It is impossible to pass CompTIA CAS-002 exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed CompTIA CAS-002 practice questions. You will get a surprising result by our Regenerate CompTIA Advanced Security Practitioner (CASP) practice guides.

2021 Dec CAS-002 exam engine

Q71. - (Topic 1) 

A developer is determining the best way to improve security within the code being developed. The developer is focusing on input fields where customers enter their credit card details. Which of the following techniques, if implemented in the code, would be the MOST effective in protecting the fields from malformed input? 

A. Client side input validation 

B. Stored procedure 

C. Encrypting credit card details 

D. Regular expression matching 

Answer:


Q72. - (Topic 2) 

Company policy requires that all company laptops meet the following baseline requirements: 

Software requirements: 

Antivirus Anti-malware Anti-spyware Log monitoring Full-disk encryption 

Terminal services enabled for RDP 

Administrative access for local users 

Hardware restrictions: 

Bluetooth disabled 

FireWire disabled 

WiFi adapter disabled 

Ann, a web developer, reports performance issues with her laptop and is not able to access any network resources. After further investigation, a bootkit was discovered and it was trying to access external websites. Which of the following hardening techniques should be applied to mitigate this specific issue from reoccurring? (Select TWO). 

A. Group policy to limit web access 

B. Restrict VPN access for all mobile users 

C. Remove full-disk encryption 

D. Remove administrative access to local users 

E. Restrict/disable TELNET access to network resources 

F. Perform vulnerability scanning on a daily basis 

G. Restrict/disable USB access 

Answer: D,G 


Q73. - (Topic 4) 

Two storage administrators are discussing which SAN configurations will offer the MOST confidentiality. Which of the following configurations would the administrators use? (Select TWO). 

A. Deduplication 

B. Zoning 

C. Snapshots 

D. Multipathing 

E. LUN masking 

Answer: B,E 


Q74. - (Topic 1) 

Company XYZ provides hosting services for hundreds of companies across multiple industries including healthcare, education, and manufacturing. The security architect for company XYZ is reviewing a vendor proposal to reduce company XYZ’s hardware costs by combining multiple physical hosts through the use of virtualization technologies. The security architect notes concerns about data separation, confidentiality, regulatory requirements concerning PII, and administrative complexity on the proposal. Which of the following BEST describes the core concerns of the security architect? 

A. Most of company XYZ’s customers are willing to accept the risks of unauthorized disclosure and access to information by outside users. 

B. The availability requirements in SLAs with each hosted customer would have to be re-written to account for the transfer of virtual machines between physical platforms for regular maintenance. 

C. Company XYZ could be liable for disclosure of sensitive data from one hosted customer when accessed by a malicious user who has gained access to the virtual machine of another hosted customer. 

D. Not all of company XYZ’s customers require the same level of security and the administrative complexity of maintaining multiple security postures on a single hypervisor negates hardware cost savings. 

Answer:


Q75. - (Topic 3) 

A health service provider is considering the impact of allowing doctors and nurses access to the internal email system from their personal smartphones. The Information Security Officer (ISO) has received a technical document from the security administrator explaining that the current email system is capable of enforcing security policies to personal smartphones, including screen lockout and mandatory PINs. Additionally, the system is able to remotely wipe a phone if reported lost or stolen. Which of the following should the Information Security Officer be MOST concerned with based on this scenario? (Select THREE). 

A. The email system may become unavailable due to overload. 

B. Compliance may not be supported by all smartphones. 

C. Equipment loss, theft, and data leakage. 

D. Smartphone radios can interfere with health equipment. 

E. Data usage cost could significantly increase. 

F. Not all smartphones natively support encryption. 

G. Smartphones may be used as rogue access points. 

Answer: B,C,F 


Improve CAS-002 rapidshare:

Q76. - (Topic 1) 

A company has received the contract to begin developing a new suite of software tools to replace an aging collaboration solution. The original collaboration solution has been in place for nine years, contains over a million lines of code, and took over two years to develop originally. The SDLC has been broken up into eight primary stages, with each stage requiring an in-depth risk analysis before moving on to the next phase. Which of the following software development methods is MOST applicable? 

A. Spiral model 

B. Incremental model 

C. Waterfall model 

D. Agile model 

Answer:


Q77. - (Topic 2) 

An IT Manager is concerned about errors made during the deployment process for a new model of tablet. Which of the following would suggest best practices and configuration parameters that technicians could follow during the deployment process? 

A. Automated workflow 

B. Procedure 

C. Corporate standard 

D. Guideline 

E. Policy 

Answer:


Q78. DRAG DROP - (Topic 2) 

A manufacturer is planning to build a segregated network. There are requirements to segregate development and test infrastructure from production and the need to support multiple entry points into the network depending on the service being accessed. There are also strict rules in place to only permit user access from within the same zone. Currently, the following access requirements have been identified: 

1. Developers have the ability to perform technical validation of development applications. 

2. End users have the ability to access internal web applications. 

3. Third-party vendors have the ability to support applications. 

In order to meet segregation and access requirements, drag and drop the appropriate network zone that the user would be accessing and the access mechanism to meet the above criteria. Options may be used once or not at all. All placeholders must be filled. 

Answer: 


Q79. - (Topic 5) 

A security administrator notices a recent increase in workstations becoming compromised by malware. Often, the malware is delivered via drive-by downloads, from malware hosting websites, and is not being detected by the corporate antivirus. Which of the following solutions would provide the BEST protection for the company? 

A. Increase the frequency of antivirus downloads and install updates to all workstations. 

B. Deploy a cloud-based content filter and enable the appropriate category to prevent further infections. 

C. Deploy a NIPS to inspect and block all web traffic which may contain malware and exploits. 

D. Deploy a web based gateway antivirus server to intercept viruses before they enter the network. 

Answer:


Q80. - (Topic 5) 

An IT administrator has been tasked by the Chief Executive Officer with implementing security using a single device based on the following requirements: 

1. Selective sandboxing of suspicious code to determine malicious intent. 

2. VoIP handling for SIP and H.323 connections. 

3. Block potentially unwanted applications. 

Which of the following devices would BEST meet all of these requirements? 

A. UTM 

B. HIDS 

C. NIDS 

D. WAF 

E. HSM 

Answer: