Download of CAS-002 exam price materials and testing bible for CompTIA certification for IT specialist, Real Success Guaranteed with Updated CAS-002 pdf dumps vce Materials. 100% PASS CompTIA Advanced Security Practitioner (CASP) exam Today!

Q31. - (Topic 5) 

A security manager has received the following email from the Chief Financial Officer (CFO): 

“While I am concerned about the security of the proprietary financial data in our ERP application, we have had a lot of turnover in the accounting group and I am having a difficult time meeting our monthly performance targets. As things currently stand, we do not allow employees to work from home but this is something I am willing to allow so we can get back on track. What should we do first to securely enable this capability for my group?” 

Based on the information provided, which of the following would be the MOST appropriate response to the CFO? 

A. Remote access to the ERP tool introduces additional security vulnerabilities and should not be allowed. 

B. Allow VNC access to corporate desktops from personal computers for the users working from home. 

C. Allow terminal services access from personal computers after the CFO provides a list of the users working from home. 

D. Work with the executive management team to revise policies before allowing any remote access. 

Answer:


Q32. - (Topic 2) 

A pentester must attempt to crack passwords on a windows domain that enforces strong complex passwords. Which of the following would crack the MOST passwords in the shortest time period? 

A. Online password testing 

B. Rainbow tables attack 

C. Dictionary attack 

D. Brute force attack 

Answer:


Q33. - (Topic 3) 

A Physical Security Manager is ready to replace all 50 analog surveillance cameras with IP cameras with built-in web management. The Security Manager has several security guard desks on different networks that must be able to view the cameras without unauthorized people viewing the video as well. The selected IP camera vendor does not have the ability to authenticate users at the camera level. Which of the following should the Security Manager suggest to BEST secure this environment? 

A. Create an IP camera network and deploy NIPS to prevent unauthorized access. 

B. Create an IP camera network and only allow SSL access to the cameras. 

C. Create an IP camera network and deploy a proxy to authenticate users prior to accessing the cameras. 

D. Create an IP camera network and restrict access to cameras from a single management host. 

Answer:


Q34. - (Topic 5) 

The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality. Which of the following equipment MUST be deployed to guard against unknown threats? 

A. Cloud-based antivirus solution, running as local admin, with push technology for definition updates. 

B. Implementation of an offsite data center hosting all company data, as well as deployment of VDI for all client computing needs. 

C. Host based heuristic IPS, segregated on a management VLAN, with direct control of the perimeter firewall ACLs. 

D. Behavior based IPS with a communication link to a cloud based vulnerability and threat feed. 

Answer:


Q35. - (Topic 3) 

A data processing server uses a Linux based file system to remotely mount physical disks on a shared SAN. The server administrator reports problems related to processing of files where the file appears to be incompletely written to the disk. The network administration team has conducted a thorough review of all network infrastructure and devices and found everything running at optimal performance. Other SAN customers are unaffected. The data being processed consists of millions of small files being written to disk from a network source one file at a time. These files are then accessed by a local Java program for processing before being transferred over the network to a SE Linux host for processing. Which of the following is the MOST likely cause of the processing problem? 

A. The administrator has a PERL script running which disrupts the NIC by restarting the CRON process every 65 seconds. 

B. The Java developers accounted for network latency only for the read portion of the processing and not the write process. 

C. The virtual file system on the SAN is experiencing a race condition between the reads and writes of network files. 

D. The Linux file system in use cannot write files as fast as they can be read by the Java program resulting in the errors. 

Answer:


Q36. - (Topic 3) 

A data breach has occurred at Company A and as a result, the Chief Information Officer (CIO) has resigned. The CIO's laptop, cell phone and PC were all wiped of data per company policy. A month later, prosecutors in litigation with Company A suspect the CIO knew about the data breach long before it was discovered and have issued a subpoena requesting all the CIO's email from the last 12 months. The corporate retention policy recommends keeping data for no longer than 90 days. Which of the following should occur? 

A. Restore the CIO's email from an email server backup and provide the last 90 days from the date of the subpoena request. 

B. Inform the litigators that the CIOs information has been deleted as per corporate policy. 

C. Restore the CIO's email from an email server backup and provide the last 90 days from the date of the CIO resignation. 

D. Restore the CIO's email from an email server backup and provide whatever is available up to the last 12 months from the subpoena date. 

Answer:


Q37. - (Topic 4) 

An administrator attempts to install the package "named.9.3.6-12-x86_64.rpm" on a server. Even though the package was downloaded from the official repository, the server states the package cannot be installed because no GPG key is found. Which of the following should the administrator perform to allow the program to be installed? 

A. Download the file from the program publisher's website. 

B. Generate RSA and DSA keys using GPG. 

C. Import the repository's public key. 

D. Run sha1sum and verify the hash. 

Answer:


Q38. - (Topic 3) 

The security administrator at a company has received a subpoena for the release of all the email received and sent by the company Chief Information Officer (CIO) for the past three years. The security administrator is only able to find one year’s worth of email records on the server and is now concerned about the possible legal implications of not complying with the request. Which of the following should the security administrator check BEFORE responding to the request? 

A. The company data privacy policies 

B. The company backup logs and archives 

C. The company data retention policies and guidelines 

D. The company data retention procedures 

Answer:


Q39. - (Topic 2) 

ABC Corporation uses multiple security zones to protect systems and information, and all of the VM hosts are part of a consolidated VM infrastructure. Each zone has different VM administrators. Which of the following restricts different zone administrators from directly accessing the console of a VM host from another zone? 

A. Ensure hypervisor layer firewalling between all VM hosts regardless of security zone. 

B. Maintain a separate virtual switch for each security zone and ensure VM hosts bind to only the correct virtual NIC(s). 

C. Organize VM hosts into containers based on security zone and restrict access using an ACL. 

D. Require multi-factor authentication when accessing the console at the physical VM host. 

Answer:


Q40. - (Topic 3) 

A hosting company provides inexpensive guest virtual machines to low-margin customers. Customers manage their own guest virtual machines. Some customers want basic guarantees of logical separation from other customers and it has been indicated that some customers would like to have configuration control of this separation; whereas others want this provided as a value-added service by the hosting company. Which of the following BEST meets these requirements? 

A. The hosting company should install a hypervisor-based firewall and allow customers to manage this on an as-needed basis. 

B. The hosting company should manage the hypervisor-based firewall; while allowing customers to configure their own host-based firewall. 

C. Customers should purchase physical firewalls to protect their guest hosts and have the hosting company manage these if requested. 

D. The hosting company should install a host-based firewall on customer guest hosts and offer to administer host firewalls for customers if requested. 

Answer: