CAS-002 Premium Bundle

CAS-002 Premium Bundle

CompTIA Advanced Security Practitioner (CASP) Certification Exam

4.5 
(37845 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

CompTIA CAS-002 Free Practice Questions

Q1. - (Topic 3) 

An organization has had component integration related vulnerabilities exploited in consecutive releases of the software it hosts. The only reason the company was able to identify the compromises was because of a correlation of slow server performance and an attentive security analyst noticing unusual outbound network activity from the application servers. End-to-end management of the development process is the responsibility of the applications development manager and testing is done by various teams of programmers. Which of the following will MOST likely reduce the likelihood of similar incidents? 

A. Conduct monthly audits to verify that application modifications do not introduce new vulnerabilities. 

B. Implement a peer code review requirement prior to releasing code into production. 

C. Follow secure coding practices to minimize the likelihood of creating vulnerable applications. 

D. Establish cross-functional planning and testing requirements for software development activities. 

Answer:

Q2. - (Topic 2) 

Joe, a penetration tester, is tasked with testing the security robustness of the protocol between a mobile web application and a RESTful application server. Which of the following security tools would be required to assess the security between the mobile web application and the RESTful application server? (Select TWO). 

A. Jailbroken mobile device 

B. Reconnaissance tools 

C. Network enumerator 

D. HTTP interceptor 

E. Vulnerability scanner 

F. Password cracker 

Answer: D,E 

Q3. - (Topic 3) 

A security administrator wants to verify and improve the security of a business process which is tied to proven company workflow. The security administrator was able to improve security by applying controls that were defined by the newly released company security standard. Such controls included code improvement, transport encryption, and interface restrictions. Which of the following can the security administrator do to further increase security after having exhausted all the technical controls dictated by the company’s security standard? 

A. Modify the company standard to account for higher security and meet with upper management for approval to implement the new standard. 

B. Conduct a gap analysis and recommend appropriate non-technical mitigating controls, and incorporate the new controls into the standard. 

C. Conduct a risk analysis on all current controls, and recommend appropriate mechanisms to increase overall security. 

D. Modify the company policy to account for higher security, adapt the standard accordingly, and implement new technical controls. 

Answer:

Q4. - (Topic 2) 

A finance manager says that the company needs to ensure that the new system can “replay” data, up to the minute, for every exchange being tracked by the investment departments. The finance manager also states that the company’s transactions need to be tracked against this data for a period of five years for compliance. How would a security engineer BEST interpret the finance manager’s needs? 

A. Compliance standards 

B. User requirements 

C. Data elements 

D. Data storage 

E. Acceptance testing 

F. Information digest 

G. System requirements 

Answer:

Q5. - (Topic 1) 

A security administrator notices a recent increase in workstations becoming compromised by malware. Often, the malware is delivered via drive-by downloads, from malware hosting websites, and is not being detected by the corporate antivirus. Which of the following solutions would provide the BEST protection for the company? 

A. Increase the frequency of antivirus downloads and install updates to all workstations. 

B. Deploy a cloud-based content filter and enable the appropriate category to prevent further infections. 

C. Deploy a WAF to inspect and block all web traffic which may contain malware and exploits. 

D. Deploy a web based gateway antivirus server to intercept viruses before they enter the network. 

Answer:

Q6. - (Topic 4) 

A Security Administrator has some concerns about the confidentiality of data when using SOAP. Which of the following BEST describes the Security Administrator’s concerns? 

A. The SOAP header is not encrypted and allows intermediaries to view the header data. The body can be partially or completely encrypted. 

B. The SOAP protocol supports weak hashing of header information. As a result the header and body can easily be deciphered by brute force tools. 

C. The SOAP protocol can be easily tampered with, even though the header is encrypted. 

D. The SOAP protocol does not support body or header encryption which allows assertions to be viewed in clear text by intermediaries. 

Answer:

Q7. - (Topic 2) 

A well-known retailer has experienced a massive credit card breach. The retailer had gone through an audit and had been presented with a potential problem on their network. Vendors were authenticating directly to the retailer’s AD servers, and an improper firewall rule allowed pivoting from the AD server to the DMZ where credit card servers were kept. The firewall rule was needed for an internal application that was developed, which presents risk. The retailer determined that because the vendors were required to have site to site VPN’s no other security action was taken. 

To prove to the retailer the monetary value of this risk, which of the following type of calculations is needed? 

A. Residual Risk calculation 

B. A cost/benefit analysis 

C. Quantitative Risk Analysis 

D. Qualitative Risk Analysis 

Answer:

Q8. - (Topic 4) 

Company XYZ has just purchased Company ABC through a new acquisition. A business decision has been made to integrate the two company’s networks, application, and several basic services. 

The initial integration of the two companies has specified the following requirements: 

Which of the following network security solutions will BEST meet the above requirements? 

A. Place a Company ABC managed firewall in Company XYZ’s hub site; then place Company ABC’s file, print, authentication, and secure FTP servers in a zone off the firewall. Ensure that Company ABC’s business partner firewalls are opened up for web intranet access and other required services. 

B. Require Company XYZ to manage the router ACLs, controlling access to Company ABC resources, but with Company ABC approving the change control to the ACLs. Open up Company ABC’s business partner firewall to permit access to Company ABC’s file, print, secure FTP server, authentication servers and web intranet access. 

C. Place no restrictions on internal network connectivity between Company XYZ and Company ABC. Open up Company ABC’s business partner firewall to permit access to Company ABC’s file, print, secure FTP server, authentication servers and web intranet access. 

D. Place file, print, secure FTP server and authentication domain servers at Company XYZ’s hub site. Open up Company ABC’s business partner firewall to permit access to ABC’s web intranet access and other required services. 

Answer:

Q9. - (Topic 5) 

A Chief Information Security Officer (CISO) is approached by a business unit manager who heard a report on the radio this morning about an employee at a competing firm who shipped a VPN token overseas so a fake employee could log into the corporate VPN. The CISO asks what can be done to mitigate the risk of such an incident occurring within the organization. Which of the following is the MOST cost effective way to mitigate such a risk? 

A. Require hardware tokens to be replaced on a yearly basis. 

B. Implement a biometric factor into the token response process. 

C. Force passwords to be changed every 90 days. 

D. Use PKI certificates as part of the VPN authentication process. 

Answer:

Q10. - (Topic 4) 

Part of the procedure for decommissioning a database server is to wipe all local disks, as well as SAN LUNs allocated to the server, even though the SAN itself is not being decommissioned. Which of the following is the reason for wiping the SAN LUNs? 

A. LUN masking will prevent the next server from accessing the LUNs. 

B. The data may be replicated to other sites that are not as secure. 

C. Data remnants remain on the LUN that could be read by other servers. 

D. The data is not encrypted during transport. 

Answer:

Q11. - (Topic 5) 

A software development manager is taking over an existing software development project. The team currently suffers from poor communication due to a long delay between requirements documentation and feature delivery. This gap is resulting in an above average number of security-related bugs making it into production. Which of the following development methodologies is the team MOST likely using now? 

A. Agile 

B. Waterfall 

C. Scrum 

D. Spiral 

Answer:

Q12. - (Topic 5) 

A company is in the process of outsourcing its customer relationship management system to a cloud provider. It will host the entire organization’s customer database. The database will be accessed by both the company’s users and its customers. The procurement department has asked what security activities must be performed for the deal to proceed. Which of the following are the MOST appropriate security activities to be performed as part of due diligence? (Select TWO). 

A. Physical penetration test of the datacenter to ensure there are appropriate controls. 

B. Penetration testing of the solution to ensure that the customer data is well protected. 

C. Security clauses are implemented into the contract such as the right to audit. 

D. Review of the organizations security policies, procedures and relevant hosting certifications. 

E. Code review of the solution to ensure that there are no back doors located in the software. 

Answer: C,D 

Q13. - (Topic 3) 

A new web application system was purchased from a vendor and configured by the internal development team. Before the web application system was moved into production, a vulnerability assessment was conducted. A review of the vulnerability assessment report indicated that the testing team discovered a minor security issue with the configuration of the web application. The security issue should be reported to: 

A. CISO immediately in an exception report. 

B. Users of the new web application system. 

C. The vendor who supplied the web application system. 

D. Team lead in a weekly report. 

Answer:

Q14. - (Topic 1) 

A member of the software development team has requested advice from the security team to implement a new secure lab for testing malware. Which of the following is the NEXT step that the security team should take? 

A. Purchase new hardware to keep the malware isolated. 

B. Develop a policy to outline what will be required in the secure lab. 

C. Construct a series of VMs to host the malware environment. 

D. Create a proposal and present it to management for approval. 

Answer:

Q15. - (Topic 2) 

A penetration tester is inspecting traffic on a new mobile banking application and sends the following web request: 

POST http://www.example.com/resources/NewBankAccount HTTP/1.1 

Content-type: application/json 

“account”: 

{ “creditAccount”:”Credit Card Rewards account”} { 

 “salesLeadRef”:”www.example.com/badcontent/exploitme.exe”} 

], 

“customer”: 

{ “name”:”Joe Citizen”} { “custRef”:”3153151”} 

The banking website responds with: 

HTTP/1.1 200 OK 

“newAccountDetails”: 

{ “cardNumber”:”1234123412341234”} { “cardExpiry”:”2021-12-31”} 

{ “cardCVV”:”909”} 

], 

“marketingCookieTracker”:“JSESSIONID=000000001” 

“returnCode”:“Account added successfully” 

Which of the following are security weaknesses in this example? (Select TWO). 

A. Missing input validation on some fields 

B. Vulnerable to SQL injection 

C. Sensitive details communicated in clear-text 

D. Vulnerable to XSS 

E. Vulnerable to malware file uploads 

F. JSON/REST is not as secure as XML 

Answer: A,C 

START CAS-002 EXAM