Exam Code: CAS-002 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Advanced Security Practitioner (CASP)
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass CAS-002 Exam.

2021 Dec CAS-002 exam price

Q301. - (Topic 4) 

Continuous monitoring is a popular risk reduction technique in many large organizations with formal certification processes for IT projects. In order to implement continuous monitoring in an effective manner which of the following is correct? 

A. Only security related alerts should be forwarded to the network team for resolution. 

B. All logs must be centrally managed and access to the logs restricted only to data storage staff. 

C. Logging must be set appropriately and alerts delivered to security staff in a timely manner. 

D. Critical logs must be monitored hourly and adequate staff must be assigned to the network team. 

Answer:


Q302. - (Topic 5) 

The audit department at a company requires proof of exploitation when conducting internal network penetration tests. Which of the following provides the MOST conclusive proof of compromise without further compromising the integrity of the system? 

A. Provide a list of grabbed service banners. 

B. Modify a file on the system and include the path in the test’s report. 

C. Take a packet capture of the test activity. 

D. Add a new test user account on the system. 

Answer:


Q303. - (Topic 5) 

Company XYZ is building a new customer facing website which must access some corporate resources. The company already has an internal facing web server and a separate server supporting an extranet to which suppliers have access. The extranet web server is located in a network DMZ. The internal website is hosted on a laptop on the internal corporate network. The internal network does not restrict traffic between any internal hosts. Which of the following locations will BEST secure both the intranet and the customer facing website? 

A. The existing internal network segment 

B. Dedicated DMZ network segments 

C. The existing extranet network segment 

D. A third-party web hosting company 

Answer:


Q304. - (Topic 5) 

A company wishes to purchase a new security appliance. A security administrator has extensively researched the appliances, and after presenting security choices to the company’s management team, they approve of the proposed solution. Which of the following documents should be constructed to acquire the security appliance? 

A. SLA 

B. RFQ 

C. RFP 

D. RFI 

Answer:


Q305. DRAG DROP - (Topic 2) 

An organization is implementing a project to simplify the management of its firewall network flows and implement security controls. The following requirements exist. Drag and drop the BEST security solution to meet the given requirements. Options may be used once or not at all. All placeholders must be filled. 

Answer: 


Avant-garde CAS-002 exam question:

Q306. - (Topic 2) 

A security services company is scoping a proposal with a client. They want to perform a general security audit of their environment within a two week period and consequently have the following requirements: 

Requirement 1 – Ensure their server infrastructure operating systems are at their latest patch levels 

Requirement 2 – Test the behavior between the application and database 

Requirement 3 – Ensure that customer data can not be exfiltrated Which of the following is the BEST solution to meet the above requirements? 

A. Penetration test, perform social engineering and run a vulnerability scanner 

B. Perform dynamic code analysis, penetration test and run a vulnerability scanner 

C. Conduct network analysis, dynamic code analysis, and static code analysis 

D. Run a protocol analyzer perform static code analysis and vulnerability assessment 

Answer:


Q307. - (Topic 3) 

After connecting to a secure payment server at https://pay.xyz.com, an auditor notices that the SSL certificate was issued to *.xyz.com. The auditor also notices that many of the internal development servers use the same certificate. After installing the certificate on dev1.xyz.com, one of the developers reports misplacing the USB thumb-drive where the SSL certificate was stored. Which of the following should the auditor recommend FIRST? 

A. Generate a new public key on both servers. 

B. Replace the SSL certificate on dev1.xyz.com. 

C. Generate a new private key password for both servers. 

D. Replace the SSL certificate on pay.xyz.com. 

Answer:


Q308. - (Topic 2) 

A storage as a service company implements both encryption at rest as well as encryption in transit of customers’ data. The security administrator is concerned with the overall security of the encrypted customer data stored by the company servers and wants the development team to implement a solution that will strengthen the customer’s encryption key. Which of the following, if implemented, will MOST increase the time an offline password attack against the customers’ data would take? 

A. key = NULL ; for (int i=0; i<5000; i++) { key = sha(key + password) } 

B. password = NULL ; for (int i=0; i<10000; i++) { password = sha256(key) } 

C. password = password + sha(password+salt) + aes256(password+salt) 

D. key = aes128(sha256(password), password)) 

Answer:


Q309. - (Topic 4) 

An administrator attempts to install the package "named.9.3.6-12-x86_64.rpm" on a server. Even though the package was downloaded from the official repository, the server states the package cannot be installed because no GPG key is found. Which of the following should the administrator perform to allow the program to be installed? 

A. Download the file from the program publisher's website. 

B. Generate RSA and DSA keys using GPG. 

C. Import the repository's public key. 

D. Run sha1sum and verify the hash. 

Answer:


Q310. - (Topic 1) 

An analyst connects to a company web conference hosted on www.webconference.com/meetingID#01234 and observes that numerous guests have been allowed to join, without providing identifying information. The topics covered during the web conference are considered proprietary to the company. Which of the following security concerns does the analyst present to management? 

A. Guest users could present a risk to the integrity of the company’s information 

B. Authenticated users could sponsor guest access that was previously approved by management 

C. Unauthenticated users could present a risk to the confidentiality of the company’s information 

D. Meeting owners could sponsor guest access if they have passed a background check 

Answer: