Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-002 Questions & Answers

  • Question 561:

    A security manager has received the following email from the Chief Financial Officer (CFO):

    "While I am concerned about the security of the proprietary financial data in our ERP application, we have had a lot of turnover in the accounting group and I am having a difficult time meeting our monthly performance targets. As things

    currently stand, we do not allow employees to work from home but this is something I am willing to allow so we can get back on track. What should we do first to securely enable this capability for my group?"

    Based on the information provided, which of the following would be the MOST appropriate response to the CFO?

    A. Remote access to the ERP tool introduces additional security vulnerabilities and should not be allowed.

    B. Allow VNC access to corporate desktops from personal computers for the users working from home.

    C. Allow terminal services access from personal computers after the CFO provides a list of the users working from home.

    D. Work with the executive management team to revise policies before allowing any remote access.

  • Question 562:

    An organization is selecting a SaaS provider to replace its legacy, in house Customer Resource Management (CRM) application. Which of the following ensures the organization mitigates the risk of managing separate user credentials?

    A. Ensure the SaaS provider supports dual factor authentication.

    B. Ensure the SaaS provider supports encrypted password transmission and storage.

    C. Ensure the SaaS provider supports secure hash file exchange.

    D. Ensure the SaaS provider supports role-based access control.

    E. Ensure the SaaS provider supports directory services federation.

  • Question 563:

    The Chief Executive Officer (CEO) of a company that allows telecommuting has challenged the Chief Security Officer's (CSO) request to harden the corporate network's perimeter. The CEO argues that the company cannot protect its employees at home, so the risk at work is no different. Which of the following BEST explains why this company should proceed with protecting its corporate network boundary?

    A. The corporate network is the only network that is audited by regulators and customers.

    B. The aggregation of employees on a corporate network makes it a more valuable target for attackers.

    C. Home networks are unknown to attackers and less likely to be targeted directly.

    D. Employees are more likely to be using personal computers for general web browsing when they are at home.

  • Question 564:

    Which of the following BEST constitutes the basis for protecting VMs from attacks from other VMs hosted on the same physical platform?

    A. Aggressive patch management on the host and guest OSs.

    B. Host based IDS sensors on all guest OSs.

    C. Different antivirus solutions between the host and guest OSs.

    D. Unique Network Interface Card (NIC) assignment per guest OS.

  • Question 565:

    A software development manager is taking over an existing software development project. The team currently suffers from poor communication due to a long delay between requirements documentation and feature delivery. This gap is resulting in an above average number of security-related bugs making it into production. Which of the following development methodologies is the team MOST likely using now?

    A. Agile

    B. Waterfall

    C. Scrum

    D. Spiral

  • Question 566:

    A network administrator with a company's NSP has received a CERT alert for targeted adversarial behavior at the company. In addition to the company's physical security, which of the following can the network administrator use to detect the presence of a malicious actor physically accessing the company's network or information systems from within? (Select TWO).

    A. RAS

    B. Vulnerability scanner

    C. HTTP intercept

    D. HIDS

    E. Port scanner

    F. Protocol analyzer

  • Question 567:

    select id, firstname, lastname from authors

    User input= firstname= Hack;man

    lastname=Johnson

    Which of the following types of attacks is the user attempting?

    A. XML injection

    B. Command injection

    C. Cross-site scripting

    D. SQL injection

  • Question 568:

    A forensic analyst works for an e-discovery firm where several gigabytes of data are processed daily. While the business is lucrative, they do not have the resources or the scalability to adequately serve their clients. Since it is an e-discovery firm where chain of custody is important, which of the following scenarios should they consider?

    A. Offload some data processing to a public cloud

    B. Aligning their client intake with the resources available

    C. Using a community cloud with adequate controls

    D. Outsourcing the service to a third party cloud provider

  • Question 569:

    Joe, a hacker, has discovered he can specifically craft a webpage that when viewed in a browser crashes the browser and then allows him to gain remote code execution in the context of the victim's privilege level. The browser crashes due to an exception error when a heap memory that is unused is accessed. Which of the following BEST describes the application issue?

    A. Integer overflow

    B. Click-jacking

    C. Race condition

    D. SQL injection

    E. Use after free

    F. Input validation

  • Question 570:

    A mature organization with legacy information systems has incorporated numerous new processes and dependencies to manage security as its networks and infrastructure are modernized. The Chief Information Office has become increasingly frustrated with frequent releases, stating that the organization needs everything to work completely, and the vendor should already have those desires built into the software product. The vendor has been in constant communication with personnel and groups within the organization to understand its business process and capture new software requirements from users. Which of the following methods of software development is this organization's configuration management process using?

    A. Agile

    B. SDL

    C. Waterfall

    D. Joint application development

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.