CAS-002 Premium Bundle

CAS-002 Premium Bundle

CompTIA Advanced Security Practitioner (CASP) Certification Exam

4.5 
(31395 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

CompTIA CAS-002 Free Practice Questions

Q1. - (Topic 1) 

A security analyst has been asked to develop a quantitative risk analysis and risk assessment for the company’s online shopping application. Based on heuristic information from the Security Operations Center (SOC), a Denial of Service Attack (DoS) has been successfully executed 5 times a year. The Business Operations department has determined the loss associated to each attack is $40,000. After implementing application caching, the number of DoS attacks was reduced to one time a year. The cost of the countermeasures was $100,000. Which of the following is the monetary value earned during the first year of operation? 

A. $60,000 

B. $100,000 

C. $140,000 

D. $200,000 

Answer:

Q2. - (Topic 4) 

A security policy states that all applications on the network must have a password length of eight characters. There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in six months, and two are not expected to be upgraded or removed from the network. Which of the following processes should be followed? 

A. Establish a risk matrix 

B. Inherit the risk for six months 

C. Provide a business justification to avoid the risk 

D. Provide a business justification for a risk exception 

Answer:

Q3. CORRECT TEXT - (Topic 3) 

The IDS has detected abnormal behavior on this network Click on the network devices to view device information Based on this information, the following tasks need to be completed: 

1. Select the server that is a victim of a SQL injection attack. 

2 Select the source of the buffer overflow attack. 

3. Modify the access control list (ACL) on the router(s) to ONLY block the buffer overflow attack. 

Instructions: Simulations can be reset at any time to the initial state: however, all selections will be deleted. 

Answer: Follow the Steps as 

Q4. - (Topic 5) 

A large organization has recently suffered a massive credit card breach. During the months of Incident Response, there were multiple attempts to assign blame as to whose fault it was that the incident occurred. In which part of the incident response phase would this be addressed in a controlled and productive manner? 

A. During the Identification Phase 

B. During the Lessons Learned phase 

C. During the Containment Phase 

D. During the Preparation Phase 

Answer:

Q5. - (Topic 1) 

Ann, a software developer, wants to publish her newly developed software to an online store. Ann wants to ensure that the software will not be modified by a third party or end users before being installed on mobile devices. Which of the following should Ann implement to stop modified copies of her software from running on mobile devices? 

A. Single sign-on 

B. Identity propagation 

C. Remote attestation 

D. Secure code review 

Answer:

Q6. - (Topic 5) 

For companies seeking to move to cloud services, variances in regulation between jurisdictions can be addressed in which of the following ways? 

A. Ensuring the cloud service provides high availability spanning multiple regions. 

B. Using an international private cloud model as opposed to public IaaS. 

C. Encrypting all data moved to or processed in a cloud-based service. 

D. Tagging VMs to ensure they are only run in certain geographic regions. 

Answer:

Q7. - (Topic 2) 

An organization uses IP address block 203.0.113.0/24 on its internal network. At the border router, the network administrator sets up rules to deny packets with a source address in this subnet from entering the network, and to deny packets with a destination address in this subnet from leaving the network. Which of the following is the administrator attempting to prevent? 

A. BGP route hijacking attacks 

B. Bogon IP network traffic 

C. IP spoofing attacks 

D. Man-in-the-middle attacks 

E. Amplified DDoS attacks 

Answer:

Q8. - (Topic 1) 

A company is in the process of implementing a new front end user interface for its customers, the goal is to provide them with more self service functionality. The application has been written by developers over the last six months and the project is currently in the test phase. 

Which of the following security activities should be implemented as part of the SDL in order to provide the MOST security coverage over the solution? (Select TWO). 

A. Perform unit testing of the binary code 

B. Perform code review over a sampling of the front end source code 

C. Perform black box penetration testing over the solution 

D. Perform grey box penetration testing over the solution 

E. Perform static code review over the front end source code 

Answer: D,E 

Q9. - (Topic 2) 

The risk manager at a small bank wants to use quantitative analysis to determine the ALE of running a business system at a location which is subject to fires during the year. A risk analyst reports to the risk manager that the asset value of the business system is $120,000 and, based on industry data, the exposure factor to fires is only 20% due to the fire suppression system installed at the site. Fires occur in the area on average every four years. Which of the following is the ALE? 

A. $6,000 

B. $24,000 

C. $30,000 

D. $96,000 

Answer:

Q10. - (Topic 2) 

An employee is performing a review of the organization’s security functions and noticed that there is some cross over responsibility between the IT security team and the financial fraud team. Which of the following security documents should be used to clarify the roles and responsibilities between the teams? 

A. BPA 

B. BIA 

C. MOU 

D. OLA 

Answer:

Q11. - (Topic 1) 

A new piece of ransomware got installed on a company’s backup server which encrypted the hard drives containing the OS and backup application configuration but did not affect the deduplication data hard drives. During the incident response, the company finds that all backup tapes for this server are also corrupt. Which of the following is the PRIMARY concern? 

A. Determining how to install HIPS across all server platforms to prevent future incidents 

B. Preventing the ransomware from re-infecting the server upon restore 

C. Validating the integrity of the deduplicated data 

D. Restoring the data will be difficult without the application configuration 

Answer:

Q12. - (Topic 4) 

A company has implemented data retention policies and storage quotas in response to their legal department's requests and the SAN administrator's recommendation. The retention policy states all email data older than 90 days should be eliminated. As there are no technical controls in place, users have been instructed to stick to a storage quota of 500Mb of network storage and 200Mb of email storage. After being presented with an e-discovery request from an opposing legal council, the security administrator discovers that the user in the suit has 1Tb of files and 300Mb of email spanning over two years. Which of the following should the security administrator provide to opposing council? 

A. Delete files and email exceeding policy thresholds and turn over the remaining files and email. 

B. Delete email over the policy threshold and hand over the remaining emails and all of the files. 

C. Provide the 1Tb of files on the network and the 300Mb of email files regardless of age. 

D. Provide the first 200Mb of e-mail and the first 500Mb of files as per policy. 

Answer:

Q13. - (Topic 2) 

A company has a difficult time communicating between the security engineers, application developers, and sales staff. The sales staff tends to overpromise the application deliverables. The security engineers and application developers are falling behind schedule. Which of the following should be done to solve this? 

A. Allow the sales staff to shadow the developers and engineers to see how their sales impact the deliverables. 

B. Allow the security engineering team to do application development so they understand why it takes so long. 

C. Allow the application developers to attend a sales conference so they understand how business is done. 

D. Allow the sales staff to learn application programming and security engineering so they understand the whole lifecycle. 

Answer:

Q14. - (Topic 3) 

An administrator has a system hardening policy to only allow network access to certain services, to always use similar hardware, and to protect from unauthorized application configuration changes. 

Which of the following technologies would help meet this policy requirement? (Select TWO). 

A. Spam filter 

B. Solid state drives 

C. Management interface 

D. Virtualization 

E. Host firewall 

Answer: D,E 

Q15. - (Topic 2) 

A company has noticed recently that its corporate information has ended up on an online forum. An investigation has identified that internal employees are sharing confidential corporate information on a daily basis. Which of the following are the MOST effective security controls that can be implemented to stop the above problem? (Select TWO). 

A. Implement a URL filter to block the online forum 

B. Implement NIDS on the desktop and DMZ networks 

C. Security awareness compliance training for all employees 

D. Implement DLP on the desktop, email gateway, and web proxies 

E. Review of security policies and procedures 

Answer: C,D 

START CAS-002 EXAM