CAS-002 Premium Bundle

CAS-002 Premium Bundle

CompTIA Advanced Security Practitioner (CASP) Certification Exam

4.5 
(35940 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

CompTIA CAS-002 Free Practice Questions

Q1. - (Topic 2) 

The telecommunications manager wants to improve the process for assigning company-owned mobile devices and ensuring data is properly removed when no longer needed. Additionally, the manager wants to onboard and offboard personally owned mobile devices that will be used in the BYOD initiative. Which of the following should be implemented to ensure these processes can be automated? (Select THREE). 

A. SIM’s PIN 

B. Remote wiping 

C. Chargeback system 

D. MDM software 

E. Presence software 

F. Email profiles 

G. Identity attestation 

H. GPS tracking 

Answer: B,D,G 

Q2. - (Topic 2) 

An enterprise must ensure that all devices that connect to its networks have been previously approved. The solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs and administrative overhead, the security architect wants to outsource identity proofing and second factor digital delivery to the third party. Which of the following solutions will address the enterprise requirements? 

A. Implementing federated network access with the third party. 

B. Using a HSM at the network perimeter to handle network device access. 

C. Using a VPN concentrator which supports dual factor via hardware tokens. 

D. Implementing 802.1x with EAP-TTLS across the infrastructure. 

Answer:

Q3. - (Topic 1) 

select id, firstname, lastname from authors User input= firstname= Hack;man lastname=Johnson 

Which of the following types of attacks is the user attempting? 

A. XML injection 

B. Command injection 

C. Cross-site scripting 

D. SQL injection 

Answer:

Q4. - (Topic 4) 

A security administrator is tasked with implementing two-factor authentication for the company VPN. The VPN is currently configured to authenticate VPN users against a backend RADIUS server. New company policies require a second factor of authentication, and the Information Security Officer has selected PKI as the second factor. Which of the following should the security administrator configure and implement on the VPN concentrator to implement the second factor and ensure that no error messages are displayed to the user during the VPN connection? (Select TWO). 

A. The user’s certificate private key must be installed on the VPN concentrator. 

B. The CA’s certificate private key must be installed on the VPN concentrator. 

C. The user certificate private key must be signed by the CA. 

D. The VPN concentrator’s certificate private key must be signed by the CA and installed on the VPN concentrator. 

E. The VPN concentrator’s certificate private key must be installed on the VPN concentrator. 

F. The CA’s certificate public key must be installed on the VPN concentrator. 

Answer: E,F 

Q5. - (Topic 1) 

A Chief Financial Officer (CFO) has raised concerns with the Chief Information Security Officer (CISO) because money has been spent on IT security infrastructure, but corporate assets are still found to be vulnerable. The business recently funded a patch management product and SOE hardening initiative. A third party auditor reported findings against the business because some systems were missing patches. Which of the following statements BEST describes this situation? 

A. The CFO is at fault because they are responsible for patching the systems and have already been given patch management and SOE hardening products. 

B. The audit findings are invalid because remedial steps have already been applied to patch servers and the remediation takes time to complete. 

C. The CISO has not selected the correct controls and the audit findings should be assigned to them instead of the CFO. 

D. Security controls are generally never 100% effective and gaps should be explained to stakeholders and managed accordingly. 

Answer:

Q6. - (Topic 5) 

As a cost saving measure, a company has instructed the security engineering team to allow all consumer devices to be able to access the network. They have asked for recommendations on what is needed to secure the enterprise, yet offer the most flexibility in terms of controlling applications, and stolen devices. Which of the following is BEST suited for the requirements? 

A. MEAP with Enterprise Appstore 

B. Enterprise Appstore with client-side VPN software 

C. MEAP with TLS 

D. MEAP with MDM 

Answer:

Q7. - (Topic 5) 

Which of the following is the information owner responsible for? 

A. Developing policies, standards, and baselines. 

B. Determining the proper classification levels for data within the system. 

C. Integrating security considerations into application and system purchasing decisions. 

D. Implementing and evaluating security controls by validating the integrity of the data. 

Answer:

Q8. - (Topic 3) 

A corporation has Research and Development (R&D) and IT support teams, each requiring separate networks with independent control of their security boundaries to support department objectives. The corporation’s Information Security Officer (ISO) is responsible for providing firewall services to both departments, but does not want to increase the hardware footprint within the datacenter. Which of the following should the ISO consider to provide the independent functionality required by each department’s IT teams? 

A. Put both departments behind the firewall and assign administrative control for each department to the corporate firewall. 

B. Provide each department with a virtual firewall and assign administrative control to the physical firewall. 

C. Put both departments behind the firewall and incorporate restrictive controls on each department’s network. 

CompTIA CAS-002 : Practice Test 

D. Provide each department with a virtual firewall and assign appropriate levels of management for the virtual device. 

Answer:

Q9. - (Topic 3) 

The risk committee has endorsed the adoption of a security system development life cycle (SSDLC) designed to ensure compliance with PCI-DSS, HIPAA, and meet the organization’s mission. Which of the following BEST describes the correct order of implementing a five phase SSDLC? 

A. Initiation, assessment/acquisition, development/implementation, operations/maintenance and sunset. 

B. Initiation, acquisition/development, implementation/assessment, operations/maintenance and sunset. 

C. Assessment, initiation/development, implementation/assessment, operations/maintenance and disposal. 

D. Acquisition, initiation/development, implementation/assessment, operations/maintenance and disposal. 

Answer:

Q10. - (Topic 4) 

When generating a new key pair, a security application asks the user to move the mouse and type random characters on the keyboard. Which of the following BEST describes why this is necessary? 

A. The user needs a non-repudiation data source in order for the application to generate the key pair. 

B. The user is providing entropy so the application can use random data to create the key pair. 

C. The user is providing a diffusion point to the application to aid in creating the key pair. 

D. The application is requesting perfect forward secrecy from the user in order to create the key pair. 

Answer:

Q11. - (Topic 5) 

Joe, a hacker, has discovered he can specifically craft a webpage that when viewed in a browser crashes the browser and then allows him to gain remote code execution in the context of the victim’s privilege level. The browser crashes due to an exception error when a heap memory that is unused is accessed. Which of the following BEST describes the application issue? 

A. Integer overflow 

B. Click-jacking 

C. Race condition 

D. SQL injection 

E. Use after free 

F. Input validation 

Answer:

Q12. - (Topic 1) 

Two universities are making their 802.11n wireless networks available to the other university’s students. The infrastructure will pass the student’s credentials back to the home school for authentication via the Internet. 

The requirements are: 

The following design was implemented: WPA2 Enterprise using EAP-PEAP-MSCHAPv2 will be used for wireless security RADIUS proxy servers will be used to forward authentication requests to the home school The RADIUS servers will have certificates from a common public certificate authority 

A strong shared secret will be used for RADIUS server authentication 

Which of the following security considerations should be added to the design? 

A. The transport layer between the RADIUS servers should be secured 

B. WPA Enterprise should be used to decrease the network overhead 

C. The RADIUS servers should have local accounts for the visiting students 

D. Students should be given certificates to use for authentication to the network 

Answer:

Q13. - (Topic 1) 

An application present on the majority of an organization’s 1,000 systems is vulnerable to a buffer overflow attack. Which of the following is the MOST comprehensive way to resolve the issue? 

A. Deploy custom HIPS signatures to detect and block the attacks. 

B. Validate and deploy the appropriate patch. 

C. Run the application in terminal services to reduce the threat landscape. 

D. Deploy custom NIPS signatures to detect and block the attacks. 

Answer:

Q14. - (Topic 5) 

A security manager has started a new job and has identified that a key application for a new client does not have an accreditation status and is currently not meeting the compliance requirement for the contract’s SOW. The security manager has competing priorities and wants to resolve this issue quickly with a system determination and risk assessment. Which of the following approaches presents the MOST risk to the security assessment? 

A. The security manager reviews the system description for the previous accreditation, but does not review application change records. 

B. The security manager decides to use the previous SRTM without reviewing the system description. 

C. The security manager hires an administrator from the previous contract to complete the assessment. 

D. The security manager does not interview the vendor to determine if the system description is accurate. 

Answer:

Q15. - (Topic 4) 

Company XYZ plans to donate 1,000 used computers to a local school. The company has a large research and development section and some of the computers were previously used to store proprietary research. 

The security administrator is concerned about data remnants on the donated machines, but the company does not have a device sanitization section in the data handling policy. 

Which of the following is the BEST course of action for the security administrator to take? 

A. Delay the donation until a new policy is approved by the Chief Information Officer (CIO), and then donate the machines. 

B. Delay the donation until all storage media on the computers can be sanitized. 

C. Reload the machines with an open source operating system and then donate the machines. 

D. Move forward with the donation, but remove all software license keys from the machines. 

Answer:

START CAS-002 EXAM