★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW CAS-002 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/CAS-002-dumps.html


It is more faster and easier to pass the CompTIA CAS-002 exam by using 100% Guarantee CompTIA CompTIA Advanced Security Practitioner (CASP) questuins and answers. Immediate access to the Leading CAS-002 Exam and find the same core area CAS-002 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Sep comptia casp cas-002:

Q71. - (Topic 5) 

A software project manager has been provided with a requirement from the customer to place limits on the types of transactions a given user can initiate without external interaction from another user with elevated privileges. This requirement is BEST described as an implementation of: 

A. An administrative control 

B. Dual control 

C. Separation of duties 

D. Least privilege 

E. Collusion 

Answer: C 


Q72. - (Topic 2) 

Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information? 

A. Deduplication 

B. Data snapshots 

C. LUN masking 

D. Storage multipaths 

Answer: C 


Q73. - (Topic 2) 

A bank is in the process of developing a new mobile application. The mobile client renders content and communicates back to the company servers via REST/JSON calls. The bank wants to ensure that the communication is stateless between the mobile application and the web services gateway. Which of the following controls MUST be implemented to enable stateless communication? 

A. Generate a one-time key as part of the device registration process. 

B. Require SSL between the mobile application and the web services gateway. 

C. The jsession cookie should be stored securely after authentication. 

D. Authentication assertion should be stored securely on the client. 

Answer: D 


Q74. - (Topic 2) 

The following has been discovered in an internally developed application: 

Error - Memory allocated but not freed: char *myBuffer = malloc(BUFFER_SIZE); if (myBuffer != NULL) { *myBuffer = STRING_WELCOME_MESSAGE; 

printf(“Welcome to: %s\n”, myBuffer); 

exit(0); 

Which of the following security assessment methods are likely to reveal this security weakness? (Select TWO). 

A. Static code analysis 

B. Memory dumping 

C. Manual code review 

D. Application sandboxing 

E. Penetration testing 

F. Black box testing 

Answer: A,C 


Q75. - (Topic 1) 

An analyst connects to a company web conference hosted on www.webconference.com/meetingID#01234 and observes that numerous guests have been allowed to join, without providing identifying information. The topics covered during the web conference are considered proprietary to the company. Which of the following security concerns does the analyst present to management? 

A. Guest users could present a risk to the integrity of the company’s information 

B. Authenticated users could sponsor guest access that was previously approved by management 

C. Unauthenticated users could present a risk to the confidentiality of the company’s information 

D. Meeting owners could sponsor guest access if they have passed a background check 

Answer: C 


CAS-002 latest exam

Most up-to-date comptia casp cas-002:

Q76. - (Topic 2) 

A senior network security engineer has been tasked to decrease the attack surface of the corporate network. Which of the following actions would protect the external network interfaces from external attackers performing network scanning? 

A. Remove contact details from the domain name registrar to prevent social engineering attacks. 

B. Test external interfaces to see how they function when they process fragmented IP packets. 

C. Enable a honeynet to capture and facilitate future analysis of malicious attack vectors. 

D. Filter all internal ICMP message traffic, forcing attackers to use full-blown TCP port scans against external network interfaces. 

Answer: B 


Q77. - (Topic 3) 

The Chief Information Officer (CIO) of a technology company is likely to move away from a de-perimeterized model for employee owned devices. This is because there were too many issues with lack of patching, malware incidents, and data leakage due to lost/stolen devices which did not have full-disk encryption. The ‘bring your own computing’ approach was originally introduced because different business units preferred different operating systems and application stacks. Based on the issues and user needs, which of the following is the BEST recommendation for the CIO to make? 

A. The de-perimeterized model should be kept as this is major industry trend and other companies are following this direction. Advise that the issues being faced are standard business as usual concerns in a modern IT environment. 

B. Update the policy to disallow non-company end-point devices on the corporate network. Develop security-focused standard operating environments (SOEs) for all required operating systems and ensure the needs of each business unit are met. 

C. The de-perimeterized model should be kept but update company policies to state that non-company end-points require full disk encryption, anti-virus software, and regular patching. 

D. Update the policy to disallow non-company end-point devices on the corporate network. Allow only one type of outsourced SOE to all users as this will be easier to provision, secure, and will save money on operating costs. 

Answer: B 


Q78. - (Topic 1) 

A company is deploying a new iSCSI-based SAN. The requirements are as follows: 

Which of the following design specifications meet all the requirements? (Select TWO). 

A. Targets use CHAP authentication 

B. IPSec using AH with PKI certificates for authentication 

C. Fiber channel should be used with AES 

D. Initiators and targets use CHAP authentication 

E. Fiber channel over Ethernet should be used 

F. IPSec using AH with PSK authentication and 3DES 

G. Targets have SCSI IDs for authentication 

Answer: B,D 


Q79. - (Topic 2) 

A security auditor suspects two employees of having devised a scheme to steal money from the company. While one employee submits purchase orders for personal items, the other employee approves these purchase orders. The auditor has contacted the human resources director with suggestions on how to detect such illegal activities. Which of the following should the human resource director implement to identify the employees involved in these activities and reduce the risk of this activity occurring in the future? 

A. Background checks 

B. Job rotation 

C. Least privilege 

D. Employee termination procedures 

Answer: B 


Q80. - (Topic 3) 

The Chief Information Security Officer (CISO) of a small bank wants to embed a monthly testing regiment into the security management plan specifically for the development area. The CISO’s requirements are that testing must have a low risk of impacting system stability, can be scripted, and is very thorough. The development team claims that this will lead to a higher degree of test script maintenance and that it would be preferable if the testing was outsourced to a third party. The CISO still maintains that third-party testing would not be as thorough as the third party lacks the introspection of the development team. Which of the following will satisfy the CISO requirements? 

A. Grey box testing performed by a major external consulting firm who have signed a NDA. 

B. Black box testing performed by a major external consulting firm who have signed a NDA. 

C. White box testing performed by the development and security assurance teams. 

D. Grey box testing performed by the development and security assurance teams. 

Answer: C