we provide Downloadable CompTIA CAS-002 exam which are the best for clearing CAS-002 test, and to get certified by CompTIA CompTIA Advanced Security Practitioner (CASP). The CAS-002 Questions & Answers covers all the knowledge points of the real CAS-002 exam. Crack your CompTIA CAS-002 Exam with latest dumps, guaranteed!

P.S. Downloadable CAS-002 bootcamp are available on Google Drive, GET MORE: https://drive.google.com/open?id=1jFEYVEoSSaRH30NOS859G8vaEUVGAdF5

New CompTIA CAS-002 Exam Dumps Collection (Question 6 - Question 15)

New Questions 6

Company A has a remote work force that often includes independent contractors and out of state full time employees.

Company A's security engineer has been asked to implement a solution allowing these users to collaborate on projects with the following goals:

Which of the following solutions should the security engineer recommend to meet the MOST goals?

A. Create an SSL reverse proxy to a collaboration workspace. Use remote installation service to maintain application version. Have users use full desktop encryption. Schedule server downtime from 12:00 to 1:00 PM.

B. Install an SSL VPN to Company A's datacenter, have users connect to a standard virtual workstation image, set workstation time of day restrictions.

C. Create an extranet web portal using third party web based office applications. Ensure that Company A maintains the administrative access.

D. Schedule server downtime from 12:00 to 1:00 PM, implement a Terminal Server

A. Gateway, use remote installation services to standardize application on useru2019s laptops.

Answer: B

New Questions 7

A new company requirement mandates the implementation of multi-factor authentication to access network resources. The security administrator was asked to research and implement the most cost-effective solution that would allow for the authentication of both hardware and users. The company wants to leverage the PKI infrastructure which is already well established. Which of the following solutions should the security administrator implement?

A. Issue individual private/public key pairs to each user, install the private key on the central authentication system, and protect the private key with the useru2019s credentials. Require each user to install the public key on their computer.

B. Deploy USB fingerprint scanners on all desktops, and enable the fingerprint scanner on all laptops. Require all network users to register their fingerprint using the reader and store the information in the central authentication system.

C. Issue each user one hardware token. Configure the token serial number in the user properties of the central authentication system for each user and require token authentication with PIN for network logon.

D. Issue individual private/public key pairs to each user, install the public key on the central authentication system, and require each user to install the private key on their computer and protect it with a password.

Answer: D

New Questions 8

A new IDS device is generating a very large number of irrelevant events. Which of the following would BEST remedy this problem?

A. Change the IDS to use a heuristic anomaly filter.

B. Adjust IDS filters to decrease the number of false positives.

C. Change the IDS filter to data mine the false positives for statistical trending data.

D. Adjust IDS filters to increase the number of false negatives.

Answer: B

New Questions 9

CORRECT TEXTAn administrator wants to install a patch to an application. Given the scenario, download, verify and install the patch in the most secure manner. Instructions The last install that is completed will be the final submission

Answer: You need to check the hash value of download software with md5 utility.

New Questions 10

An organization has just released a new mobile application for its customers. The application has an inbuilt browser and native application to render content from existing websites and the organizationu2019s new web services gateway. All rendering of the content is performed on the mobile application.

The application requires SSO between the application, the web services gateway and legacy UI. Which of the following controls MUST be implemented to securely enable SSO?

A. A registration process is implemented to have a random number stored on the client.

B. The identity is passed between the applications as a HTTP header over REST.

C. Local storage of the authenticated token on the mobile application is secured.

D. Attestation of the XACML payload to ensure that the client is authorized.

Answer: C

New Questions 11

The finance department for an online shopping website has discovered that a number of customers were able to purchase goods and services without any payments. Further analysis conducted by the security investigations team indicated that the website allowed customers to update a payment amount for shipping. A specially crafted value could be entered and cause a roll over, resulting in the shipping cost being subtracted from the balance and in some instances resulted in a negative balance. As a result, the system processed the negative balance as zero dollars. Which of the following BEST describes the application issue?

A. Race condition

B. Click-jacking

C. Integer overflow

D. Use after free

E. SQL injection

Answer: C

New Questions 12

Some mobile devices are jail-broken by connecting via USB cable and then exploiting

software vulnerabilities to get kernel-level access. Which of the following attack types represents this scenario? (Select TWO).

A. Session management attack

B. Protocol fuzzing

C. Root-kit compromise

D. Physical attack

E. Privilege escalation

F. Man-in-the-middle

Answer: D,E

New Questions 13

An administrator attempts to install the package "named.9.3.6-12-x86_64.rpm" on a server. Even though the package was downloaded from the official repository, the server states the package cannot be installed because no GPG key is found. Which of the following should the administrator perform to allow the program to be installed?

A. Download the file from the program publisher's website.

B. Generate RSA and DSA keys using GPG.

C. Import the repository's public key.

D. Run sha1sum and verify the hash.

Answer: C

New Questions 14

An administrator is reviewing logs and sees the following entry:

Message: Access denied with code 403 (phase 2). Pattern match "\\bunion\\b.{1,100}?\\bselect\\b" at ARGS:$id. [data "union all select"] [severity "CRITICAL"] [tag "WEB_ATTACK"] [tag "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"] [tag


Action: Intercepted (phase 2) Apache-Handler: php5-script Which of the following attacks was being attempted?

A. Session hijacking

B. Cross-site script

C. SQL injection

D. Buffer overflow

Answer: C

New Questions 15

A security policy states that all applications on the network must have a password length of eight characters. There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in six months, and two are not expected to be upgraded or removed from the network. Which of the following processes should be followed?

A. Establish a risk matrix

B. Inherit the risk for six months

C. Provide a business justification to avoid the risk

D. Provide a business justification for a risk exception

Answer: D

100% Improved CompTIA CAS-002 Questions & Answers shared by Certleader, Get HERE: https://www.certleader.com/CAS-002-dumps.html (New 532 Q&As)