CAS-002 Latest Exam (Mar 2018)

[Free] 2018(Mar) EnsurePass Testinsides CompTIA CAS-002 Dumps with VCE and PDF 161-170

April 14, 2018 : Ensure you pass the IT Exams
2018 Mar CompTIA Official New Released CAS-002
100% Free Download! 100% Pass Guaranteed!

CompTIA Advanced Security Practitioner (CASP)

Question No: 161 – (Topic 2)

ABC Corporation has introduced token-based authentication to system administrators due to the risk of password compromise. The tokens have a set of HMAC counter-based codes and are valid until they are used. Which of the following types of authentication mechanisms does this statement describe?

  1. TOTP

  2. PAP

  3. CHAP

  4. HOTP

    Answer: D

    Question No: 162 DRAG DROP – (Topic 2)

    Company A has experienced external attacks on their network and wants to minimize the attacks from reoccurring. Modify the network diagram to prevent SQL injections, XSS attacks, smurf attacks, e-mail spam, downloaded malware, viruses and ping attacks. The company can spend a MAXIMUM of $50,000 USD. A cost list for each item is listed below:

    1. Anti-Virus Server – $10,000

    2. Firewall-$15,000

    3. Load Balanced Server – $10,000 4. NIDS/NIPS-$10,000

  1. Packet Analyzer – $5,000

  2. Patch Server-$15,000

  3. Proxy Server-$20,000 8. Router-$10,000

  1. Spam Filter-$5,000

  2. Traffic Shaper – $20,000

  3. Web Application Firewall – $10,000

Instructions: Not all placeholders in the diagram need to be filled and items can only be used once. If you place an object on the network diagram, you can remove it by clicking the

(x) in the upper right-hand of the object.

Ensurepass 2018 PDF and VCE


Ensurepass 2018 PDF and VCE

Question No: 163 – (Topic 2)

A company that must comply with regulations is searching for a laptop encryption product to use for its 40,000 end points. The product must meet regulations but also be flexible enough to minimize overhead and support in regards to password resets and lockouts.

Which of the following implementations would BEST meet the needs?

  1. A partition-based software encryption product with a low-level boot protection and authentication

  2. A container-based encryption product that allows the end users to select which files to encrypt

  3. A full-disk hardware-based encryption product with a low-level boot protection and authentication

  4. A file-based encryption product using profiles to target areas on the file system to encrypt

Answer: D

Question No: 164 – (Topic 2)

A project manager working for a large city government is required to plan and build a WAN, which will be required to host official business and public access. It is also anticipated that the city’s emergency and first response communication systems will be required to operate across the same network. The project manager has experience with enterprise IT projects, but feels this project has an increased complexity as a result of the mixed business / public use and the critical infrastructure it will provide. Which of the following should the project manager release to the public, academia, and private industry to ensure the city provides due care in considering all project factors prior to building its new WAN?

  1. NDA

  2. RFI

  3. RFP

  4. RFQ

Answer: B

Question No: 165 – (Topic 2)

A pentester must attempt to crack passwords on a windows domain that enforces strong complex passwords. Which of the following would crack the MOST passwords in the shortest time period?

  1. Online password testing

  2. Rainbow tables attack

  3. Dictionary attack

  4. Brute force attack

Answer: B

Question No: 166 – (Topic 2)

Company policy requires that all unsupported operating systems be removed from the network. The security administrator is using a combination of network based tools to identify such systems for the purpose of disconnecting them from the network. Which of the following tools, or outputs from the tools in use, can be used to help the security administrator make an approximate determination of the operating system in use on the local company network? (Select THREE).

  1. Passive banner grabbing

  2. Password cracker


=packet captureamp;cookie=wokdjwalkjcnie61lkasdf2aliser4

  1. 443/tcp open http

  2. dig

  3. 09:18:16.262743 IP (tos 0x0, ttl 64, id 9870, offset 0, flags [none], proto TCP (6), length 40) gt; Flags [none], cksum 0x1800 (correct), win 512, length 0

  4. Nmap

Answer: A,F,G

Question No: 167 – (Topic 2)

An investigator wants to collect the most volatile data first in an incident to preserve the data that runs the highest risk of being lost. After memory, which of the following BEST represents the remaining order of volatility that the investigator should follow?

  1. File system information, swap files, network processes, system processes and raw disk blocks.

  2. Raw disk blocks, network processes, system processes, swap files and file system information.

  3. System processes, network processes, file system information, swap files and raw disk blocks.

  4. Raw disk blocks, swap files, network processes, system processes, and file system information.

Answer: C

Question No: 168 – (Topic 2)

An organization uses IP address block on its internal network. At the border router, the network administrator sets up rules to deny packets with a source address in this subnet from entering the network, and to deny packets with a destination address in this subnet from leaving the network. Which of the following is the administrator attempting to prevent?

  1. BGP route hijacking attacks

  2. Bogon IP network traffic

  3. IP spoofing attacks

  4. Man-in-the-middle attacks

  5. Amplified DDoS attacks

Answer: C

Question No: 169 – (Topic 2)

Since the implementation of IPv6 on the company network, the security administrator has been unable to identify the users associated with certain devices utilizing IPv6 addresses, even when the devices are centrally managed.


ether f8:1e:af:ab:10:a3

inet6 fw80::fa1e:dfff:fee6:9d8%en1 prefixlen 64 scopeid 0x5 inet netmask 0xffffff00 broadcast inet6 2001:200:5:922:1035:dfff:fee6:9dfe prefixlen 64 autoconf

inet6 2001:200:5:922:10ab:5e21:aa9a:6393 prefixlen 64 autoconf temporary nd6 options=1lt;PERFORMNUDgt;

media: autoselect status: active

Given this output, which of the following protocols is in use by the company and what can the system administrator do to positively map users with IPv6 addresses in the future? (Select TWO).

  1. The devices use EUI-64 format

  2. The routers implement NDP

  3. The network implements 6to4 tunneling

  4. The router IPv6 advertisement has been disabled

  5. The administrator must disable IPv6 tunneling

  6. The administrator must disable the mobile IPv6 router flag

  7. The administrator must disable the IPv6 privacy extensions

  8. The administrator must disable DHCPv6 option code 1

Answer: B,G

Question No: 170 – (Topic 2)

The risk manager at a small bank wants to use quantitative analysis to determine the ALE of running a business system at a location which is subject to fires during the year. A risk analyst reports to the risk manager that the asset value of the business system is $120,000 and, based on industry data, the exposure factor to fires is only 20% due to the fire suppression system installed at the site. Fires occur in the area on average every four years. Which of the following is the ALE?

A. $6,000 B. $24,000 C. $30,000 D. $96,000

Answer: A

100% Ensurepass Free Download!
Download Free Demo:CAS-002 Demo PDF
100% Ensurepass Free Guaranteed!
CAS-002 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No