Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-002 Questions & Answers

  • Question 501:

    A security administrator is performing VDI traffic data collection on a virtual server which migrates from one host to another. While reviewing the data collected by the protocol analyzer, the security administrator notices that sensitive data is present in the packet capture. Which of the following should the security administrator recommend to ensure the confidentiality of sensitive information during live VM migration, while minimizing latency issues?

    A. A separate physical interface placed on a private VLAN should be configured for live host operations.

    B. Database record encryption should be used when storing sensitive information on virtual servers.

    C. Full disk encryption should be enabled across the enterprise to ensure the confidentiality of sensitive data.

    D. Sensitive data should be stored on a backend SAN which uses an isolated fiber channel network.

  • Question 502:

    ABC Corporation has introduced token-based authentication to system administrators due to the risk of password compromise. The tokens have a set of HMAC counter-based codes and are valid until they are used. Which of the following types of authentication mechanisms does this statement describe?

    A. TOTP

    B. PAP

    C. CHAP

    D. HOTP

  • Question 503:

    An IT manager is working with a project manager to implement a new ERP system capable of transacting data between the new ERP system and the legacy system. As part of this process, both parties must agree to the controls utilized to secure data connections between the two enterprise systems. This is commonly documented in which of the following formal documents?

    A. Memorandum of Understanding

    B. Information System Security Agreement

    C. Interconnection Security Agreement

    D. Interoperability Agreement

    E. Operating Level Agreement

  • Question 504:

    An administrator wishes to replace a legacy clinical software product as it has become a security risk. The legacy product generates $10,000 in revenue a month. The new software product has an initial cost of $180,000 and a yearly maintenance of $2,000 after the first year. However, it will generate $15,000 in revenue per month and be more secure. How many years until there is a return on investment for this new package?

    A. 1

    B. 2

    C. 3

    D. 4

  • Question 505:

    A bank is in the process of developing a new mobile application. The mobile client renders content and communicates back to the company servers via REST/ JSON calls. The bank wants to ensure that the communication is stateless between the mobile application and the web services gateway. Which of the following controls MUST be implemented to enable stateless communication?

    A. Generate a one-time key as part of the device registration process.

    B. Require SSL between the mobile application and the web services gateway.

    C. The jsession cookie should be stored securely after authentication.

    D. Authentication assertion should be stored securely on the client.

  • Question 506:

    A pentester must attempt to crack passwords on a windows domain that enforces strong complex passwords. Which of the following would crack the MOST passwords in the shortest time period?

    A. Online password testing

    B. Rainbow tables attack

    C. Dictionary attack

    D. Brute force attack

  • Question 507:

    An organization has implemented an Agile development process for front end web application development. A new security architect has just joined the company and wants to integrate security activities into the SDLC. Which of the following activities MUST be mandated to ensure code quality from a security perspective? (Select TWO).

    A. Static and dynamic analysis is run as part of integration

    B. Security standards and training is performed as part of the project

    C. Daily stand-up meetings are held to ensure security requirements are understood

    D. For each major iteration penetration testing is performed

    E. Security requirements are story boarded and make it into the build

    F. A security design is performed at the end of the requirements phase

  • Question 508:

    The DLP solution has been showing some unidentified encrypted data being sent using FTP to a remote server. A vulnerability scan found a collection of Linux servers that are missing OS level patches. Upon further investigation, a technician notices that there are a few unidentified processes running on a number of the servers. What would be a key FIRST step for the data security team to undertake at this point?

    A. Capture process ID data and submit to anti-virus vendor for review.

    B. Reboot the Linux servers, check running processes, and install needed patches.

    C. Remove a single Linux server from production and place in quarantine.

    D. Notify upper management of a security breach.

    E. Conduct a bit level image, including RAM, of one or more of the Linux servers.

  • Question 509:

    An IT Manager is concerned about errors made during the deployment process for a new model of tablet. Which of the following would suggest best practices and configuration parameters that technicians could follow during the deployment process?

    A. Automated workflow

    B. Procedure

    C. Corporate standard

    D. Guideline

    E. Policy

  • Question 510:

    A security manager is looking into the following vendor proposal for a cloud-based SIEM solution. The intention is that the cost of the SIEM solution will be justified by having reduced the number of incidents and therefore saving on the amount spent investigating incidents.

    Proposal:

    External cloud-based software as a service subscription costing $5,000 per month. Expected to reduce the number of current incidents per annum by 50%.

    The company currently has ten security incidents per annum at an average cost of $10,000 per incident. Which of the following is the ROI for this proposal after three years?

    A. -$30,000

    B. $120,000

    C. $150,000

    D. $180,000

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.