CAS-002 Premium Bundle

CAS-002 Premium Bundle

CompTIA Advanced Security Practitioner (CASP) Certification Exam

4.5 
(36630 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

CompTIA CAS-002 Free Practice Questions

Q1. - (Topic 3) 

A security manager is developing new policies and procedures. Which of the following is a best practice in end user security? 

A. Employee identity badges and physical access controls to ensure only staff are allowed onsite. 

B. A training program that is consistent, ongoing, and relevant. 

C. Access controls to prevent end users from gaining access to confidential data. 

D. Access controls for computer systems and networks with two-factor authentication. 

Answer:

Q2. - (Topic 2) 

The IT director has charged the company helpdesk with sanitizing fixed and removable media. The helpdesk manager has written a new procedure to be followed by the helpdesk staff. This procedure includes the current standard to be used for data sanitization, as well as the location of physical degaussing tools. In which of the following cases should the helpdesk staff use the new procedure? (Select THREE). 

A. During asset disposal 

B. While reviewing the risk assessment 

C. While deploying new assets 

D. Before asset repurposing 

E. After the media has been disposed of 

F. During the data classification process 

G. When installing new printers 

H. When media fails or is unusable 

Answer: A,D,H 

Q3. - (Topic 2) 

A company has adopted a BYOD program. The company would like to protect confidential information. However, it has been decided that when an employee leaves, the company will not completely wipe the personal device. Which of the following would MOST likely help the company maintain security when employees leave? 

A. Require cloud storage on corporate servers and disable access upon termination 

B. Whitelist access to only non-confidential information 

C. Utilize an MDM solution with containerization 

D. Require that devices not have local storage 

Answer:

Q4. - (Topic 4) 

A large enterprise introduced a next generation firewall appliance into the Internet facing DMZ. All Internet traffic passes through this appliance. Four hours after implementation the network engineering team discovered that traffic through the DMZ now has un-acceptable latency, and is recommending that the new firewall be taken offline. At what point in the implementation process should this problem have been discovered? 

A. During the product selection phase 

B. When testing the appliance 

C. When writing the RFP for the purchase process 

D. During the network traffic analysis phase 

Answer:

Q5. - (Topic 4) 

Company XYZ has had repeated vulnerability exploits of a critical nature released to the company’s flagship product. The product is used by a number of large customers. At the Chief Information Security Officer’s (CISO’s) request, the product manager now has to budget for a team of security consultants to introduce major product security improvements. 

Here is a list of improvements in order of priority: 

1. A noticeable improvement in security posture immediately. 

2. Fundamental changes to resolve systemic issues as an ongoing process 

3. Improvements should be strategic as opposed to tactical 

4. Customer impact should be minimized 

Which of the following recommendations is BEST for the CISO to put forward to the product manager? 

A. Patch the known issues and provide the patch to customers. Make a company announcement to customers on the main website to reduce the perceived exposure of the application to alleviate customer concerns. Engage penetration testers and code reviewers to perform an in-depth review of the product. Based on the findings, address the defects and re-test the findings to ensure that any defects have been resolved. 

B. Patch the known issues and provide the patch to customers. Engage penetration testers and code reviewers to perform an in-depth review of the product. Based on the findings, address the defects and re-test the findings to ensure that the defects have been resolved. Introduce periodic code review and penetration testing of the product in question and consider including all relevant future projects going forward. 

C. Patch the known issues and provide the patch to customers. Implement an SSDLC / SDL overlay on top of the SDLC. Train architects, designers, developers, testers and operators on security importance and ensure that security-relevant activities are performed within each of the SDLC phases. Use the product as the primary focal point to close out issues and consider using the SSDLC / SDL overlay for all relevant future projects. 

D. Stop active support of the product. Bring forward end-of-life dates for the product so that it can be decommissioned. Start a new project to develop a replacement product and ensure that an SSDLC / SDL overlay on top of the SDLC is formed. Train BAs, architects, designers, developers, testers and operators on security importance and ensure that security-relevant activities are performed within each of the SDLC phases. 

Answer:

Q6. - (Topic 5) 

A small company’s Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the company’s security posture with regard to targeted attacks. Which of the following should the CSO conduct FIRST? 

A. Survey threat feeds from analysts inside the same industry. 

B. Purchase multiple threat feeds to ensure diversity and implement blocks for malicious traffic. 

C. Conduct an internal audit against industry best practices to perform a gap analysis. 

D. Deploy a UTM solution that receives frequent updates from a trusted industry vendor. 

Answer:

Q7. - (Topic 3) 

A University uses a card transaction system that allows students to purchase goods using their student ID. Students can put money on their ID at terminals throughout the campus. The security administrator was notified that computer science students have been using the network to illegally put money on their cards. The administrator would like to attempt to reproduce what the students are doing. Which of the following is the BEST course of action? 

A. Notify the transaction system vendor of the security vulnerability that was discovered. 

B. Use a protocol analyzer to reverse engineer the transaction system’s protocol. 

C. Contact the computer science students and threaten disciplinary action if they continue their actions. 

D. Install a NIDS in front of all the transaction system terminals. 

Answer:

Q8. - (Topic 3) 

Staff from the sales department have administrator rights to their corporate standard operating environment, and often connect their work laptop to customer networks when onsite during meetings and presentations. This increases the risk and likelihood of a security incident when the sales staff reconnects to the corporate LAN. Which of the following controls would BEST protect the corporate network? 

A. Implement a network access control (NAC) solution that assesses the posture of the laptop before granting network access. 

B. Use an independent consulting firm to provide regular network vulnerability assessments and biannually qualitative risk assessments. 

C. Provide sales staff with a separate laptop with no administrator access just for sales visits. 

D. Update the acceptable use policy and ensure sales staff read and acknowledge the policy. 

Answer:

Q9. - (Topic 2) 

A small company is developing a new Internet-facing web application. The security requirements are: 

1. Users of the web application must be uniquely identified and authenticated. 

2. Users of the web application will not be added to the company’s directory services. 

3. Passwords must not be stored in the code. 

Which of the following meets these requirements? 

A. Use OpenID and allow a third party to authenticate users. 

B. Use TLS with a shared client certificate for all users. 

C. Use SAML with federated directory services. 

D. Use Kerberos and browsers that support SAML. 

Answer:

Q10. - (Topic 2) 

Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information? 

A. Deduplication 

B. Data snapshots 

C. LUN masking 

D. Storage multipaths 

Answer:

Q11. - (Topic 2) 

A business unit of a large enterprise has outsourced the hosting and development of a new external website which will be accessed by premium customers, in order to speed up the time to market timeline. Which of the following is the MOST appropriate? 

A. The external party providing the hosting and website development should be obligated under contract to provide a secure service which is regularly tested (vulnerability and penetration). SLAs should be in place for the resolution of newly identified vulnerabilities and a guaranteed uptime. 

B. The use of external organizations to provide hosting and web development services is not recommended as the costs are typically higher than what can be achieved internally. In addition, compliance with privacy regulations becomes more complex and guaranteed uptimes are difficult to track and measure. 

C. Outsourcing transfers all the risk to the third party. An SLA should be in place for the resolution of newly identified vulnerabilities and penetration / vulnerability testing should be conducted regularly. 

D. Outsourcing transfers the risk to the third party, thereby minimizing the cost and any legal obligations. An MOU should be in place for the resolution of newly identified vulnerabilities and penetration / vulnerability testing should be conducted regularly. 

Answer:

Q12. - (Topic 3) 

A security administrator must implement a SCADA style network overlay to ensure secure remote management of all network management and infrastructure devices. Which of the following BEST describes the rationale behind this architecture? 

A. A physically isolated network that allows for secure metric collection. 

B. A physically isolated network with inband management that uses two factor authentication. 

C. A logically isolated network with inband management that uses secure two factor authentication. 

D. An isolated network that provides secure out-of-band remote management. 

Answer:

Q13. - (Topic 2) 

A port in a fibre channel switch failed, causing a costly downtime on the company’s primary website. Which of the following is the MOST likely cause of the downtime? 

A. The web server iSCSI initiator was down. 

B. The web server was not multipathed. 

C. The SAN snapshots were not up-to-date. 

D. The SAN replication to the backup site failed. 

Answer:

Q14. - (Topic 5) 

A system administrator has a responsibility to maintain the security of the video teleconferencing system. During a self-audit of the video teleconferencing room, the administrator notices that speakers and microphones are hard-wired and wireless enabled. Which of the following security concerns should the system administrator have about the existing technology in the room? 

A. Wired transmissions could be intercepted by remote users. 

B. Bluetooth speakers could cause RF emanation concerns. 

C. Bluetooth is an unsecure communication channel. 

D. Wireless transmission causes interference with the video signal. 

Answer:

Q15. - (Topic 5) 

A security engineer is a new member to a configuration board at the request of management. The company has two new major IT projects starting this year and wants to plan security into the application deployment. The board is primarily concerned with the applications’ compliance with federal assessment and authorization standards. The security engineer asks for a timeline to determine when a security assessment of both applications should occur and does not attend subsequent configuration board meetings. If the security engineer is only going to perform a security assessment, which of the following steps in system authorization has the security engineer omitted? (Select TWO). 

A. Establish the security control baseline to be assessed 

B. Build the application according to software development security standards 

C. Write the systems functionality requirements into the security requirements traceability matrix 

D. Review the results of user acceptance testing 

E. Categorize the applications according to use 

F. Consult with the stakeholders to determine which standards can be omitted 

Answer: A,E 

START CAS-002 EXAM