[Free] 2018(Jan) EnsurePass Dumpsleader CompTIA CAS-002 Dumps with VCE and PDF 71-80

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan CompTIA Official New Released CAS-002
100% Free Download! 100% Pass Guaranteed!

CompTIA Advanced Security Practitioner (CASP)

Question No: 71 – (Topic 1)

Which of the following BEST constitutes the basis for protecting VMs from attacks from other VMs hosted on the same physical platform?

  1. Aggressive patch management on the host and guest OSs.

  2. Host based IDS sensors on all guest OSs.

  3. Different antivirus solutions between the host and guest OSs.

  4. Unique Network Interface Card (NIC) assignment per guest OS.

Answer: A

Question No: 72 – (Topic 1)

A small company’s Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the company’s security posture quickly with regard to targeted attacks. Which of the following should the CSO conduct FIRST?

  1. Survey threat feeds from services inside the same industry.

  2. Purchase multiple threat feeds to ensure diversity and implement blocks for malicious traffic.

  3. Conduct an internal audit against industry best practices to perform a qualitative analysis.

  4. Deploy a UTM solution that receives frequent updates from a trusted industry vendor.

Answer: A

Question No: 73 – (Topic 1)

A security manager has received the following email from the Chief Financial Officer (CFO):

“While I am concerned about the security of the proprietary financial data in our ERP application, we have had a lot of turnover in the accounting group and I am having a difficult time meeting our monthly performance targets. As things currently stand, we do not allow employees to work from home but this is something I am willing to allow so we can get back on track. What should we do first to securely enable this capability for my group?”

Based on the information provided, which of the following would be the MOST appropriate response to the CFO?

  1. Remote access to the ERP tool introduces additional security vulnerabilities and should not be allowed.

  2. Allow VNC access to corporate desktops from personal computers for the users working from home.

  3. Allow terminal services access from personal computers after the CFO provides a list of the users working from home.

  4. Work with the executive management team to revise policies before allowing any remote access.

Answer: D

Question No: 74 – (Topic 1)

Company XYZ provides cable television service to several regional areas. They are currently installing fiber-to-the-home in many areas with hopes of also providing telephone and Internet services. The telephone and Internet services portions of the company will each be separate subsidiaries of the parent company. The board of directors wishes to keep the subsidiaries separate from the parent company. However all three companies must share customer data for the purposes of accounting, billing, and customer authentication. The solution must use open standards, and be simple and seamless for customers, while only sharing minimal data between the companies. Which of the following solutions is BEST suited for this scenario?

  1. The companies should federate, with the parent becoming the SP, and the subsidiaries becoming an IdP.

  2. The companies should federate, with the parent becoming the IdP, and the subsidiaries becoming an SSP.

  3. The companies should federate, with the parent becoming the IdP, and the subsidiaries becoming an SP.

  4. The companies should federate, with the parent becoming the ASP, and the subsidiaries becoming an IdP.

Answer: C

Question No: 75 – (Topic 1)

The administrator is troubleshooting availability issues on an FCoE-based storage array that uses deduplication. The single controller in the storage array has failed, so the administrator wants to move the drives to a storage array from a different manufacturer in order to access the data. Which of the following issues may potentially occur?

  1. The data may not be in a usable format.

  2. The new storage array is not FCoE based.

  3. The data may need a file system check.

  4. The new storage array also only has a single controller.

Answer: A

Question No: 76 – (Topic 1)

A new web based application has been developed and deployed in production. A security engineer decides to use an HTTP interceptor for testing the application. Which of the following problems would MOST likely be uncovered by this tool?

  1. The tool could show that input validation was only enabled on the client side

  2. The tool could enumerate backend SQL database table and column names

  3. The tool could force HTTP methods such as DELETE that the server has denied

  4. The tool could fuzz the application to determine where memory leaks occur

Answer: A

Question No: 77 – (Topic 1)

A penetration tester is assessing a mobile banking application. Man-in-the-middle attempts via a HTTP intercepting proxy are failing with SSL errors. Which of the following controls has likely been implemented by the developers?

  1. SSL certificate revocation

  2. SSL certificate pinning

  3. Mobile device root-kit detection

  4. Extended Validation certificates

Answer: B

Question No: 78 – (Topic 1)

The Information Security Officer (ISO) is reviewing a summary of the findings from the last COOP tabletop exercise. The Chief Information Officer (CIO) wants to determine which additional controls must be implemented to reduce the risk of an extended customer service outage due to the VoIP system being unavailable. Which of the following BEST describes the scenario presented and the document the ISO is reviewing?

  1. The ISO is evaluating the business implications of a recent telephone system failure within the BIA.

  2. The ISO is investigating the impact of a possible downtime of the messaging system within the RA.

  3. The ISO is calculating the budget adjustment needed to ensure audio/video system

    redundancy within the RFQ.

  4. The ISO is assessing the effect of a simulated downtime involving the telecommunication system within the AAR.

Answer: D

Question No: 79 – (Topic 1)

Due to a new regulatory requirement, ABC Company must now encrypt all WAN transmissions. When speaking with the network administrator, the security administrator learns that the existing routers have the minimum processing power to do the required level of encryption. Which of the following solutions minimizes the performance impact on the router?

  1. Deploy inline network encryption devices

  2. Install an SSL acceleration appliance

  3. Require all core business applications to use encryption

  4. Add an encryption module to the router and configure IPSec

Answer: A

Question No: 80 – (Topic 1)

A developer is determining the best way to improve security within the code being developed. The developer is focusing on input fields where customers enter their credit card details. Which of the following techniques, if implemented in the code, would be the MOST effective in protecting the fields from malformed input?

  1. Client side input validation

  2. Stored procedure

  3. Encrypting credit card details

  4. Regular expression matching

Answer: D

100% Ensurepass Free Download!
Download Free Demo:CAS-002 Demo PDF
100% Ensurepass Free Guaranteed!
CAS-002 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.