★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW CAS-002 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/CAS-002-dumps.html


Although all of us promise all of you 100% passing ensure, we additionally implement the money back policy in situation some of anyone fail the exam. So you can feel with ease to use our CompTIA CompTIA exam dumps. Our principal objective is to meet the demands of our customers as well as make them achieve good results in the CompTIA CAS-002 exam. Our own CompTIA exam training materials are created in the method that each and every candidate can quickly understand as well as make far better preparation for the actual test. Taking help through Examcollection?¡¥s comprehensive materials, you are going to realize that it?¡¥s the easy process to get certified. If you wish to change your own career living and create achievement within your work, Please occur to Examcollection as well as find your own savior. Obtain the preparatory tools and get a desired outcome with complete confidence and ease.

2021 Apr CAS-002 real exam

Q91. - (Topic 1) 

Which of the following provides the BEST risk calculation methodology? 

A. Annual Loss Expectancy (ALE) x Value of Asset 

B. Potential Loss x Event Probability x Control Failure Probability 

C. Impact x Threat x Vulnerability 

D. Risk Likelihood x Annual Loss Expectancy (ALE) 

Answer:


Q92. - (Topic 5) 

As a cost saving measure, a company has instructed the security engineering team to allow all consumer devices to be able to access the network. They have asked for recommendations on what is needed to secure the enterprise, yet offer the most flexibility in terms of controlling applications, and stolen devices. Which of the following is BEST suited for the requirements? 

A. MEAP with Enterprise Appstore 

B. Enterprise Appstore with client-side VPN software 

C. MEAP with TLS 

D. MEAP with MDM 

Answer:


Q93. - (Topic 3) 

A business wants to start using social media to promote the corporation and to ensure that customers have a good experience with their products. Which of the following security items should the company have in place before implementation? (Select TWO). 

A. The company must dedicate specific staff to act as social media representatives of the company. 

B. All staff needs to be instructed in the proper use of social media in the work environment. 

C. Senior staff blogs should be ghost written by marketing professionals. 

D. The finance department must provide a cost benefit analysis for social media. 

E. The security policy needs to be reviewed to ensure that social media policy is properly implemented. 

F. The company should ensure that the company has sufficient bandwidth to allow for social media traffic. 

Answer: A,E 


Q94. - (Topic 3) 

Due to cost and implementation time pressures, a security architect has allowed a NAS to be used instead of a SAN for a non-critical, low volume database. Which of the following would make a NAS unsuitable for a business critical, high volume database application that required a high degree of data confidentiality and data availability? (Select THREE). 

A. File level transfer of data 

B. Zoning and LUN security 

C. Block level transfer of data 

D. Multipath 

E. Broadcast storms 

F. File level encryption 

G. Latency 

Answer: A,E,G 


Q95. - (Topic 1) 

A security administrator wants to calculate the ROI of a security design which includes the purchase of new equipment. The equipment costs $50,000 and it will take 50 hours to install and configure the equipment. The administrator plans to hire a contractor at a rate of $100/hour to do the installation. Given that the new design and equipment will allow the company to increase revenue and make an additional $100,000 on the first year, which of the following is the ROI expressed as a percentage for the first year? 

A. -45 percent 

B. 5.5 percent 

C. 45 percent 

D. 82 percent 

Answer:


Rebirth CAS-002 test preparation:

Q96. - (Topic 3) 

A team is established to create a secure connection between software packages in order to list employee's remaining or unused benefits on their paycheck stubs. Which of the following business roles would be MOST effective on this team? 

A. Network Administrator, Database Administrator, Programmers 

B. Network Administrator, Emergency Response Team, Human Resources 

C. Finance Officer, Human Resources, Security Administrator 

D. Database Administrator, Facilities Manager, Physical Security Manager 

Answer:


Q97. - (Topic 2) 

Joe is a security architect who is tasked with choosing a new NIPS platform that has the ability to perform SSL inspection, analyze up to 10Gbps of traffic, can be centrally managed and only reveals inspected application payload data to specified internal security employees. Which of the following steps should Joe take to reach the desired outcome? 

A. Research new technology vendors to look for potential products. Contribute to an RFP and then evaluate RFP responses to ensure that the vendor product meets all mandatory requirements. Test the product and make a product recommendation. 

B. Evaluate relevant RFC and ISO standards to choose an appropriate vendor product. Research industry surveys, interview existing customers of the product and then recommend that the product be purchased. 

C. Consider outsourcing the product evaluation and ongoing management to an outsourced provider on the basis that each of the requirements are met and a lower total cost of ownership (TCO) is achieved. 

D. Choose a popular NIPS product and then consider outsourcing the ongoing device management to a cloud provider. Give access to internal security employees so that they can inspect the application payload data. 

E. Ensure that the NIPS platform can also deal with recent technological advancements, such as threats emerging from social media, BYOD and cloud storage prior to purchasing the product. 

Answer:


Q98. - (Topic 5) 

During a software development project review, the cryptographic engineer advises the project manager that security can be greatly improved by significantly slowing down the runtime of a hashing algorithm and increasing the entropy by passing the input and salt back during each iteration. Which of the following BEST describes what the engineer is trying to achieve? 

A. Monoalphabetic cipher 

B. Confusion 

C. Root of trust 

D. Key stretching 

E. Diffusion 

Answer:


Q99. - (Topic 5) 

An internal committee comprised of the facilities manager, the physical security manager, the network administrator, and a member of the executive team has been formed to address a recent breach at a company’s data center. It was discovered that during the breach, an HVAC specialist had gained entry to an area that contained server farms holding sensitive financial data. Although the HVAC specialist was there to fix a legitimate issue, the investigation concluded security be provided for the two entry and exit points for the server farm. Which of the following should be implemented to accomplish the recommendations of the investigation? 

A. Implement a policy that all non-employees should be escorted in the data center. 

B. Place a mantrap at the points with biometric security. 

C. Hire an HVAC person for the company, eliminating the need for external HVAC people. 

D. Implement CCTV cameras at both points. 

Answer:


Q100. - (Topic 4) 

The lead systems architect on a software development project developed a design which is optimized for a distributed computing environment. The security architect assigned to the project has concerns about the integrity of the system, if it is deployed in a commercial cloud. Due to poor communication within the team, the security risks of the proposed design are not being given any attention. A network engineer on the project has a security background and is concerned about the overall success of the project. Which of the following is the BEST course of action for the network engineer to take? 

A. Address the security concerns through the network design and security controls. 

B. Implement mitigations to the security risks and address the poor communications on the team with the project manager. 

C. Document mitigations to the security concerns and facilitate a meeting between the architects and the project manager. 

D. Develop a proposal for an alternative architecture that does not leverage cloud computing and present it to the lead architect. 

Answer: