Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-002 Questions & Answers

  • Question 611:

    Which of the following activities is commonly deemed "OUT OF SCOPE" when undertaking a penetration test?

    A. Attempting to perform blind SQL injection and reflected cross-site scripting attacks

    B. Undertaking network-based denial of service attacks in production environment

    C. Test password complexity of all login fields and input validation of form fields

    D. Reverse engineering any thick client software that has been provided for the test

  • Question 612:

    A company is in the process of outsourcing its customer relationship management system to a cloud provider. It will host the entire organization's customer database. The database will be accessed by both the company's users and its customers. The procurement department has asked what security activities must be performed for the deal to proceed. Which of the following are the MOST appropriate security activities to be performed as part of due diligence? (Select TWO).

    A. Physical penetration test of the datacenter to ensure there are appropriate controls.

    B. Penetration testing of the solution to ensure that the customer data is well protected.

    C. Security clauses are implemented into the contract such as the right to audit.

    D. Review of the organizations security policies, procedures and relevant hosting certifications.

    E. Code review of the solution to ensure that there are no back doors located in the software.

  • Question 613:

    An intruder was recently discovered inside the data center, a highly sensitive area. To gain access, the intruder circumvented numerous layers of physical and electronic security measures. Company leadership has asked for a thorough review of physical security controls to prevent this from happening again. Which of the following departments are the MOST heavily invested in rectifying the problem? (Select THREE).

    A. Facilities management

    B. Human resources

    C. Research and development

    D. Programming

    E. Data center operations

    F. Marketing

    G. Information technology

  • Question 614:

    A system administrator needs to meet the maximum amount of security goals for a new DNS infrastructure. The administrator deploys DNSSEC extensions to the domain names and infrastructure. Which of the following security goals does this meet? (Select TWO).

    A. Availability

    B. Authentication

    C. Integrity

    D. Confidentiality

    E. Encryption

  • Question 615:

    A company wishes to purchase a new security appliance. A security administrator has extensively researched the appliances, and after presenting security choices to the company's management team, they approve of the proposed solution. Which of the following documents should be constructed to acquire the security appliance?

    A. SLA

    B. RFQ

    C. RFP

    D. RFI

  • Question 616:

    After a security incident, an administrator would like to implement policies that would help reduce fraud and the potential for collusion between employees. Which of the following would help meet these goals by having co-workers occasionally audit another worker's position?

    A. Least privilege

    B. Job rotation

    C. Mandatory vacation

    D. Separation of duties

  • Question 617:

    Ann, a systems engineer, is working to identify an unknown node on the corporate network. To begin her investigative work, she runs the following nmap command string:

    user@hostname:~$ sudo nmap 192.168.1.54

    Based on the output, nmap is unable to identify the OS running on the node, but the following ports are open on the device:

    TCP/22 TCP/111

    TCP/512-514

    TCP/2049

    TCP/32778

    Based on this information, which of the following operating systems is MOST likely running on the unknown node?

    A. Linux

    B. Windows

    C. Solaris

    D. OSX

  • Question 618:

    A security analyst is tasked to create an executive briefing, which explains the activity and motivation of a cyber adversary. Which of the following is the MOST important content for the brief for management personnel to understand?

    A. Threat actor types, threat actor motivation, and attack tools

    B. Unsophisticated agents, organized groups, and nation states

    C. Threat actor types, attack sophistication, and the anatomy of an attack

    D. Threat actor types, threat actor motivation, and the attack impact

  • Question 619:

    Company XYZ is building a new customer facing website which must access some corporate resources. The company already has an internal facing web server and a separate server supporting an extranet to which suppliers have access.

    The extranet web server is located in a network DMZ. The internal website is hosted on a laptop on the internal corporate network. The internal network does not restrict traffic between any internal hosts. Which of the following locations will BEST secure both the intranet and the customer facing website?

    A. The existing internal network segment

    B. Dedicated DMZ network segments

    C. The existing extranet network segment

    D. A third-party web hosting company

  • Question 620:

    A security engineer is a new member to a configuration board at the request of management. The company has two new major IT projects starting this year and wants to plan security into the application deployment. The board is primarily concerned with the applications' compliance with federal assessment and authorization standards. The security engineer asks for a timeline to determine when a security assessment of both applications should occur and does not attend subsequent configuration board meetings. If the security engineer is only going to perform a security assessment, which of the following steps in system authorization has the security engineer omitted? (Select TWO).

    A. Establish the security control baseline to be assessed

    B. Build the application according to software development security standards

    C. Write the systems functionality requirements into the security requirements traceability matrix

    D. Review the results of user acceptance testing

    E. Categorize the applications according to use

    F. Consult with the stakeholders to determine which standards can be omitted

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.