Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-002 Questions & Answers

  • Question 411:

    An organization uses IP address block 203.0.113.0/24 on its internal network. At the border router, the network administrator sets up rules to deny packets with a source address in this subnet from entering the network, and to deny packets with a destination address in this subnet from leaving the network. Which of the following is the administrator attempting to prevent?

    A. BGP route hijacking attacks

    B. Bogon IP network traffic

    C. IP spoofing attacks

    D. Man-in-the-middle attacks

    E. Amplified DDoS attacks

  • Question 412:

    A security auditor suspects two employees of having devised a scheme to steal money from the company. While one employee submits purchase orders for personal items, the other employee approves these purchase orders. The auditor has contacted the human resources director with suggestions on how to detect such illegal activities. Which of the following should the human resource director implement to identify the employees involved in these activities and reduce the risk of this activity occurring in the future?

    A. Background checks

    B. Job rotation

    C. Least privilege

    D. Employee termination procedures

  • Question 413:

    Company policy requires that all unsupported operating systems be removed from the network. The security administrator is using a combination of network based tools to identify such systems for the purpose of disconnecting them from the network. Which of the following tools, or outputs from the tools in use, can be used to help the security administrator make an approximate determination of the operating system in use on the local company network? (Select THREE).

    A. Passive banner grabbing

    B. Password cracker

    C. http://www.company.org/documents_private/index.php?search=string#andtopic=windowsandtcp =packet% 20captureandcookie=wokdjwalkjcnie61lkasdf2aliser4

    D. 443/tcp open http

    E. dig host.company.com

    F. 09:18:16.262743 IP (tos 0x0, ttl 64, id 9870, offset 0, flags [none], proto TCP (6), length 40) 192.168.1.3.1051 > 10.46.3.7.80: Flags [none], cksum 0x1800 (correct), win 512, length 0

    G. Nmap

  • Question 414:

    An IT manager is concerned about the cost of implementing a web filtering solution in an effort to mitigate the risks associated with malware and resulting data leakage. Given that the ARO is twice per year, the ALE resulting from a data leak is $25,000 and the ALE after implementing the web filter is $15,000. The web filtering solution will cost the organization $10,000 per year. Which of the following values is the single loss expectancy of a data leakage event after implementing the web filtering solution?

    A. $0

    B. $7,500

    C. $10,000

    D. $12,500

    E. $15,000

  • Question 415:

    Customers are receiving emails containing a link to malicious software. These emails are subverting spam filters. The email reads as follows:

    Delivered-To: [email protected]

    Received: by 10.14.120.205

    Mon, 1 Nov 2010 11:15:24 -0700 (PDT)

    Received: by 10.231.31.193

    Mon, 01 Nov 2010 11:15:23 -0700 (PDT)

    Return-Path:

    Received: from 127.0.0.1 for ; Mon, 1 Nov 2010 13:15:14 -0500 (envelope- from )

    Received: by smtpex.example.com (SMTP READY)

    with ESMTP (AIO); Mon, 01 Nov 2010 13:15:14 -0500

    Received: from 172.18.45.122 by 192.168.2.55; Mon, 1 Nov 2010 13:15:14 -0500

    From: Company

    To: "[email protected]"

    Date: Mon, 1 Nov 2010 13:15:11 -0500

    Subject: New Insurance Application

    Thread-Topic: New Insurance Application

    Please download and install software from the site below to maintain full access to your account.

    www.examplesite.com

    Additional information: The authorized mail servers IPs are 192.168.2.10 and 192.168.2.11.

    The network's subnet is 192.168.2.0/25.

    Which of the following are the MOST appropriate courses of action a security administrator could take to eliminate this risk? (Select TWO).

    A. Identify the origination point for malicious activity on the unauthorized mail server.

    B. Block port 25 on the firewall for all unauthorized mail servers.

    C. Disable open relay functionality.

    D. Shut down the SMTP service on the unauthorized mail server.

    E. Enable STARTTLS on the spam filter.

  • Question 416:

    A software developer and IT administrator are focused on implementing security in the organization to protect OSI layer 7. Which of the following security technologies would BEST meet their requirements? (Select TWO).

    A. NIPS

    B. HSM

    C. HIPS

    D. NIDS

    E. WAF

  • Question 417:

    A bank has decided to outsource some existing IT functions and systems to a third party service provider. The third party service provider will manage the outsourced systems on their own premises and will continue to directly interface with the bank's other systems through dedicated encrypted links. Which of the following is critical to ensure the successful management of system security concerns between the two organizations?

    A. ISA

    B. BIA

    C. MOU

    D. SOA

    E. BPA

  • Question 418:

    A user is suspected of engaging in potentially illegal activities. Law enforcement has requested that the user continue to operate on the network as normal. However, they would like to have a copy of any communications from the user involving certain key terms. Additionally, the law enforcement agency has requested that the user's ongoing communication be retained in the user's account for future investigations. Which of the following will BEST meet the goals of law enforcement?

    A. Begin a chain-of-custody on for the user's communication. Next, place a legal hold on the user's email account.

    B. Perform an e-discover using the applicable search terms. Next, back up the user's email for a future investigation.

    C. Place a legal hold on the user's email account. Next, perform e-discovery searches to collect applicable emails.

    D. Perform a back up of the user's email account. Next, export the applicable emails that match the search terms.

  • Question 419:

    The Chief Information Security Officer (CISO) at a large organization has been reviewing some security- related incidents at the organization and comparing them to current industry trends. The desktop security engineer feels that the use of USB storage devices on office computers has contributed to the frequency of security incidents. The CISO knows the acceptable use policy prohibits the use of USB storage devices. Every user receives a popup warning about this policy upon login. The SIEM system produces a report of USB violations on a monthly basis; yet violations continue to occur. Which of the following preventative controls would MOST effectively mitigate the logical risks associated with the use of USB storage devices?

    A. Revise the corporate policy to include possible termination as a result of violations

    B. Increase the frequency and distribution of the USB violations report

    C. Deploy PKI to add non-repudiation to login sessions so offenders cannot deny the offense

    D. Implement group policy objects

  • Question 420:

    A security solutions architect has argued consistently to implement the most secure method of encrypting corporate messages. The solution has been derided as not being cost effective by other members of the IT department. The proposed solution uses symmetric keys to encrypt all messages and is very resistant to unauthorized decryption. The method also requires special handling and security for all key material that goes above and beyond most encryption systems.

    Which of the following is the solutions architect MOST likely trying to implement?

    A. One time pads

    B. PKI

    C. Quantum cryptography

    D. Digital rights management

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.