CAS-002 Premium Bundle

CAS-002 Premium Bundle

CompTIA Advanced Security Practitioner (CASP) Certification Exam

4.5 
(15075 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

CompTIA CAS-002 Free Practice Questions

Q1. - (Topic 5) 

An extensible commercial software system was upgraded to the next minor release version to patch a security vulnerability. After the upgrade, an unauthorized intrusion into the system was detected. The software vendor is called in to troubleshoot the issue and reports that all core components were updated properly. Which of the following has been overlooked in securing the system? (Select TWO). 

A. The company’s IDS signatures were not updated. 

B. The company’s custom code was not patched. 

C. The patch caused the system to revert to http. 

D. The software patch was not cryptographically signed. 

E. The wrong version of the patch was used. 

F. Third-party plug-ins were not patched. 

Answer: B,F 

Q2. - (Topic 3) 

A startup company offering software on demand has hired a security consultant to provide expertise on data security. The company’s clients are concerned about data confidentiality. The security consultant must design an environment with data confidentiality as the top priority, over availability and integrity. Which of the following designs is BEST suited for this purpose? 

A. All of the company servers are virtualized in a highly available environment sharing common hardware and redundant virtual storage. Clients use terminal service access to the shared environment to access the virtualized applications. A secret key kept by the startup encrypts the application virtual memory and data store. 

B. All of the company servers are virtualized in a highly available environment sharing common hardware and redundant virtual storage. Clients use terminal service access to the shared environment and to access the virtualized applications. Each client has a common shared key, which encrypts the application virtual memory and data store. 

C. Each client is assigned a set of virtual hosts running shared hardware. Physical storage is partitioned into LUNS and assigned to each client. MPLS technology is used to segment and encrypt each of the client’s networks. PKI based remote desktop with hardware tokens is used by the client to connect to the application. 

D. Each client is assigned a set of virtual hosts running shared hardware. Virtual storage is partitioned and assigned to each client. VLAN technology is used to segment each of the client’s networks. PKI based remote desktop access is used by the client to connect to the application. 

Answer:

Q3. - (Topic 1) 

A security company is developing a new cloud-based log analytics platform. Its purpose is to allow: 

Which of the following are the BEST security considerations to protect data from one customer being disclosed to other customers? (Select THREE). 

A. Secure storage and transmission of API keys 

B. Secure protocols for transmission of log files and search results 

C. At least two years retention of log files in case of e-discovery requests 

D. Multi-tenancy with RBAC support 

E. Sanitizing filters to prevent upload of sensitive log file contents 

F. Encryption of logical volumes on which the customers' log files reside 

Answer: A,B,D 

Q4. - (Topic 2) 

A company has noticed recently that its corporate information has ended up on an online forum. An investigation has identified that internal employees are sharing confidential corporate information on a daily basis. Which of the following are the MOST effective security controls that can be implemented to stop the above problem? (Select TWO). 

A. Implement a URL filter to block the online forum 

B. Implement NIDS on the desktop and DMZ networks 

C. Security awareness compliance training for all employees 

D. Implement DLP on the desktop, email gateway, and web proxies 

E. Review of security policies and procedures 

Answer: C,D 

Q5. - (Topic 5) 

The Chief Information Security Officer (CISO) at a company knows that many users store business documents on public cloud-based storage; and realizes this is a risk to the company. In response, the CISO implements a mandatory training course in which all employees are instructed on the proper use of cloud-based storage. Which of the following risk strategies did the CISO implement? 

A. Avoid 

B. Accept 

C. Mitigate 

D. Transfer 

Answer:

Q6. - (Topic 1) 

A company has issued a new mobile device policy permitting BYOD and company-issued devices. The company-issued device has a managed middleware client that restricts the applications allowed on company devices and provides those that are approved. The middleware client provides configuration standardization for both company owned and BYOD to secure data and communication to the device according to industry best practices. The policy states that, “BYOD clients must meet the company’s infrastructure requirements to permit a connection.” The company also issues a memorandum separate from the policy, which provides instructions for the purchase, installation, and use of the middleware client on BYOD. Which of the following is being described? 

A. Asset management 

B. IT governance 

C. Change management 

D. Transference of risk 

Answer:

Q7. - (Topic 1) 

An intruder was recently discovered inside the data center, a highly sensitive area. To gain access, the intruder circumvented numerous layers of physical and electronic security measures. Company leadership has asked for a thorough review of physical security controls to prevent this from happening again. Which of the following departments are the 

MOST heavily invested in rectifying the problem? (Select THREE). 

A. Facilities management 

B. Human resources 

C. Research and development 

D. Programming 

E. Data center operations 

F. Marketing 

G. Information technology 

Answer: A,E,G 

Q8. - (Topic 4) 

Which of the following activities is commonly deemed “OUT OF SCOPE” when undertaking a penetration test? 

A. Test password complexity of all login fields and input validation of form fields 

B. Reverse engineering any thick client software that has been provided for the test 

C. Undertaking network-based denial of service attacks in production environment 

D. Attempting to perform blind SQL injection and reflected cross-site scripting attacks 

E. Running a vulnerability scanning tool to assess network and host weaknesses 

Answer:

Q9. - (Topic 1) 

A security policy states that all applications on the network must have a password length of eight characters. There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in six months, and two are not expected to be upgraded or removed from the network. Which of the following processes should be followed? 

A. Establish a risk matrix 

B. Inherit the risk for six months 

C. Provide a business justification to avoid the risk 

D. Provide a business justification for a risk exception 

Answer:

Q10. - (Topic 2) 

A security architect has been engaged during the implementation stage of the SDLC to review a new HR software installation for security gaps. With the project under a tight schedule to meet market commitments on project delivery, which of the following security activities should be prioritized by the security architect? (Select TWO). 

A. Perform penetration testing over the HR solution to identify technical vulnerabilities 

B. Perform a security risk assessment with recommended solutions to close off high-rated risks 

C. Secure code review of the HR solution to identify security gaps that could be exploited 

D. Perform access control testing to ensure that privileges have been configured correctly 

E. Determine if the information security standards have been complied with by the project 

Answer: B,E 

Q11. - (Topic 5) 

A company is in the process of outsourcing its customer relationship management system to a cloud provider. It will host the entire organization’s customer database. The database will be accessed by both the company’s users and its customers. The procurement department has asked what security activities must be performed for the deal to proceed. Which of the following are the MOST appropriate security activities to be performed as part of due diligence? (Select TWO). 

A. Physical penetration test of the datacenter to ensure there are appropriate controls. 

B. Penetration testing of the solution to ensure that the customer data is well protected. 

C. Security clauses are implemented into the contract such as the right to audit. 

D. Review of the organizations security policies, procedures and relevant hosting certifications. 

E. Code review of the solution to ensure that there are no back doors located in the software. 

Answer: C,D 

Q12. - (Topic 4) 

The security administrator is reviewing the business continuity plan which consists of virtual infrastructures at corporate headquarters and at the backup site. The administrator is concerned that the VLAN used to perform live migrations of virtual machines to the backup site is across the network provider’s MPLS network. This is a concern due to which of the following? 

A. The hypervisor virtual switches only support Q-in-Q VLANS, not MPLS. This may cause live migrations to the backup site to fail. 

B. VLANs are not compatible with MPLS, which may cause intermittent failures while performing live migrations virtual machines during a disaster. 

C. Passwords are stored unencrypted in memory, which are then transported across the MPLS network. 

D. Transport encryption is being used during the live migration of virtual machines which will impact the performance of the MPLS network. 

Answer:

Q13. DRAG DROP - (Topic 2) 

Company A has experienced external attacks on their network and wants to minimize the attacks from reoccurring. Modify the network diagram to prevent SQL injections, XSS attacks, smurf attacks, e-mail spam, downloaded malware, viruses and ping attacks. The company can spend a MAXIMUM of $50,000 USD. A cost list for each item is listed below: 

1. Anti-Virus Server - $10,000 

2. Firewall-$15,000 

3. Load Balanced Server - $10,000 

4. NIDS/NIPS-$10,000 

5. Packet Analyzer - $5,000 

6. Patch Server-$15,000 

7. Proxy Server-$20,000 

8. Router-$10,000 

9. Spam Filter-$5,000 

10. Traffic Shaper - $20,000 

11. Web Application Firewall - $10,000 

Instructions: Not all placeholders in the diagram need to be filled and items can only be used once. If you place an object on the network diagram, you can remove it by clicking the 

(x) in the upper right-hand of the object. 

Answer:  

Q14. - (Topic 3) 

The VoIP administrator starts receiving reports that users are having problems placing phone calls. The VoIP administrator cannot determine the issue, and asks the security administrator for help. The security administrator reviews the switch interfaces and does not see an excessive amount of network traffic on the voice network. Using a protocol analyzer, the security administrator does see an excessive number of SIP INVITE packets destined for the SIP proxy. Based on the information given, which of the following types of attacks is underway and how can it be remediated? 

A. Man in the middle attack; install an IPS in front of SIP proxy. 

B. Man in the middle attack; use 802.1x to secure voice VLAN. 

C. Denial of Service; switch to more secure H.323 protocol. 

D. Denial of Service; use rate limiting to limit traffic. 

Answer:

Q15. - (Topic 1) 

A university requires a significant increase in web and database server resources for one week, twice a year, to handle student registration. The web servers remain idle for the rest of the year. Which of the following is the MOST cost effective way for the university to securely handle student registration? 

A. Virtualize the web servers locally to add capacity during registration. 

B. Move the database servers to an elastic private cloud while keeping the web servers local. 

C. Move the database servers and web servers to an elastic private cloud. 

D. Move the web servers to an elastic public cloud while keeping the database servers local. 

Answer:

START CAS-002 EXAM