Exam Details

  • Exam Code
    :CAS-002
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :733 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-002 Questions & Answers

  • Question 621:

    A security administrator was doing a packet capture and noticed a system communicating with an address within the 2001::/32 prefix. The network administrator confirms there is no IPv6 routing into or out of the network. Which of the following is the BEST course of action?

    A. Investigate the network traffic and block UDP port 3544 at the firewall

    B. Remove the system from the network and disable IPv6 at the router

    C. Locate and remove the unauthorized 6to4 relay from the network

    D. Disable the switch port and block the 2001::/32 traffic at the firewall

  • Question 622:

    Which of the following is an example of single sign-on?

    A. An administrator manages multiple platforms with the same username and hardware token. The same username and token is used across all the platforms.

    B. Multiple applications have been integrated with a centralized LDAP directory for authentication and authorization. A user has to authenticate each time the user accesses an application.

    C. A password is synchronized between multiple platforms and the user is required to authenticate with the same password across each platform.

    D. A web access control infrastructure performs authentication and passes attributes in a HTTP header to multiple applications.

  • Question 623:

    Which of the following BEST describes the implications of placing an IDS device inside or outside of the corporate firewall?

    A. Placing the IDS device inside the firewall will allow it to monitor potential internal attacks but may increase the load on the system.

    B. Placing the IDS device outside the firewall will allow it to monitor potential remote attacks while still allowing the firewall to block the attack.

    C. Placing the IDS device inside the firewall will allow it to monitor potential remote attacks but may increase the load on the system.

    D. Placing the IDS device outside the firewall will allow it to monitor potential remote attacks but the firewall will not be able to block the attacks.

  • Question 624:

    In order to reduce costs and improve employee satisfaction, a large corporation is creating a BYOD policy. It will allow access to email and remote connections to the corporate enterprise from personal devices; provided they are on an approved device list. Which of the following security measures would be MOST effective in securing the enterprise under the new policy? (Select TWO).

    A. Provide free email software for personal devices.

    B. Encrypt data in transit for remote access.

    C. Require smart card authentication for all devices

    D. Implement NAC to limit insecure devices access.

    E. Enable time of day restrictions for personal devices.

  • Question 625:

    A new internal network segmentation solution will be implemented into the enterprise that consists of 200 internal firewalls. As part of running a pilot exercise, it was determined that it takes three changes to deploy a new application onto the network before it is operational. Security now has a significant affect on overall availability. Which of the following would be the FIRST process to perform as a result of these findings?

    A. Lower the SLA to a more tolerable level and perform a risk assessment to see if the solution could be met by another solution. Reuse the firewall infrastructure on other projects.

    B. Perform a cost benefit analysis and implement the solution as it stands as long as the risks are understood by the business owners around the availability issues. Decrease the current SLA expectations to match the new solution.

    C. Engage internal auditors to perform a review of the project to determine why and how the project did not meet the security requirements. As part of the review ask them to review the control effectiveness.

    D. Review to determine if control effectiveness is in line with the complexity of the solution. Determine if the requirements can be met with a simpler solution.

  • Question 626:

    An administrator has four virtual guests on a host server. Two of the servers are corporate SQL servers, one is a corporate mail server, and one is a testing web server for a small group of developers. The administrator is experiencing difficulty connecting to the host server during peak network usage times. Which of the following would allow the administrator to securely connect to and manage the host server during peak usage times?

    A. Increase the virtual RAM allocation to high I/O servers.

    B. Install a management NIC and dedicated virtual switch.

    C. Configure the high I/O virtual servers to use FCoE rather than iSCSI.

    D. Move the guest web server to another dedicated host.

  • Question 627:

    A corporation implements a mobile device policy on smartphones that utilizes a white list for allowed applications. Recently, the security administrator notices that a consumer cloud based storage application has been added to the mobile device white list. Which of the following security implications should the security administrator cite when recommending the application's removal from the white list?

    A. Consumer cloud storage systems retain local copies of each file on the smartphone, as well as in the cloud, causing a potential data breach if the phone is lost or stolen.

    B. Smartphones can export sensitive data or import harmful data with this application causing the potential for DLP or malware issues.

    C. Consumer cloud storage systems could allow users to download applications to the smartphone. Installing applications this way would circumvent the application white list.

    D. Smartphones using consumer cloud storage are more likely to have sensitive data remnants on them when they are repurposed.

  • Question 628:

    Ann, a software developer, wants to publish her newly developed software to an online store. Ann wants to ensure that the software will not be modified by a third party or end users before being installed on mobile devices. Which of the following should Ann implement to stop modified copies of her software form running on mobile devices?

    A. Single sign-on

    B. Identity propagation

    C. Remote attestation

    D. Secure code review

  • Question 629:

    An administrator receives a notification from legal that an investigation is being performed on members of the finance department. As a precaution, legal has advised a legal hold on all documents for an unspecified period of time. Which of the following policies will MOST likely be violated? (Select TWO).

    A. Data Storage Policy

    B. Data Retention Policy

    C. Corporate Confidentiality Policy

    D. Data Breach Mitigation Policy

    E. Corporate Privacy Policy

  • Question 630:

    Company XYZ has had repeated vulnerability exploits of a critical nature released to the company's flagship product. The product is used by a number of large customers. At the Chief Information Security Officer's (CISO's) request, the product manager now has to budget for a team of security consultants to introduce major product security improvements.

    Here is a list of improvements in order of priority:

    1.

    A noticeable improvement in security posture immediately.

    2.

    Fundamental changes to resolve systemic issues as an ongoing process

    3.

    Improvements should be strategic as opposed to tactical

    4.

    Customer impact should be minimized

    Which of the following recommendations is BEST for the CISO to put forward to the product manager?

    A. Patch the known issues and provide the patch to customers. Make a company announcement to customers on the main website to reduce the perceived exposure of the application to alleviate customer concerns. Engage penetration testers and code reviewers to perform an in-depth review of the product. Based on the findings, address the defects and re-test the findings to ensure that any defects have been resolved.

    B. Patch the known issues and provide the patch to customers. Engage penetration testers and code reviewers to perform an in-depth review of the product. Based on the findings, address the defects and re-test the findings to ensure that the defects have been resolved. Introduce periodic code review and penetration testing of the product in question and consider including all relevant future projects going forward.

    C. Patch the known issues and provide the patch to customers. Implement an SSDLC / SDL overlay on top of the SDLC. Train architects, designers, developers, testers and operators on security importance and ensure that security-relevant activities are performed within each of the SDLC phases. Use the product as the primary focal point to close out issues and consider using the SSDLC / SDL overlay for all relevant future projects.

    D. Stop active support of the product. Bring forward end-of-life dates for the product so that it can be decommissioned. Start a new project to develop a replacement product and ensure that an SSDLC / SDL overlay on top of the SDLC is formed. Train BAs, architects, designers, developers, testers and operators on security importance and ensure that security-relevant activities are performed within each of the SDLC phases.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.