All the CompTIA CAS-002 practice questions which with precise along with verified answers are produced and updated through our innovative professionals in the industry of net. Taking the particular CompTIA CAS-002 simulated test youll get a large mark which guarantee your success. The CompTIA CompTIA CAS-002 braindumps have wonderful value along with high high quality which assure you a passing score, or youll get your purchasing costs back. While if you dont desire to the refund, we could send a person another CompTIA CAS-002 dumps regarding free. Many of us hope you get from the CompTIA certification exam smoothly.

2021 Apr CAS-002 pdf exam

Q251. - (Topic 5) 

Ann, a systems engineer, is working to identify an unknown node on the corporate network. To begin her investigative work, she runs the following nmap command string: 

user@hostname:~$ sudo nmap –O 192.168.1.54 Based on the output, nmap is unable to identify the OS running on the node, but the following ports are open on the device: 

TCP/22 TCP/111 TCP/512-514 TCP/2049 TCP/32778 

Based on this information, which of the following operating systems is MOST likely running on the unknown node? 

A. Linux 

B. Windows 

C. Solaris 

D. OSX 

Answer:


Q252. - (Topic 3) 

A security consultant is called into a small advertising business to recommend which security policies and procedures would be most helpful to the business. The business is comprised of 20 employees, operating off of two shared servers. One server houses employee data and the other houses client data. All machines are on the same local network. Often these employees must work remotely from client sites, but do not access either of the servers remotely. Assuming no security policies or procedures are in place right now, which of the following would be the MOST applicable for implementation? (Select TWO). 

A. Password Policy 

B. Data Classification Policy 

C. Wireless Access Procedure 

D. VPN Policy 

E. Database Administrative Procedure 

Answer: A,B 


Q253. - (Topic 5) 

A security engineer has inherited an authentication project which integrates 1024-bit PKI certificates into the company infrastructure and now has a new requirement to integrate 2048-bit PKI certificates so that the entire company will be interoperable with its vendors when the project is completed. The project is now 25% complete, with 15% of the company staff being issued 1024-bit certificates. The provisioning of network based accounts has not occurred yet due to other project delays. The project is now expected to be over budget and behind its original schedule. Termination of the existing project and beginning a new project is a consideration because of the change in scope. Which of the following is the security engineer’s MOST serious concern with implementing this solution? 

A. Succession planning 

B. Performance 

C. Maintainability 

D. Availability 

Answer:


Q254. DRAG DROP - (Topic 2) 

Company A has experienced external attacks on their network and wants to minimize the attacks from reoccurring. Modify the network diagram to prevent SQL injections, XSS attacks, smurf attacks, e-mail spam, downloaded malware, viruses and ping attacks. The company can spend a MAXIMUM of $50,000 USD. A cost list for each item is listed below: 

1. Anti-Virus Server - $10,000 

2. Firewall-$15,000 

3. Load Balanced Server - $10,000 

4. NIDS/NIPS-$10,000 

5. Packet Analyzer - $5,000 

6. Patch Server-$15,000 

7. Proxy Server-$20,000 

8. Router-$10,000 

9. Spam Filter-$5,000 

10. Traffic Shaper - $20,000 

11. Web Application Firewall - $10,000 

Instructions: Not all placeholders in the diagram need to be filled and items can only be used once. If you place an object on the network diagram, you can remove it by clicking the 

(x) in the upper right-hand of the object. 

Answer: 


Q255. - (Topic 5) 

The audit department at a company requires proof of exploitation when conducting internal network penetration tests. Which of the following provides the MOST conclusive proof of compromise without further compromising the integrity of the system? 

A. Provide a list of grabbed service banners. 

B. Modify a file on the system and include the path in the test’s report. 

C. Take a packet capture of the test activity. 

D. Add a new test user account on the system. 

Answer:


Most recent CAS-002 exam cost:

Q256. - (Topic 3) 

A new company requirement mandates the implementation of multi-factor authentication to access network resources. The security administrator was asked to research and implement the most cost-effective solution that would allow for the authentication of both hardware and users. The company wants to leverage the PKI infrastructure which is already well established. Which of the following solutions should the security administrator implement? 

A. Issue individual private/public key pairs to each user, install the private key on the central authentication system, and protect the private key with the user’s credentials. Require each user to install the public key on their computer. 

B. Deploy USB fingerprint scanners on all desktops, and enable the fingerprint scanner on all laptops. Require all network users to register their fingerprint using the reader and store the information in the central authentication system. 

C. Issue each user one hardware token. Configure the token serial number in the user properties of the central authentication system for each user and require token authentication with PIN for network logon. 

D. Issue individual private/public key pairs to each user, install the public key on the central authentication system, and require each user to install the private key on their computer and protect it with a password. 

Answer:


Q257. - (Topic 3) 

An IT administrator wants to restrict DNS zone transfers between two geographically dispersed, external company DNS name servers, and has decided to use TSIG. Which of the following are critical when using TSIG? (Select TWO). 

A. Periodic key changes once the initial keys are established between the DNS name servers. 

B. Secure exchange of the key values between the two DNS name servers. 

C. A secure NTP source used by both DNS name servers to avoid message rejection. 

D. DNS configuration files on both DNS name servers must be identically encrypted. 

E. AES encryption with a SHA1 hash must be used to encrypt the configuration files on both DNS name servers. 

Answer: B,C 


Q258. - (Topic 2) 

An organization uses IP address block 203.0.113.0/24 on its internal network. At the border router, the network administrator sets up rules to deny packets with a source address in this subnet from entering the network, and to deny packets with a destination address in this subnet from leaving the network. Which of the following is the administrator attempting to prevent? 

A. BGP route hijacking attacks 

B. Bogon IP network traffic 

C. IP spoofing attacks 

D. Man-in-the-middle attacks 

E. Amplified DDoS attacks 

Answer:


Q259. - (Topic 1) 

A software development manager is taking over an existing software development project. The team currently suffers from poor communication due to a long delay between requirements documentation and feature delivery. This gap is resulting in an above average number of security-related bugs making it into production. Which of the following development methodologies is the team MOST likely using now? 

A. Agile 

B. Waterfall 

C. Scrum 

D. Spiral 

Answer:


Q260. - (Topic 3) 

A newly-appointed risk management director for the IT department at Company XYZ, a major pharmaceutical manufacturer, needs to conduct a risk analysis regarding a new system which the developers plan to bring on-line in three weeks. The director begins by reviewing the thorough and well-written report from the independent contractor who performed a security assessment of the system. The report details what seem to be a manageable volume of infrequently exploited security vulnerabilities. The director decides to implement continuous monitoring and other security controls to mitigate the impact of the vulnerabilities. Which of the following should the director require from the developers before agreeing to deploy the system? 

A. An incident response plan which guarantees response by tier two support within 15 minutes of an incident. 

B. A definitive plan of action and milestones which lays out resolutions to all vulnerabilities within six months. 

C. Business insurance to transfer all risk from the company shareholders to the insurance company. 

D. A prudent plan of action which details how to decommission the system within 90 days of becoming operational. 

Answer: