★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW CAS-002 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/CAS-002-dumps.html


Q111. - (Topic 3) 

Customer Need: 

“We need the system to produce a series of numbers with no discernible mathematical progression for use by our Java based, PKI-enabled, customer facing website.” 

Which of the following BEST restates the customer need? 

A. The system shall use a pseudo-random number generator seeded the same every time. 

B. The system shall generate a pseudo-random number upon invocation by the existing Java program. 

C. The system shall generate a truly random number based upon user PKI certificates. 

D. The system shall implement a pseudo-random number generator for use by corporate customers. 

Answer:


Q112. - (Topic 1) 

There have been some failures of the company’s internal facing website. A security engineer has found the WAF to be the root cause of the failures. System logs show that the WAF has been unavailable for 14 hours over the past month, in four separate situations. One of these situations was a two hour scheduled maintenance time, aimed at improving the stability of the WAF. Using the MTTR based on the last month’s performance figures, which of the following calculations is the percentage of uptime assuming there were 722 hours in the month? 

A. 92.24 percent 

B. 98.06 percent 

C. 98.34 percent 

D. 99.72 percent 

Answer:


Q113. - (Topic 2) 

Ann is testing the robustness of a marketing website through an intercepting proxy. She has intercepted the following HTTP request: 

POST /login.aspx HTTP/1.1 

Host: comptia.org 

Content-type: text/html 

txtUsername=ann&txtPassword=ann&alreadyLoggedIn=false&submit=true 

Which of the following should Ann perform to test whether the website is susceptible to a simple authentication bypass? 

A. Remove all of the post data and change the request to /login.aspx from POST to GET 

B. Attempt to brute force all usernames and passwords using a password cracker 

C. Remove the txtPassword post data and change alreadyLoggedIn from false to true 

D. Remove the txtUsername and txtPassword post data and toggle submit from true to false 

Answer:


Q114. - (Topic 4) 

After being informed that the company DNS is unresponsive, the system administrator issues the following command from a Linux workstation: 

Once at the command prompt, the administrator issues the below commanD. 

Which of the following is true about the above situation? 

A. The administrator must use the sudo command in order to restart the service. 

B. The administrator used the wrong SSH port to restart the DNS server. 

C. The service was restarted correctly, but it failed to bind to the network interface. 

D. The service did not restart because the bind command is privileged. 

Answer:


Q115. - (Topic 3) 

An architect has been engaged to write the security viewpoint of a new initiative. Which of the following BEST describes a repeatable process that can be used for establishing the security architecture? 

A. Inspect a previous architectural document. Based on the historical decisions made, consult the architectural control and pattern library within the organization and select the controls that appear to best fit this new architectural need. 

B. Implement controls based on the system needs. Perform a risk analysis of the system. For any remaining risks, perform continuous monitoring. 

C. Classify information types used within the system into levels of confidentiality, integrity, and availability. Determine minimum required security controls. Conduct a risk analysis. Decide on which security controls to implement. 

D. Perform a risk analysis of the system. Avoid extreme risks. Mitigate high risks. Transfer medium risks and accept low risks. Perform continuous monitoring to ensure that the system remains at an adequate security posture. 

Answer:


Q116. - (Topic 4) 

A trust relationship has been established between two organizations with web based services. One organization is acting as the Requesting Authority (RA) and the other acts as the Provisioning Service Provider (PSP). Which of the following is correct about the trust relationship? 

A. The trust relationship uses SAML in the SOAP header. The SOAP body transports the SPML requests / responses. 

B. The trust relationship uses XACML in the SAML header. The SAML body transports the SOAP requests / responses. 

C. The trust relationship uses SPML in the SOAP header. The SOAP body transports the SAML requests / responses. 

D. The trust relationship uses SPML in the SAML header. The SAML body transports the SPML requests / responses. 

Answer:


Q117. - (Topic 1) 

A forensic analyst works for an e-discovery firm where several gigabytes of data are processed daily. While the business is lucrative, they do not have the resources or the scalability to adequately serve their clients. Since it is an e-discovery firm where chain of custody is important, which of the following scenarios should they consider? 

A. Offload some data processing to a public cloud 

B. Aligning their client intake with the resources available 

C. Using a community cloud with adequate controls 

D. Outsourcing the service to a third party cloud provider 

Answer:


Q118. - (Topic 4) 

The organization has an IT driver on cloud computing to improve delivery times for IT solution provisioning. Separate to this initiative, a business case has been approved for replacing the existing banking platform for credit card processing with a newer offering. It is the security practitioner’s responsibility to evaluate whether the new credit card processing platform can be hosted within a cloud environment. Which of the following BEST balances the security risk and IT drivers for cloud computing? 

A. A third-party cloud computing platform makes sense for new IT solutions. This should be endorsed going forward so as to align with the IT strategy. However, the security practitioner will need to ensure that the third-party cloud provider does regular penetration tests to ensure that all data is secure. 

B. Using a third-party cloud computing environment should be endorsed going forward. This aligns with the organization’s strategic direction. It also helps to shift any risk and regulatory compliance concerns away from the company’s internal IT department. The next step will be to evaluate each of the cloud computing vendors, so that a vendor can then be selected for hosting the new credit card processing platform. 

C. There may be regulatory restrictions with credit cards being processed out of country or processed by shared hosting providers. A private cloud within the company should be considered. An options paper should be created which outlines the risks, advantages, disadvantages of relevant choices and it should recommended a way forward. 

D. Cloud computing should rarely be considered an option for any processes that need to be significantly secured. The security practitioner needs to convince the stakeholders that the new platform can only be delivered internally on physical infrastructure. 

Answer:


Q119. - (Topic 4) 

A security policy states that all applications on the network must have a password length of eight characters. There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in six months, and two are not expected to be upgraded or removed from the network. Which of the following processes should be followed? 

A. Establish a risk matrix 

B. Inherit the risk for six months 

C. Provide a business justification to avoid the risk 

D. Provide a business justification for a risk exception 

Answer:


Q120. - (Topic 1) 

A small company’s Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the company’s security posture quickly with regard to targeted attacks. Which of the following should the CSO conduct FIRST? 

A. Survey threat feeds from services inside the same industry. 

B. Purchase multiple threat feeds to ensure diversity and implement blocks for malicious traffic. 

C. Conduct an internal audit against industry best practices to perform a qualitative analysis. 

D. Deploy a UTM solution that receives frequent updates from a trusted industry vendor. 

Answer: