★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW CAS-002 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/CAS-002-dumps.html


Testking offers free demo for CAS-002 exam. "CompTIA Advanced Security Practitioner (CASP)", also known as CAS-002 exam, is a CompTIA Certification. This set of posts, Passing the CompTIA CAS-002 exam, will help you answer those questions. The CAS-002 Questions & Answers covers all the knowledge points of the real exam. 100% real CompTIA CAS-002 exams and revised by experts!

Q11. - (Topic 5) 

A software development manager is taking over an existing software development project. The team currently suffers from poor communication due to a long delay between requirements documentation and feature delivery. This gap is resulting in an above average number of security-related bugs making it into production. Which of the following development methodologies is the team MOST likely using now? 

A. Agile 

B. Waterfall 

C. Scrum 

D. Spiral 

Answer:


Q12. - (Topic 2) 

Company ABC is hiring customer service representatives from Company XYZ. The representatives reside at Company XYZ’s headquarters. Which of the following BEST prevents Company XYZ representatives from gaining access to unauthorized Company ABC systems? 

A. Require each Company XYZ employee to use an IPSec connection to the required systems 

B. Require Company XYZ employees to establish an encrypted VDI session to the required systems 

C. Require Company ABC employees to use two-factor authentication on the required systems 

D. Require a site-to-site VPN for intercompany communications 

Answer:


Q13. - (Topic 2) 

Company policy requires that all company laptops meet the following baseline requirements: 

Software requirements: 

Antivirus Anti-malware Anti-spyware Log monitoring Full-disk encryption 

Terminal services enabled for RDP 

Administrative access for local users 

Hardware restrictions: 

Bluetooth disabled 

FireWire disabled 

WiFi adapter disabled 

Ann, a web developer, reports performance issues with her laptop and is not able to access any network resources. After further investigation, a bootkit was discovered and it was trying to access external websites. Which of the following hardening techniques should be applied to mitigate this specific issue from reoccurring? (Select TWO). 

A. Group policy to limit web access 

B. Restrict VPN access for all mobile users 

C. Remove full-disk encryption 

D. Remove administrative access to local users 

E. Restrict/disable TELNET access to network resources 

F. Perform vulnerability scanning on a daily basis 

G. Restrict/disable USB access 

Answer: D,G 


Q14. - (Topic 5) 

Which of the following is the information owner responsible for? 

A. Developing policies, standards, and baselines. 

B. Determining the proper classification levels for data within the system. 

C. Integrating security considerations into application and system purchasing decisions. 

D. Implementing and evaluating security controls by validating the integrity of the data. 

Answer:


Q15. - (Topic 2) 

A security administrator was recently hired in a start-up company to represent the interest of security and to assist the network team in improving security in the company. The programmers are not on good terms with the security team and do not want to be distracted with security issues while they are working on a major project. Which of the following is the BEST time to make them address security issues in the project? 

A. In the middle of the project 

B. At the end of the project 

C. At the inception of the project 

D. At the time they request 

Answer:


Q16. - (Topic 3) 

A developer is coding the crypto routine of an application that will be installed on a standard headless and diskless server connected to a NAS housed in the datacenter. The developer has written the following six lines of code to add entropy to the routine: 

1 - If VIDEO input exists, use video data for entropy 2 - If AUDIO input exists, use audio data for entropy 3 - If MOUSE input exists, use mouse data for entropy 4 - IF KEYBOARD input exists, use keyboard data for entropy 5 - IF IDE input exists, use IDE data for entropy 6 - IF NETWORK input exists, use network data for entropy 

Which of the following lines of code will result in the STRONGEST seed when combined? 

A. 2 and 1 

B. 3 and 5 

C. 5 and 2 

D. 6 and 4 

Answer:


Q17. - (Topic 1) 

A security officer is leading a lessons learned meeting. Which of the following should be components of that meeting? (Select TWO). 

A. Demonstration of IPS system 

B. Review vendor selection process 

C. Calculate the ALE for the event 

D. Discussion of event timeline 

E. Assigning of follow up items 

Answer: D,E 


Q18. - (Topic 4) 

Company XYZ is in negotiations to acquire Company ABC for $1.2millon. Due diligence activities have uncovered systemic security issues in the flagship product of Company ABC. It has been established that a complete product rewrite would be needed with average estimates indicating a cost of $1.6millon. Which of the following approaches should the risk manager of Company XYZ recommend? 

A. Transfer the risk 

B. Accept the risk 

C. Mitigate the risk 

D. Avoid the risk 

Answer:


Q19. - (Topic 4) 

A company’s security policy states that its own internally developed proprietary Internet facing software must be resistant to web application attacks. Which of the following methods provides the MOST protection against unauthorized access to stored database information? 

A. Require all development to follow secure coding practices. 

B. Require client-side input filtering on all modifiable fields. 

C. Escape character sequences at the application tier. 

D. Deploy a WAF with application specific signatures. 

Answer:


Q20. - (Topic 1) 

Which of the following BEST constitutes the basis for protecting VMs from attacks from other VMs hosted on the same physical platform? 

A. Aggressive patch management on the host and guest OSs. 

B. Host based IDS sensors on all guest OSs. 

C. Different antivirus solutions between the host and guest OSs. 

D. Unique Network Interface Card (NIC) assignment per guest OS. 

Answer: