Every That job hunters can be eager to have a new CompTIA CompTIA certification which is a new threshold to the field of web technology. There are many training materials of the CompTIA exam on the internet. Its hard to choose one particular that is comprehensive and high-quality. Please stop with Actualtests website and you may find each of the CompTIA CAS-002 exam prepared questions and answers. We have make great progress on the development regarding our CompTIA CAS-002 exam items since all of us started. Several candidates have got outstanding results right after using the CAS-002 practice materials and got the certification. Its easy for you to compete with your own competitors in the career market in the event you hold the actual CompTIA certificate.

2021 Mar CAS-002 training

Q111. - (Topic 4) 

The Chief Executive Officer (CEO) of a large prestigious enterprise has decided to reduce business costs by outsourcing to a third party company in another country. Functions to be outsourced include: business analysts, testing, software development and back office functions that deal with the processing of customer data. The Chief Risk Officer (CRO) is concerned about the outsourcing plans. Which of the following risks are MOST likely to occur if adequate controls are not implemented? 

A. Geographical regulation issues, loss of intellectual property and interoperability agreement issues 

B. Improper handling of client data, interoperability agreement issues and regulatory issues 

C. Cultural differences, increased cost of doing business and divestiture issues 

D. Improper handling of customer data, loss of intellectual property and reputation damage 

Answer:


Q112. - (Topic 1) 

A web services company is planning a one-time high-profile event to be hosted on the corporate website. An outage, due to an attack, would be publicly embarrassing, so Joe, the Chief Executive Officer (CEO), has requested that his security engineers put temporary preventive controls in place. Which of the following would MOST appropriately address Joe's concerns? 

A. Ensure web services hosting the event use TCP cookies and deny_hosts. 

B. Configure an intrusion prevention system that blocks IPs after detecting too many incomplete sessions. 

C. Contract and configure scrubbing services with third-party DDoS mitigation providers. 

D. Purchase additional bandwidth from the company’s Internet service provider. 

Answer:


Q113. - (Topic 4) 

During a new desktop refresh, all hosts are hardened at the OS level before deployment to comply with policy. Six months later, the company is audited for compliance to regulations. The audit discovers that 40% of the desktops do not meet requirements. Which of the following is the cause of the noncompliance? 

A. The devices are being modified and settings are being overridden in production. 

B. The patch management system is causing the devices to be noncompliant after issuing the latest patches. 

C. The desktop applications were configured with the default username and password. 

D. 40% of the devices have been compromised. 

Answer:


Q114. - (Topic 1) 

The technology steering committee is struggling with increased requirements stemming from an increase in telecommuting. The organization has not addressed telecommuting in the past. The implementation of a new SSL-VPN and a VOIP phone solution enables personnel to work from remote locations with corporate assets. Which of the following steps must the committee take FIRST to outline senior management’s directives? 

A. Develop an information classification scheme that will properly secure data on corporate systems. 

B. Implement database views and constrained interfaces so remote users will be unable to access PII from personal equipment. 

C. Publish a policy that addresses the security requirements for working remotely with company equipment. 

D. Work with mid-level managers to identify and document the proper procedures for telecommuting. 

Answer:


Q115. - (Topic 2) 

A software developer and IT administrator are focused on implementing security in the organization to protect OSI layer 7. Which of the following security technologies would BEST meet their requirements? (Select TWO). 

A. NIPS 

B. HSM 

C. HIPS 

D. NIDS 

E. WAF 

Answer: C,E 


Renewal CAS-002 free draindumps:

Q116. - (Topic 3) 

Company ABC was formed by combining numerous companies which all had multiple databases, web portals, and cloud data sets. Each data store had a unique set of custom developed authentication mechanisms and schemas. Which of the following approaches to combining the disparate mechanisms has the LOWEST up front development costs? 

A. Attestation 

B. PKI 

C. Biometrics 

D. Federated IDs 

Answer:


Q117. - (Topic 5) 

A company uses a custom Line of Business (LOB) application to facilitate all back-end manufacturing control. Upon investigation, it has been determined that the database used by the LOB application uses a proprietary data format. The risk management group has flagged this as a potential weakness in the company’s operational robustness. Which of the following would be the GREATEST concern when analyzing the manufacturing control application? 

A. Difficulty backing up the custom database 

B. Difficulty migrating to new hardware 

C. Difficulty training new admin personnel 

D. Difficulty extracting data from the database 

Answer:


Q118. - (Topic 5) 

An organization has decided to reduce labor costs by outsourcing back office processing of credit applications to a provider located in another country. Data sovereignty and privacy concerns raised by the security team resulted in the third-party provider only accessing and processing the data via remote desktop sessions. To facilitate communications and improve productivity, staff at the third party has been provided with corporate email accounts that are only accessible via the remote desktop sessions. Email forwarding is blocked and staff at the third party can only communicate with staff within the organization. Which of the following additional controls should be implemented to prevent data loss? (Select THREE). 

A. Implement hashing of data in transit 

B. Session recording and capture 

C. Disable cross session cut and paste 

D. Monitor approved credit accounts 

E. User access audit reviews 

F. Source IP whitelisting 

Answer: C,E,F 


Q119. - (Topic 4) 

The security administrator has just installed an active\passive cluster of two firewalls for enterprise perimeter defense of the corporate network. Stateful firewall inspection is being used in the firewall implementation. There have been numerous reports of dropped connections with external clients. 

Which of the following is MOST likely the cause of this problem? 

A. TCP sessions are traversing one firewall and return traffic is being sent through the secondary firewall and sessions are being dropped. 

B. TCP and UDP sessions are being balanced across both firewalls and connections are being dropped because the session IDs are not recognized by the secondary firewall. 

C. Prioritize UDP traffic and associated stateful UDP session information is traversing the passive firewall causing the connections to be dropped. 

D. The firewall administrator connected a dedicated communication cable between the firewalls in order to share a single state table across the cluster causing the sessions to be dropped. 

Answer:


Q120. - (Topic 2) 

An administrator is implementing a new network-based storage device. In selecting a storage protocol, the administrator would like the data in transit's integrity to be the most important concern. Which of the following protocols meets these needs by implementing either AES-CMAC or HMAC-SHA256 to sign data? 

A. SMB 

B. NFS 

C. FCoE 

D. iSCSI 

Answer: