CompTIA Advanced Security Practitioner (CASP)
Question No: 211 – (Topic 2)
An IT Manager is concerned about errors made during the deployment process for a new model of tablet. Which of the following would suggest best practices and configuration parameters that technicians could follow during the deployment process?
Question No: 212 – (Topic 2)
A security administrator is tasked with increasing the availability of the storage networks while enhancing the performance of existing applications. Which of the following technologies should the administrator implement to meet these goals? (Select TWO).
Dynamic disk pools
Question No: 213 – (Topic 2)
A Chief Information Security Officer (CISO) has requested that a SIEM solution be implemented. The CISO wants to know upfront what the projected TCO would be before looking further into this concern. Two vendor proposals have been received:
Bundled offering expected to be $100,000 per year.
Operational expenses for the pharmaceutical company to partner with the vendor are expected to be a 0.5 FTE per year.
Internal employee costs are averaged to be $80,000 per year per FTE. Based on calculating TCO of the two vendor proposals over a 5 year period, which of the following options is MOST accurate?
Based on cost alone, having an outsourced solution appears cheaper.
Based on cost alone, having an outsourced solution appears to be more expensive.
Based on cost alone, both outsourced an in-sourced solutions appear to be the same.
Based on cost alone, having a purchased product solution appears cheaper.
Question No: 214 – (Topic 2)
A medical device manufacturer has decided to work with another international organization to develop the software for a new robotic surgical platform to be introduced into hospitals within the next 12 months. In order to ensure a competitor does not become aware, management at the medical device manufacturer has decided to keep it secret until formal contracts are signed. Which of the following documents is MOST likely to contain a description of the initial terms and arrangement and is not legally enforceable?
Question No: 215 CORRECT TEXT – (Topic 2)
An administrator wants to install a patch to an application. Given the scenario, download, verify and install the patch in the most secure manner.
Instructions: The last install that is completed will be the final submission.
Answer: Please check the explanation part for full details on solution.
In this case the second link should be used (This may vary in actual exam). The first link showed the following error so it should not be used.
Also, Two of the link choices used HTTP and not HTTPS as shown when hovering over the links as shown:
Since we need to do this in the most secure manner possible, they should not be used.
Finally, the second link was used and the MD5 utility of MD5sum should be used on the install.exe file as shown. Make sure that the hash matches.
Finally, type in install.exe to install it and make sure there are no signature verification errors.
Question No: 216 – (Topic 2)
A risk manager has decided to use likelihood and consequence to determine the risk of an event occurring to a company asset. Which of the following is a limitation of this approach to risk management?
Subjective and based on an individual#39;s experience.
Requires a high degree of upfront work to gather environment details.
Difficult to differentiate between high, medium, and low risks.
Allows for cost and benefit analysis.
Calculations can be extremely complex to manage.
Question No: 217 – (Topic 2)
The IT Security Analyst for a small organization is working on a customer’s system and identifies a possible intrusion in a database that contains PII. Since PII is involved, the analyst wants to get the issue addressed as soon as possible. Which of the following is the FIRST step the analyst should take in mitigating the impact of the potential intrusion?
Contact the local authorities so an investigation can be started as quickly as possible.
Shut down the production network interfaces on the server and change all of the DBMS account passwords.
Disable the front-end web server and notify the customer by email to determine how the customer would like to proceed.
Refer the issue to management for handling according to the incident response process.
Question No: 218 – (Topic 2)
Using SSL, an administrator wishes to secure public facing server farms in three subdomains: dc1.east.company.com, dc2.central.company.com, and dc3.west.company.com. Which of the following is the number of wildcard SSL certificates that should be purchased?
Question No: 219 – (Topic 2)
A large company is preparing to merge with a smaller company. The smaller company has been very profitable, but the smaller company’s main applications were created in-house. Which of the following actions should the large company’s security administrator take in preparation for the merger?
A review of the mitigations implemented from the most recent audit findings of the smaller company should be performed.
An ROI calculation should be performed to determine which company#39;s application should be used.
A security assessment should be performed to establish the risks of integration or co- existence.
A regression test should be performed on the in-house software to determine security risks associated with the software.
Question No: 220 CORRECT TEXT – (Topic 2)
Compliance with company policy requires a quarterly review of firewall rules. A new administrator is asked to conduct this review on the internal firewall sitting between several Internal networks. The intent of this firewall is to make traffic more restrictive. Given the following information answer the questions below:
User Subnet: 192.168.1.0/24 Server Subnet: 192.168.2.0/24 Finance Subnet:192.168.3.0/24
Instructions: To perform the necessary tasks, please modify the DST port, Protocol, Action, and/or Rule Order columns. Firewall ACLs are read from the top down
Task 1) An administrator added a rule to allow their machine terminal server access to the server subnet. This rule is not working. Identify the rule and correct this issue.
Task 2) All web servers have been changed to communicate solely over SSL. Modify the appropriate rule to allow communications.
Task 3) An administrator added a rule to block access to the SQL server from anywhere on the network. This rule is not working. Identify and correct this issue.
Task 4) Other than allowing all hosts to do network time and SSL, modify a rule to ensure that no other traffic is allowed.
Answer: Please look into the explanation for the solution to this question.
Firewall rules should be re-arranged to look like this:
100% Free Download!
–Download Free Demo:CAS-002 Demo PDF
100% Pass Guaranteed!
–Download 2017 EnsurePass CAS-002 Full Exam PDF and VCE
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|