CAS-002 Premium Bundle

CAS-002 Premium Bundle

CompTIA Advanced Security Practitioner (CASP) Certification Exam

4.5 
(24540 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

CompTIA CAS-002 Free Practice Questions

Q1. - (Topic 3) 

A security researcher is about to evaluate a new secure VoIP routing appliance. The appliance manufacturer claims the new device is hardened against all known attacks and several un-disclosed zero day exploits. The code base used for the device is a combination of compiled C and TC/TKL scripts. Which of the following methods should the security research use to enumerate the ports and protocols in use by the appliance? 

A. Device fingerprinting 

B. Switchport analyzer 

C. Grey box testing 

D. Penetration testing 

Answer:

Q2. - (Topic 1) 

The senior security administrator wants to redesign the company DMZ to minimize the risks associated with both external and internal threats. The DMZ design must support security in depth, change management and configuration processes, and support incident reconstruction. Which of the following designs BEST supports the given requirements? 

A. A dual firewall DMZ with remote logging where each firewall is managed by a separate administrator. 

B. A single firewall DMZ where each firewall interface is managed by a separate administrator and logging to the cloud. 

C. A SaaS based firewall which logs to the company’s local storage via SSL, and is managed by the change control team. 

D. A virtualized firewall, where each virtual instance is managed by a separate administrator and logging to the same hardware. 

Answer:

Q3. - (Topic 5) 

The Chief Information Officer (CIO) is focused on improving IT governance within the organization to reduce system downtime. The CIO has mandated that the following improvements be implemented: 

-All business units must now identify IT risks and include them in their business risk profiles. 

-Key controls must be identified and monitored. 

-Incidents and events must be recorded and reported with management oversight. 

-Exemptions to the information security policy must be formally recorded, approved, and managed. 

-IT strategy will be reviewed to ensure it is aligned with the businesses strategy and objectives. 

In addition to the above, which of the following would BEST help the CIO meet the requirements? 

A. Establish a register of core systems and identify technical service owners 

B. Establish a formal change management process 

C. Develop a security requirement traceability matrix 

D. Document legacy systems to be decommissioned and the disposal process 

Answer:

Q4. - (Topic 3) 

A security administrator at a Lab Company is required to implement a solution which will provide the highest level of confidentiality possible to all data on the lab network. 

The current infrastructure design includes: 

The network is protected with a firewall implementing ACLs, a NIPS device, and secured wireless access points. 

Which of the following cryptographic improvements should be made to the current architecture to achieve the stated goals? 

A. PKI based authorization 

B. Transport encryption 

C. Data at rest encryption 

D. Code signing 

Answer:

Q5. - (Topic 2) 

Company policy requires that all company laptops meet the following baseline requirements: 

Software requirements: 

Antivirus Anti-malware Anti-spyware Log monitoring Full-disk encryption 

Terminal services enabled for RDP 

Administrative access for local users 

Hardware restrictions: 

Bluetooth disabled 

FireWire disabled 

WiFi adapter disabled 

Ann, a web developer, reports performance issues with her laptop and is not able to access any network resources. After further investigation, a bootkit was discovered and it was trying to access external websites. Which of the following hardening techniques should be applied to mitigate this specific issue from reoccurring? (Select TWO). 

A. Group policy to limit web access 

B. Restrict VPN access for all mobile users 

C. Remove full-disk encryption 

D. Remove administrative access to local users 

E. Restrict/disable TELNET access to network resources 

F. Perform vulnerability scanning on a daily basis 

G. Restrict/disable USB access 

Answer: D,G 

Q6. - (Topic 2) 

An information security assessor for an organization finished an assessment that identified critical issues with the human resource new employee management software application. The assessor submitted the report to senior management but nothing has happened. Which of the following would be a logical next step? 

A. Meet the two key VPs and request a signature on the original assessment. 

B. Include specific case studies from other organizations in an updated report. 

C. Schedule a meeting with key human resource application stakeholders. 

D. Craft an RFP to begin finding a new human resource application. 

Answer:

Q7. - (Topic 1) 

An application present on the majority of an organization’s 1,000 systems is vulnerable to a buffer overflow attack. Which of the following is the MOST comprehensive way to resolve the issue? 

A. Deploy custom HIPS signatures to detect and block the attacks. 

B. Validate and deploy the appropriate patch. 

C. Run the application in terminal services to reduce the threat landscape. 

D. Deploy custom NIPS signatures to detect and block the attacks. 

Answer:

Q8. - (Topic 5) 

A security company is developing a new cloud-based log analytics platform. Its purpose is to allow: 

Customers to upload their log files to the “big data” platform 

Customers to perform remote log search 

Customers to integrate into the platform using an API so that third party business intelligence tools can be used for the purpose of trending, insights, and/or discovery 

Which of the following are the BEST security considerations to protect data from one customer being disclosed to other customers? (Select THREE). 

A. Secure storage and transmission of API keys 

B. Secure protocols for transmission of log files and search results 

C. At least two years retention of log files in case of e-discovery requests 

D. Multi-tenancy with RBAC support 

E. Sanitizing filters to prevent upload of sensitive log file contents 

F. Encrypted storage of all customer log files 

Answer: A,B,D 

Q9. - (Topic 1) 

After a security incident, an administrator would like to implement policies that would help reduce fraud and the potential for collusion between employees. Which of the following would help meet these goals by having co-workers occasionally audit another worker's position? 

A. Least privilege 

B. Job rotation 

C. Mandatory vacation 

D. Separation of duties 

Answer:

Q10. - (Topic 3) 

A corporation has expanded for the first time by integrating several newly acquired businesses. 

Which of the following are the FIRST tasks that the security team should undertake? (Select TWO). 

A. Remove acquired companies Internet access. 

B. Federate identity management systems. 

C. Install firewalls between the businesses. 

D. Re-image all end user computers to a standard image. 

E. Develop interconnection policy. 

F. Conduct a risk analysis of each acquired company’s networks. 

Answer: E,F 

Q11. - (Topic 3) 

When attending the latest security conference, an information security administrator noticed only a few people carrying a laptop around. Most other attendees only carried their smartphones. 

Which of the following would impact the security of conference’s resources? 

A. Wireless network security may need to be increased to decrease access of mobile devices. 

B. Physical security may need to be increased to deter or prevent theft of mobile devices. 

C. Network security may need to be increased by reducing the number of available physical network jacks. 

D. Wireless network security may need to be decreased to allow for increased access of mobile devices. 

Answer:

Q12. - (Topic 4) 

After being informed that the company DNS is unresponsive, the system administrator issues the following command from a Linux workstation: 

Once at the command prompt, the administrator issues the below commanD. 

Which of the following is true about the above situation? 

A. The administrator must use the sudo command in order to restart the service. 

B. The administrator used the wrong SSH port to restart the DNS server. 

C. The service was restarted correctly, but it failed to bind to the network interface. 

D. The service did not restart because the bind command is privileged. 

Answer:

Q13. - (Topic 2) 

Wireless users are reporting issues with the company’s video conferencing and VoIP systems. The security administrator notices internal DoS attacks from infected PCs on the network causing the VoIP system to drop calls. The security administrator also notices that the SIP servers are unavailable during these attacks. Which of the following security controls will MOST likely mitigate the VoIP DoS attacks on the network? (Select TWO). 

A. Install a HIPS on the SIP servers 

B. Configure 802.1X on the network 

C. Update the corporate firewall to block attacking addresses 

D. Configure 802.11e on the network 

E. Configure 802.1q on the network 

Answer: A,D 

Q14. - (Topic 2) 

The finance department for an online shopping website has discovered that a number of customers were able to purchase goods and services without any payments. Further analysis conducted by the security investigations team indicated that the website allowed customers to update a payment amount for shipping. A specially crafted value could be entered and cause a roll over, resulting in the shipping cost being subtracted from the balance and in some instances resulted in a negative balance. As a result, the system processed the negative balance as zero dollars. Which of the following BEST describes the application issue? 

A. Race condition 

B. Click-jacking 

C. Integer overflow 

D. Use after free 

E. SQL injection 

Answer:

Q15. - (Topic 3) 

A company runs large computing jobs only during the overnight hours. To minimize the amount of capital investment in equipment, the company relies on the elastic computing services of a major cloud computing vendor. Because the virtual resources are created and destroyed on the fly across a large pool of shared resources, the company never knows which specific hardware platforms will be used from night to night. Which of the following presents the MOST risk to confidentiality in this scenario? 

A. Loss of physical control of the servers 

B. Distribution of the job to multiple data centers 

C. Network transmission of cryptographic keys 

D. Data scraped from the hardware platforms 

Answer:

START CAS-002 EXAM