Real of CAS-002 practice question materials and interactive bootcamp for CompTIA certification for consumer, Real Success Guaranteed with Updated CAS-002 pdf dumps vce Materials. 100% PASS CompTIA Advanced Security Practitioner (CASP) exam Today!

Q131. - (Topic 2) 

The risk manager at a small bank wants to use quantitative analysis to determine the ALE of running a business system at a location which is subject to fires during the year. A risk analyst reports to the risk manager that the asset value of the business system is $120,000 and, based on industry data, the exposure factor to fires is only 20% due to the fire suppression system installed at the site. Fires occur in the area on average every four years. Which of the following is the ALE? 

A. $6,000 

B. $24,000 

C. $30,000 

D. $96,000 

Answer:


Q132. - (Topic 3) 

A new startup company with very limited funds wants to protect the organization from external threats by implementing some type of best practice security controls across a number of hosts located in the application zone, the production zone, and the core network. The 50 hosts in the core network are a mixture of Windows and Linux based systems, used by development staff to develop new applications. The single Windows host in the application zone is used exclusively by the production team to control software deployments into the production zone. There are 10 UNIX web application hosts in the production zone which are publically accessible. 

Development staff is required to install and remove various types of software from their hosts on a regular basis while the hosts in the zone rarely require any type of configuration changes. 

Which of the following when implemented would provide the BEST level of protection with the LEAST amount of disruption to staff? 

A. NIPS in the production zone, HIPS in the application zone, and anti-virus / anti-malware across all Windows hosts. 

B. NIPS in the production zone, NIDS in the application zone, HIPS in the core network, and anti-virus / anti-malware across all hosts. 

C. HIPS in the production zone, NIPS in the application zone, and HIPS in the core network. 

D. NIDS in the production zone, HIDS in the application zone, and anti-virus / anti-malware across all hosts. 

Answer:


Q133. - (Topic 3) 

A security administrator is conducting network forensic analysis of a recent defacement of the company’s secure web payment server (HTTPS). The server was compromised around the New Year’s holiday when all the company employees were off. The company’s network diagram is summarized below: 

The security administrator discovers that all the local web server logs have been deleted. Additionally, the Internal Firewall logs are intact but show no activity from the internal network to the web server farm during the holiday. 

Which of the following is true? 

A. The security administrator should review the IDS logs to determine the source of the attack and the attack vector used to compromise the web server. 

B. The security administrator must correlate the external firewall logs with the intrusion detection system logs to determine what specific attack led to the web server compromise. 

C. The security administrator must reconfigure the network and place the IDS between the SSL accelerator and the server farm to be able to determine the cause of future attacks. 

D. The security administrator must correlate logs from all the devices in the network diagram to determine what specific attack led to the web server compromise. 

Answer:


Q134. - (Topic 1) 

The risk manager has requested a security solution that is centrally managed, can easily be updated, and protects end users' workstations from both known and unknown malicious attacks when connected to either the office or home network. Which of the following would BEST meet this requirement? 

A. HIPS 

B. UTM 

C. Antivirus 

D. NIPS 

E. DLP 

Answer:


Q135. - (Topic 2) 

A firm’s Chief Executive Officer (CEO) is concerned that IT staff lacks the knowledge to identify complex vulnerabilities that may exist in a payment system being internally developed. The payment system being developed will be sold to a number of organizations and is in direct competition with another leading product. The CEO highlighted that code base confidentiality is of critical importance to allow the company to exceed the competition in terms of the product’s reliability, stability, and performance. Which of the following would provide the MOST thorough testing and satisfy the CEO’s requirements? 

A. Sign a MOU with a marketing firm to preserve the company reputation and use in-house resources for random testing. 

B. Sign a BPA with a small software consulting firm and use the firm to perform Black box testing and address all findings. 

C. Sign a NDA with a large security consulting firm and use the firm to perform Grey box testing and address all findings. 

D. Use the most qualified and senior developers on the project to perform a variety of White box testing and code reviews. 

Answer:


Q136. - (Topic 5) 

A system administrator has a responsibility to maintain the security of the video teleconferencing system. During a self-audit of the video teleconferencing room, the administrator notices that speakers and microphones are hard-wired and wireless enabled. Which of the following security concerns should the system administrator have about the existing technology in the room? 

A. Wired transmissions could be intercepted by remote users. 

B. Bluetooth speakers could cause RF emanation concerns. 

C. Bluetooth is an unsecure communication channel. 

D. Wireless transmission causes interference with the video signal. 

Answer:


Q137. - (Topic 2) 

A small company is developing a new Internet-facing web application. The security requirements are: 

1. Users of the web application must be uniquely identified and authenticated. 

2. Users of the web application will not be added to the company’s directory services. 

3. Passwords must not be stored in the code. 

Which of the following meets these requirements? 

A. Use OpenID and allow a third party to authenticate users. 

B. Use TLS with a shared client certificate for all users. 

C. Use SAML with federated directory services. 

D. Use Kerberos and browsers that support SAML. 

Answer:


Q138. - (Topic 1) 

There have been some failures of the company’s internal facing website. A security engineer has found the WAF to be the root cause of the failures. System logs show that the WAF has been unavailable for 14 hours over the past month, in four separate situations. One of these situations was a two hour scheduled maintenance time, aimed at improving the stability of the WAF. Using the MTTR based on the last month’s performance figures, which of the following calculations is the percentage of uptime assuming there were 722 hours in the month? 

A. 92.24 percent 

B. 98.06 percent 

C. 98.34 percent 

D. 99.72 percent 

Answer:


Q139. - (Topic 1) 

The helpdesk manager wants to find a solution that will enable the helpdesk staff to better serve company employees who call with computer-related problems. The helpdesk staff is currently unable to perform effective troubleshooting and relies on callers to describe their technology problems. Given that the helpdesk staff is located within the company headquarters and 90% of the callers are telecommuters, which of the following tools should the helpdesk manager use to make the staff more effective at troubleshooting while at the same time reducing company costs? (Select TWO). 

A. Web cameras 

B. Email 

C. Instant messaging 

D. BYOD 

E. Desktop sharing 

F. Presence 

Answer: C,E 


Q140. - (Topic 2) 

A security solutions architect has argued consistently to implement the most secure method of encrypting corporate messages. The solution has been derided as not being cost effective by other members of the IT department. The proposed solution uses symmetric keys to encrypt all messages and is very resistant to unauthorized decryption. The method also requires special handling and security for all key material that goes above and beyond most encryption systems. 

Which of the following is the solutions architect MOST likely trying to implement? 

A. One time pads 

B. PKI 

C. Quantum cryptography 

D. Digital rights management 

Answer: