CAS-002 Premium Bundle

CAS-002 Premium Bundle

CompTIA Advanced Security Practitioner (CASP) Certification Exam

4.5 
(38370 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
December 3, 2024Last update

CompTIA CAS-002 Free Practice Questions

Q1. - (Topic 5) 

The risk manager has requested a security solution that is centrally managed, can easily 

be updated, and protects end users' workstations from both known and unknown malicious attacks when connected to either the office or home network. Which of the following would BEST meet this requirement? 

A. HIPS 

B. UTM 

C. Antivirus 

D. NIPS 

E. DLP 

Answer:

Q2. - (Topic 2) 

An administrator wishes to replace a legacy clinical software product as it has become a security risk. The legacy product generates $10,000 in revenue a month. The new software product has an initial cost of $180,000 and a yearly maintenance of $2,000 after the first year. However, it will generate $15,000 in revenue per month and be more secure. How many years until there is a return on investment for this new package? 

A. 1 

B. 2 

C. 3 

D. 4 

Answer:

Q3. - (Topic 3) 

A database administrator comes across the below records in one of the databases during an internal audit of the payment system: 

UserIDAddressCredit Card No.Password 

jsmith123 fake street55XX-XXX-XXXX-1397Password100 

jqdoe234 fake street42XX-XXX-XXXX-202717DEC12 

From a security perspective, which of the following should be the administrator’s GREATEST concern, and what will correct the concern? 

A. Concern: Passwords are stored in plain text. Correction: Require a minimum of 8 alphanumeric characters and hash the password. 

B. Concern: User IDs are also usernames, and could be enumerated, thereby disclosing sensitive account information. Correction: Require user IDs to be more complex by using alphanumeric characters and hash the UserIDs. 

C. Concern: User IDs are confidential private information. Correction: Require encryption of user IDs. 

D. Concern: More than four digits within a credit card number are stored. Correction: Only store the last four digits of a credit card to protect sensitive financial information. 

Answer:

Q4. - (Topic 3) 

Company A has a remote work force that often includes independent contractors and out of state full time employees. 

Company A's security engineer has been asked to implement a solution allowing these users to collaborate on projects with the following goals: 

Which of the following solutions should the security engineer recommend to meet the MOST goals? 

A. Create an SSL reverse proxy to a collaboration workspace. Use remote installation service to maintain application version. Have users use full desktop encryption. Schedule server downtime from 12:00 to 1:00 PM. 

B. Install an SSL VPN to Company A's datacenter, have users connect to a standard virtual workstation image, set workstation time of day restrictions. 

C. Create an extranet web portal using third party web based office applications. Ensure that Company A maintains the administrative access. 

D. Schedule server downtime from 12:00 to 1:00 PM, implement a Terminal Server 

Gateway, use remote installation services to standardize application on user’s laptops. 

Answer:

Q5. - (Topic 5) 

An industry organization has implemented a system to allow trusted authentication between all of its partners. The system consists of a web of trusted RADIUS servers communicating over the Internet. An attacker was able to set up a malicious server and conduct a successful man-in-the-middle attack. Which of the following controls should be implemented to mitigate the attack in the future? 

A. Use PAP for secondary authentication on each RADIUS server 

B. Disable unused EAP methods on each RADIUS server 

C. Enforce TLS connections between RADIUS servers 

D. Use a shared secret for each pair of RADIUS servers 

Answer:

Q6. - (Topic 1) 

A company sales manager received a memo from the company’s financial department which stated that the company would not be putting its software products through the same security testing as previous years to reduce the research and development cost by 20 percent for the upcoming year. The memo also stated that the marketing material and service level agreement for each product would remain unchanged. The sales manager has reviewed the sales goals for the upcoming year and identified an increased target across the software products that will be affected by the financial department’s change. All software products will continue to go through new development in the coming year. Which of the following should the sales manager do to ensure the company stays out of trouble? 

A. Discuss the issue with the software product's user groups 

B. Consult the company’s legal department on practices and law 

C. Contact senior finance management and provide background information 

D. Seek industry outreach for software practices and law 

Answer:

Q7. - (Topic 3) 

If a technician must take an employee’s workstation into custody in response to an investigation, which of the following can BEST reduce the likelihood of related legal issues? 

A. A formal letter from the company’s president approving the seizure of the workstation. 

B. A formal training and awareness program on information security for all company managers. 

C. A screen displayed at log in that informs users of the employer’s rights to seize, search, and monitor company devices. 

D. A printout of an activity log, showing that the employee has been spending substantial time on non-work related websites. 

Answer:

Q8. - (Topic 2) 

A security administrator is performing VDI traffic data collection on a virtual server which migrates from one host to another. While reviewing the data collected by the protocol analyzer, the security administrator notices that sensitive data is present in the packet capture. Which of the following should the security administrator recommend to ensure the confidentiality of sensitive information during live VM migration, while minimizing latency issues? 

A. A separate physical interface placed on a private VLAN should be configured for live host operations. 

B. Database record encryption should be used when storing sensitive information on virtual servers. 

C. Full disk encryption should be enabled across the enterprise to ensure the confidentiality of sensitive data. 

D. Sensitive data should be stored on a backend SAN which uses an isolated fiber channel network. 

Answer:

Q9. - (Topic 1) 

A security policy states that all applications on the network must have a password length of eight characters. There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in six months, and two are not expected to be upgraded or removed from the network. Which of the following processes should be followed? 

A. Establish a risk matrix 

B. Inherit the risk for six months 

C. Provide a business justification to avoid the risk 

D. Provide a business justification for a risk exception 

Answer:

Q10. - (Topic 2) 

After the install process, a software application executed an online activation process. After a few months, the system experienced a hardware failure. A backup image of the system was restored on a newer revision of the same brand and model device. After the restore, the specialized application no longer works. Which of the following is the MOST likely cause of the problem? 

A. The binary files used by the application have been modified by malware. 

B. The application is unable to perform remote attestation due to blocked ports. 

C. The restored image backup was encrypted with the wrong key. 

D. The hash key summary of hardware and installed software no longer match. 

Answer:

Q11. - (Topic 4) 

An organization is preparing to upgrade its firewall and NIPS infrastructure and has narrowed the vendor choices down to two platforms. The integrator chosen to assist the organization with the deployment has many clients running a mixture of the possible combinations of environments. Which of the following is the MOST comprehensive method for evaluating the two platforms? 

A. Benchmark each possible solution with the integrators existing client deployments. 

B. Develop testing criteria and evaluate each environment in-house. 

C. Run virtual test scenarios to validate the potential solutions. 

D. Use results from each vendor’s test labs to determine adherence to project requirements. 

Answer:

Q12. - (Topic 2) 

A medical device manufacturer has decided to work with another international organization to develop the software for a new robotic surgical platform to be introduced into hospitals within the next 12 months. In order to ensure a competitor does not become aware, management at the medical device manufacturer has decided to keep it secret until formal contracts are signed. Which of the following documents is MOST likely to contain a description of the initial terms and arrangement and is not legally enforceable? 

A. OLA 

B. BPA 

C. SLA 

D. SOA 

E. MOU 

Answer:

Q13. - (Topic 4) 

An administrator attempts to install the package "named.9.3.6-12-x86_64.rpm" on a server. Even though the package was downloaded from the official repository, the server states the package cannot be installed because no GPG key is found. Which of the following should the administrator perform to allow the program to be installed? 

A. Download the file from the program publisher's website. 

B. Generate RSA and DSA keys using GPG. 

C. Import the repository's public key. 

D. Run sha1sum and verify the hash. 

Answer:

Q14. - (Topic 1) 

The Information Security Officer (ISO) believes that the company has been targeted by cybercriminals and it is under a cyber attack. Internal services that are normally available to the public via the Internet are inaccessible, and employees in the office are unable to browse the Internet. The senior security engineer starts by reviewing the bandwidth at the border router, and notices that the incoming bandwidth on the router’s external interface is maxed out. The security engineer then inspects the following piece of log to try and determine the reason for the downtime, focusing on the company’s external router’s IP which is 128.20.176.19: 

11:16:22.110343 IP 90.237.31.27.19 > 128.20.176.19.19: UDP, length 1400 

11:16:22.110351 IP 23.27.112.200.19 > 128.20.176.19.19: UDP, length 1400 

11:16:22.110358 IP 192.200.132.213.19 > 128.20.176.19.19: UDP, length 1400 

11:16:22.110402 IP 70.192.2.55.19 > 128.20.176.19.19: UDP, length 1400 

11:16:22.110406 IP 112.201.7.39.19 > 128.20.176.19.19: UDP, length 1400 

Which of the following describes the findings the senior security engineer should report to the ISO and the BEST solution for service restoration? 

A. After the senior engineer used a network analyzer to identify an active Fraggle attack, the company’s ISP should be contacted and instructed to block the malicious packets. 

B. After the senior engineer used the above IPS logs to detect the ongoing DDOS attack, an IPS filter should be enabled to block the attack and restore communication. 

C. After the senior engineer used a mirror port to capture the ongoing amplification attack, a BGP sinkhole should be configured to drop traffic at the source networks. 

D. After the senior engineer used a packet capture to identify an active Smurf attack, an ACL should be placed on the company’s external router to block incoming UDP port 19 traffic. 

Answer:

Q15. - (Topic 1) 

A security company is developing a new cloud-based log analytics platform. Its purpose is to allow: 

Which of the following are the BEST security considerations to protect data from one customer being disclosed to other customers? (Select THREE). 

A. Secure storage and transmission of API keys 

B. Secure protocols for transmission of log files and search results 

C. At least two years retention of log files in case of e-discovery requests 

D. Multi-tenancy with RBAC support 

E. Sanitizing filters to prevent upload of sensitive log file contents 

F. Encryption of logical volumes on which the customers' log files reside 

Answer: A,B,D 

START CAS-002 EXAM