[Free] 2018(Jan) EnsurePass Dumpsleader CompTIA CAS-002 Dumps with VCE and PDF 11-20

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan CompTIA Official New Released CAS-002
100% Free Download! 100% Pass Guaranteed!

CompTIA Advanced Security Practitioner (CASP)

Question No: 11 – (Topic 1)

A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important?

  1. Insecure direct object references, CSRF, Smurf

  2. Privilege escalation, Application DoS, Buffer overflow

  3. SQL injection, Resource exhaustion, Privilege escalation

  4. CSRF, Fault injection, Memory leaks

Answer: A

Question No: 12 – (Topic 1)

Due to compliance regulations, a company requires a yearly penetration test. The Chief Information Security Officer (CISO) has asked that it be done under a black box methodology.

Which of the following would be the advantage of conducting this kind of penetration test?

  1. The risk of unplanned server outages is reduced.

  2. Using documentation provided to them, the pen-test organization can quickly determine areas to focus on.

  3. The results will show an in-depth view of the network and should help pin-point areas of internal weakness.

  4. The results should reflect what attackers may be able to learn about the company.

Answer: D

Question No: 13 – (Topic 1)

There have been some failures of the company’s internal facing website. A security engineer has found the WAF to be the root cause of the failures. System logs show that the WAF has been unavailable for 14 hours over the past month, in four separate situations.

One of these situations was a two hour scheduled maintenance time, aimed at improving the stability of the WAF. Using the MTTR based on the last month’s performance figures, which of the following calculations is the percentage of uptime assuming there were 722 hours in the month?

  1. 92.24 percent

  2. 98.06 percent

  3. 98.34 percent

  4. 99.72 percent

Answer: C

Question No: 14 – (Topic 1)

A security manager for a service provider has approved two vendors for connections to the service provider backbone. One vendor will be providing authentication services for its payment card service, and the other vendor will be providing maintenance to the service provider infrastructure sites. Which of the following business agreements is MOST relevant to the vendors and service provider’s relationship?

  1. Memorandum of Agreement

  2. Interconnection Security Agreement

  3. Non-Disclosure Agreement

  4. Operating Level Agreement

Answer: B

Question No: 15 – (Topic 1)

A security administrator wants to prevent sensitive data residing on corporate laptops and desktops from leaking outside of the corporate network. The company has already implemented full-disk encryption and has disabled all peripheral devices on its desktops and laptops. Which of the following additional controls MUST be implemented to minimize the risk of data leakage? (Select TWO).

  1. A full-system backup should be implemented to a third-party provider with strong encryption for data in transit.

  2. A DLP gateway should be installed at the company border.

  3. Strong authentication should be implemented via external biometric devices.

  4. Full-tunnel VPN should be required for all network communication.

  5. Full-drive file hashing should be implemented with hashes stored on separate storage.

  6. Split-tunnel VPN should be enforced when transferring sensitive data.

Answer: B,D

Question No: 16 – (Topic 1)

A systems administrator establishes a CIFS share on a UNIX device to share data to Windows systems. The security authentication on the Windows domain is set to the highest level. Windows users are stating that they cannot authenticate to the UNIX share. Which of the following settings on the UNIX server would correct this problem?

  1. Refuse LM and only accept NTLMv2

  2. Accept only LM

  3. Refuse NTLMv2 and accept LM

  4. Accept only NTLM

Answer: A

Question No: 17 – (Topic 1)

A software project manager has been provided with a requirement from the customer to place limits on the types of transactions a given user can initiate without external interaction from another user with elevated privileges. This requirement is BEST described as an implementation of:

  1. an administrative control

  2. dual control

  3. separation of duties

  4. least privilege

  5. collusion

Answer: C

Question No: 18 – (Topic 1)

Ann, a software developer, wants to publish her newly developed software to an online store. Ann wants to ensure that the software will not be modified by a third party or end users before being installed on mobile devices. Which of the following should Ann implement to stop modified copies of her software from running on mobile devices?

  1. Single sign-on

  2. Identity propagation

  3. Remote attestation

  4. Secure code review

Answer: C

Question No: 19 – (Topic 1)

A web services company is planning a one-time high-profile event to be hosted on the

corporate website. An outage, due to an attack, would be publicly embarrassing, so Joe, the Chief Executive Officer (CEO), has requested that his security engineers put temporary preventive controls in place. Which of the following would MOST appropriately address Joe#39;s concerns?

  1. Ensure web services hosting the event use TCP cookies and deny_hosts.

  2. Configure an intrusion prevention system that blocks IPs after detecting too many incomplete sessions.

  3. Contract and configure scrubbing services with third-party DDoS mitigation providers.

  4. Purchase additional bandwidth from the company’s Internet service provider.

Answer: C

Question No: 20 – (Topic 1)

The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality. Which of the following equipment MUST be deployed to guard against unknown threats?

  1. Cloud-based antivirus solution, running as local admin, with push technology for definition updates.

  2. Implementation of an offsite data center hosting all company data, as well as deployment of VDI for all client computing needs.

  3. Host based heuristic IPS, segregated on a management VLAN, with direct control of the perimeter firewall ACLs.

  4. Behavior based IPS with a communication link to a cloud based vulnerability and threat feed.

Answer: D

100% Ensurepass Free Download!
Download Free Demo:CAS-002 Demo PDF
100% Ensurepass Free Guaranteed!
CAS-002 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.