Probably the greatest options for such people will be the CAS-002 official certifications training course by the CompTIA. CompTIA official certifications is among the many top 10 official certifications training systems that are sent towards college students everywhere and they have tremendous valuation inside the perspective of those who is selecting an individual. It is generally simply because recruit the few individuals which they believe could increase the reputation of their corporations by simply inventing interesting things or even they feel of which at the least a customer should have a few side in knowledge of the specific area.

2017 Mar CAS-002 exam question

Q251. - (Topic 1) 

An application present on the majority of an organization’s 1,000 systems is vulnerable to a buffer overflow attack. Which of the following is the MOST comprehensive way to resolve the issue? 

A. Deploy custom HIPS signatures to detect and block the attacks. 

B. Validate and deploy the appropriate patch. 

C. Run the application in terminal services to reduce the threat landscape. 

D. Deploy custom NIPS signatures to detect and block the attacks. 


Q252. - (Topic 3) 

Company XYZ has transferred all of the corporate servers, including web servers, to a cloud hosting provider to reduce costs. All of the servers are running unpatched, outdated versions of Apache. Furthermore, the corporate financial data is also hosted by the cloud services provider, but it is encrypted when not in use. Only the DNS server is configured to audit user and administrator actions and logging is disabled on the other virtual machines. Given this scenario, which of the following is the MOST significant risk to the system? 

A. All servers are unpatched and running old versions. 

B. Financial data is processed without being encrypted. 

C. Logging is disabled on critical servers. 

D. Server services have been virtualized and outsourced. 


Q253. - (Topic 1) 

The source workstation image for new accounting PCs has begun blue-screening. A technician notices that the date/time stamp of the image source appears to have changed. The desktop support director has asked the Information Security department to determine if any changes were made to the source image. Which of the following methods would BEST help with this process? (Select TWO). 

A. Retrieve source system image from backup and run file comparison analysis on the two images. 

B. Parse all images to determine if extra data is hidden using steganography. 

C. Calculate a new hash and compare it with the previously captured image hash. 

D. Ask desktop support if any changes to the images were made. 

E. Check key system files to see if date/time stamp is in the past six months. 

Answer: A,C 

Q254. - (Topic 2) 

A firm’s Chief Executive Officer (CEO) is concerned that IT staff lacks the knowledge to identify complex vulnerabilities that may exist in a payment system being internally developed. The payment system being developed will be sold to a number of organizations and is in direct competition with another leading product. The CEO highlighted that code base confidentiality is of critical importance to allow the company to exceed the competition in terms of the product’s reliability, stability, and performance. Which of the following would provide the MOST thorough testing and satisfy the CEO’s requirements? 

A. Sign a MOU with a marketing firm to preserve the company reputation and use in-house resources for random testing. 

B. Sign a BPA with a small software consulting firm and use the firm to perform Black box testing and address all findings. 

C. Sign a NDA with a large security consulting firm and use the firm to perform Grey box testing and address all findings. 

D. Use the most qualified and senior developers on the project to perform a variety of White box testing and code reviews. 


Q255. - (Topic 2) 

An administrator is implementing a new network-based storage device. In selecting a storage protocol, the administrator would like the data in transit's integrity to be the most important concern. Which of the following protocols meets these needs by implementing either AES-CMAC or HMAC-SHA256 to sign data? 



C. FCoE 



Renovate CAS-002 free practice questions:

Q256. - (Topic 4) 

Company A needs to export sensitive data from its financial system to company B’s database, using company B’s API in an automated manner. Company A’s policy prohibits the use of any intermediary external systems to transfer or store its sensitive data, therefore the transfer must occur directly between company A’s financial system and company B’s destination server using the supplied API. Additionally, company A’s legacy financial software does not support encryption, while company B’s API supports encryption. Which of the following will provide end-to-end encryption for the data transfer while adhering to these requirements? 

A. Company A must install an SSL tunneling service on the financial system. 

B. Company A’s security administrator should use an HTTPS capable browser to transfer the data. 

C. Company A should use a dedicated MPLS circuit to transfer the sensitive data to company B. 

D. Company A and B must create a site-to-site IPSec VPN on their respective firewalls. 


Q257. - (Topic 5) 

An organization has decided to reduce labor costs by outsourcing back office processing of credit applications to a provider located in another country. Data sovereignty and privacy concerns raised by the security team resulted in the third-party provider only accessing and processing the data via remote desktop sessions. To facilitate communications and improve productivity, staff at the third party has been provided with corporate email accounts that are only accessible via the remote desktop sessions. Email forwarding is blocked and staff at the third party can only communicate with staff within the organization. Which of the following additional controls should be implemented to prevent data loss? (Select THREE). 

A. Implement hashing of data in transit 

B. Session recording and capture 

C. Disable cross session cut and paste 

D. Monitor approved credit accounts 

E. User access audit reviews 

F. Source IP whitelisting 

Answer: C,E,F 

Q258. - (Topic 1) 

A security administrator wants to prevent sensitive data residing on corporate laptops and desktops from leaking outside of the corporate network. The company has already implemented full-disk encryption and has disabled all peripheral devices on its desktops and laptops. Which of the following additional controls MUST be implemented to minimize the risk of data leakage? (Select TWO). 

A. A full-system backup should be implemented to a third-party provider with strong encryption for data in transit. 

B. A DLP gateway should be installed at the company border. 

C. Strong authentication should be implemented via external biometric devices. 

D. Full-tunnel VPN should be required for all network communication. 

E. Full-drive file hashing should be implemented with hashes stored on separate storage. 

F. Split-tunnel VPN should be enforced when transferring sensitive data. 

Answer: B,D 

Q259. - (Topic 3) 

A company is preparing to upgrade its NIPS at five locations around the world. The three platforms the team plans to test, claims to have the most advanced features and lucrative pricing. 

Assuming all platforms meet the functionality requirements, which of the following methods should be used to select the BEST platform? 

A. Establish return on investment as the main criteria for selection. 

B. Run a cost/benefit analysis based on the data received from the RFP. 

C. Evaluate each platform based on the total cost of ownership. 

D. Develop a service level agreement to ensure the selected NIPS meets all performance requirements. 


Q260. - (Topic 2) 

A risk manager has decided to use likelihood and consequence to determine the risk of an event occurring to a company asset. Which of the following is a limitation of this approach to risk management? 

A. Subjective and based on an individual's experience. 

B. Requires a high degree of upfront work to gather environment details. 

C. Difficult to differentiate between high, medium, and low risks. 

D. Allows for cost and benefit analysis. 

E. Calculations can be extremely complex to manage.