the backup site failed.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.