Ucertify CAS-002 Questions are updated and all CAS-002 answers are verified by experts. Once you have completely prepared with our CAS-002 exam prep kits you will be ready for the real CAS-002 exam without a problem. We have Leading CompTIA CAS-002 dumps study guide. PASSED CAS-002 First attempt! Here What I Did.

Q241. - (Topic 2) 

A company has noticed recently that its corporate information has ended up on an online forum. An investigation has identified that internal employees are sharing confidential corporate information on a daily basis. Which of the following are the MOST effective security controls that can be implemented to stop the above problem? (Select TWO). 

A. Implement a URL filter to block the online forum 

B. Implement NIDS on the desktop and DMZ networks 

C. Security awareness compliance training for all employees 

D. Implement DLP on the desktop, email gateway, and web proxies 

E. Review of security policies and procedures 

Answer: C,D 


Q242. - (Topic 4) 

Warehouse users are reporting performance issues at the end of each month when trying to access cloud applications to complete their end of the month financial reports. They have no problem accessing those applications at the beginning of the month. 

Network information: DMZ network – 192.168.5.0/24 VPN network – 192.168.1.0/24 Datacenter – 192.168.2.0/24 User network - 192.168.3.0/24 

HR network – 192.168.4.0/24 Warehouse network – 192.168.6.0/24 Finance network 192.168.7.0/24 

Traffic shaper configuration: 

VLAN Bandwidth limit (Mbps) VPN50 User175 HR220 Finance230 Warehouse75 Guest50 

External firewall allows all networks to access the Internet. Internal Firewall Rules: 

ActionSourceDestination Permit192.168.1.0/24192.168.2.0/24 Permit192.168.1.0/24192.168.3.0/24 Permit192.168.1.0/24192.168.5.0/24 Permit192.168.2.0/24192.168.1.0/24 Permit192.168.3.0/24192.168.1.0/24 Permit192.168.5.0/24192.168.1.0/24 Permit192.168.4.0/24192.168.7.0/24 Permit192.168.7.0/24192.168.4.0/24 Permit192.168.7.0/24any Deny192.168.4.0/24any Deny192.168.1.0/24192.168.4.0/24 

Denyanyany 

Which of the following restrictions is the MOST likely cause? 

A. Bandwidth limit on the traffic shaper for the finance department 

B. Proxy server preventing the warehouse from accessing cloud applications 

C. Deny statements in the firewall for the warehouse network 

D. Bandwidth limit on the traffic shaper for the warehouse department 

Answer:


Q243. - (Topic 5) 

A security engineer has inherited an authentication project which integrates 1024-bit PKI certificates into the company infrastructure and now has a new requirement to integrate 2048-bit PKI certificates so that the entire company will be interoperable with its vendors when the project is completed. The project is now 25% complete, with 15% of the company staff being issued 1024-bit certificates. The provisioning of network based accounts has not occurred yet due to other project delays. The project is now expected to be over budget and behind its original schedule. Termination of the existing project and beginning a new project is a consideration because of the change in scope. Which of the following is the security engineer’s MOST serious concern with implementing this solution? 

A. Succession planning 

B. Performance 

C. Maintainability 

D. Availability 

Answer:


Q244. - (Topic 2) 

A security administrator is assessing a new application. The application uses an API that is supposed to encrypt text strings that are stored in memory. How might the administrator test that the strings are indeed encrypted in memory? 

A. Use fuzzing techniques to examine application inputs 

B. Run nmap to attach to application memory 

C. Use a packet analyzer to inspect the strings 

D. Initiate a core dump of the application 

E. Use an HTTP interceptor to capture the text strings 

Answer:


Q245. - (Topic 1) 

Company XYZ has purchased and is now deploying a new HTML5 application. The company wants to hire a penetration tester to evaluate the security of the client and server components of the proprietary web application before launch. Which of the following is the penetration tester MOST likely to use while performing black box testing of the security of the company’s purchased application? (Select TWO). 

A. Code review 

B. Sandbox 

C. Local proxy 

D. Fuzzer 

E. Port scanner 

Answer: C,D 


Q246. - (Topic 3) 

A security administrator wants to verify and improve the security of a business process which is tied to proven company workflow. The security administrator was able to improve security by applying controls that were defined by the newly released company security standard. Such controls included code improvement, transport encryption, and interface restrictions. Which of the following can the security administrator do to further increase security after having exhausted all the technical controls dictated by the company’s security standard? 

A. Modify the company standard to account for higher security and meet with upper management for approval to implement the new standard. 

B. Conduct a gap analysis and recommend appropriate non-technical mitigating controls, and incorporate the new controls into the standard. 

C. Conduct a risk analysis on all current controls, and recommend appropriate mechanisms to increase overall security. 

D. Modify the company policy to account for higher security, adapt the standard accordingly, and implement new technical controls. 

Answer:


Q247. - (Topic 3) 

A hosting company provides inexpensive guest virtual machines to low-margin customers. Customers manage their own guest virtual machines. Some customers want basic guarantees of logical separation from other customers and it has been indicated that some customers would like to have configuration control of this separation; whereas others want this provided as a value-added service by the hosting company. Which of the following BEST meets these requirements? 

A. The hosting company should install a hypervisor-based firewall and allow customers to manage this on an as-needed basis. 

B. The hosting company should manage the hypervisor-based firewall; while allowing customers to configure their own host-based firewall. 

C. Customers should purchase physical firewalls to protect their guest hosts and have the hosting company manage these if requested. 

D. The hosting company should install a host-based firewall on customer guest hosts and offer to administer host firewalls for customers if requested. 

Answer:


Q248. - (Topic 5) 

An organization is selecting a SaaS provider to replace its legacy, in house Customer Resource Management (CRM) application. Which of the following ensures the organization mitigates the risk of managing separate user credentials? 

A. Ensure the SaaS provider supports dual factor authentication. 

B. Ensure the SaaS provider supports encrypted password transmission and storage. 

C. Ensure the SaaS provider supports secure hash file exchange. 

D. Ensure the SaaS provider supports role-based access control. 

E. Ensure the SaaS provider supports directory services federation. 

Answer:


Q249. - (Topic 2) 

During a new desktop refresh, all hosts are hardened at the OS level before deployment to comply with policy. Six months later, the company is audited for compliance to regulations. The audit discovers that 40 percent of the desktops do not meet requirements. Which of the following is the MOST likely cause of the noncompliance? 

A. The devices are being modified and settings are being overridden in production. 

B. The patch management system is causing the devices to be noncompliant after issuing the latest patches. 

C. The desktop applications were configured with the default username and password. 

D. 40 percent of the devices use full disk encryption. 

Answer:


Q250. - (Topic 1) 

The Chief Information Officer (CIO) is reviewing the IT centric BIA and RA documentation. The documentation shows that a single 24 hours downtime in a critical business function will cost the business $2.3 million. Additionally, the business unit which depends on the critical business function has determined that there is a high probability that a threat will materialize based on historical data. The CIO’s budget does not allow for full system hardware replacement in case of a catastrophic failure, nor does it allow for the purchase of additional compensating controls. Which of the following should the CIO recommend to the finance director to minimize financial loss? 

A. The company should mitigate the risk. 

B. The company should transfer the risk. 

C. The company should avoid the risk. 

D. The company should accept the risk. 

Answer: