CAS-002 Latest Exam (Mar 2018)

[Free] 2018(Mar) EnsurePass Testinsides CompTIA CAS-002 Dumps with VCE and PDF 251-260

April 14, 2018 : Ensure you pass the IT Exams
2018 Mar CompTIA Official New Released CAS-002
100% Free Download! 100% Pass Guaranteed!

CompTIA Advanced Security Practitioner (CASP)

Question No: 251 – (Topic 3)

The security administrator at a company has received a subpoena for the release of all the email received and sent by the company Chief Information Officer (CIO) for the past three years. The security administrator is only able to find one year’s worth of email records on the server and is now concerned about the possible legal implications of not complying with the request. Which of the following should the security administrator check BEFORE responding to the request?

  1. The company data privacy policies

  2. The company backup logs and archives

  3. The company data retention policies and guidelines

  4. The company data retention procedures

Answer: B

Question No: 252 – (Topic 3)

New zero-day attacks are announced on a regular basis against a broad range of technology systems. Which of the following best practices should a security manager do to

manage the risks of these attack vectors? (Select TWO).

  1. Establish an emergency response call tree.

  2. Create an inventory of applications.

  3. Backup the router and firewall configurations.

  4. Maintain a list of critical systems.

  5. Update all network diagrams.

Answer: B,D

Question No: 253 – (Topic 3)

An administrator is reviewing logs and sees the following entry:

Message: Access denied with code 403 (phase 2). Pattern match quot;\bunion\b.{1,100}?\bselect\bquot; at ARGS:$id. [data quot;union all selectquot;] [severity quot;CRITICALquot;] [tag quot;WEB_ATTACKquot;] [tag quot;WASCTC/WASC-19quot;] [tag quot;OWASP_TOP_10/A1quot;] [tag


Action: Intercepted (phase 2) Apache-Handler: php5-script Which of the following attacks was being attempted?

  1. Session hijacking

  2. Cross-site script

  3. SQL injection

  4. Buffer overflow

Answer: C

Question No: 254 – (Topic 3)

A security administrator is conducting network forensic analysis of a recent defacement of the company’s secure web payment server (HTTPS). The server was compromised around the New Year’s holiday when all the company employees were off. The company’s network diagram is summarized below:

The security administrator discovers that all the local web server logs have been deleted. Additionally, the Internal Firewall logs are intact but show no activity from the internal

network to the web server farm during the holiday. Which of the following is true?

  1. The security administrator should review the IDS logs to determine the source of the attack and the attack vector used to compromise the web server.

  2. The security administrator must correlate the external firewall logs with the intrusion detection system logs to determine what specific attack led to the web server compromise.

  3. The security administrator must reconfigure the network and place the IDS between the SSL accelerator and the server farm to be able to determine the cause of future attacks.

  4. The security administrator must correlate logs from all the devices in the network diagram to determine what specific attack led to the web server compromise.

Answer: C

Question No: 255 – (Topic 3)

A team is established to create a secure connection between software packages in order to list employee#39;s remaining or unused benefits on their paycheck stubs. Which of the following business roles would be MOST effective on this team?

  1. Network Administrator, Database Administrator, Programmers

  2. Network Administrator, Emergency Response Team, Human Resources

  3. Finance Officer, Human Resources, Security Administrator

  4. Database Administrator, Facilities Manager, Physical Security Manager

Answer: C

Question No: 256 – (Topic 3)

Company A has a remote work force that often includes independent contractors and out of state full time employees.

Company A#39;s security engineer has been asked to implement a solution allowing these users to collaborate on projects with the following goals:

Which of the following solutions should the security engineer recommend to meet the MOST goals?

  1. Create an SSL reverse proxy to a collaboration workspace. Use remote installation service to maintain application version. Have users use full desktop encryption. Schedule server downtime from 12:00 to 1:00 PM.

  2. Install an SSL VPN to Company A#39;s datacenter, have users connect to a standard virtual workstation image, set workstation time of day restrictions.

  3. Create an extranet web portal using third party web based office applications. Ensure that Company A maintains the administrative access.

  4. Schedule server downtime from 12:00 to 1:00 PM, implement a Terminal Server Gateway, use remote installation services to standardize application on user’s laptops.

Answer: B

Question No: 257 – (Topic 3)

An administrator is notified that contract workers will be onsite assisting with a new project. The administrator wants each worker to be aware of the corporate policy pertaining to USB storage devices. Which of the following should each worker review and understand before beginning work?

  1. Interconnection Security Agreement

  2. Memorandum of Understanding

  3. Business Partnership Agreement

  4. Non-Disclosure Agreement

Answer: C

Question No: 258 – (Topic 3)

A health service provider is considering the impact of allowing doctors and nurses access to the internal email system from their personal smartphones. The Information Security Officer (ISO) has received a technical document from the security administrator explaining that the current email system is capable of enforcing security policies to personal smartphones, including screen lockout and mandatory PINs. Additionally, the system is able to remotely wipe a phone if reported lost or stolen. Which of the following should the Information Security Officer be MOST concerned with based on this scenario? (Select THREE).

  1. The email system may become unavailable due to overload.

  2. Compliance may not be supported by all smartphones.

  3. Equipment loss, theft, and data leakage.

  4. Smartphone radios can interfere with health equipment.

  5. Data usage cost could significantly increase.

  6. Not all smartphones natively support encryption.

  7. Smartphones may be used as rogue access points.

Answer: B,C,F

Question No: 259 – (Topic 3)

In single sign-on, the secondary domain needs to trust the primary domain to do which of the following? (Select TWO).

  1. Correctly assert the identity and authorization credentials of the end user.

  2. Correctly assert the authentication and authorization credentials of the end user.

  3. Protect the authentication credentials used to verify the end user identity to the secondary domain for unauthorized use.

  4. Protect the authentication credentials used to verify the end user identity to the secondary domain for authorized use.

  5. Protect the accounting credentials used to verify the end user identity to the secondary domain for unauthorized use.

  6. Correctly assert the identity and authentication credentials of the end user.

Answer: D,F

Question No: 260 – (Topic 3)

A company is preparing to upgrade its NIPS at five locations around the world. The three platforms the team plans to test, claims to have the most advanced features and lucrative pricing.

Assuming all platforms meet the functionality requirements, which of the following methods should be used to select the BEST platform?

  1. Establish return on investment as the main criteria for selection.

  2. Run a cost/benefit analysis based on the data received from the RFP.

  3. Evaluate each platform based on the total cost of ownership.

  4. Develop a service level agreement to ensure the selected NIPS meets all performance requirements.

Answer: C

100% Ensurepass Free Download!
Download Free Demo:CAS-002 Demo PDF
100% Ensurepass Free Guaranteed!
CAS-002 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No