Exam Code: CAS-002 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Advanced Security Practitioner (CASP)
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass CAS-002 Exam.

Q11. - (Topic 3) 

A small customer focused bank with implemented least privilege principles, is concerned about the possibility of branch staff unintentionally aiding fraud in their day to day interactions with customers. Bank staff has been encouraged to build friendships with customers to make the banking experience feel more personal. The security and risk team have decided that a policy needs to be implemented across all branches to address the risk. Which of the following BEST addresses the security and risk team’s concerns? 

A. Information disclosure policy 

B. Awareness training 

C. Job rotation 

D. Separation of duties 


Q12. - (Topic 3) 

An organization has had six security incidents over the past year against their main web application. Each time the organization was able to determine the cause of the incident and restore operations within a few hours to a few days. Which of the following provides the MOST comprehensive method for reducing the time to recover? 

A. Create security metrics that provide information on response times and requirements to determine the best place to focus time and money. 

B. Conduct a loss analysis to determine which systems to focus time and money towards increasing security. 

C. Implement a knowledge management process accessible to the help desk and finance departments to estimate cost and prioritize remediation. 

D. Develop an incident response team, require training for incident remediation, and provide incident reporting and tracking metrics. 


Q13. - (Topic 1) 

Which of the following provides the BEST risk calculation methodology? 

A. Annual Loss Expectancy (ALE) x Value of Asset 

B. Potential Loss x Event Probability x Control Failure Probability 

C. Impact x Threat x Vulnerability 

D. Risk Likelihood x Annual Loss Expectancy (ALE) 


Q14. - (Topic 3) 

A Physical Security Manager is ready to replace all 50 analog surveillance cameras with IP cameras with built-in web management. The Security Manager has several security guard desks on different networks that must be able to view the cameras without unauthorized people viewing the video as well. The selected IP camera vendor does not have the ability to authenticate users at the camera level. Which of the following should the Security Manager suggest to BEST secure this environment? 

A. Create an IP camera network and deploy NIPS to prevent unauthorized access. 

B. Create an IP camera network and only allow SSL access to the cameras. 

C. Create an IP camera network and deploy a proxy to authenticate users prior to accessing the cameras. 

D. Create an IP camera network and restrict access to cameras from a single management host. 


Q15. - (Topic 3) 

Company A has a remote work force that often includes independent contractors and out of state full time employees. 

Company A's security engineer has been asked to implement a solution allowing these users to collaborate on projects with the following goals: 

Which of the following solutions should the security engineer recommend to meet the MOST goals? 

A. Create an SSL reverse proxy to a collaboration workspace. Use remote installation service to maintain application version. Have users use full desktop encryption. Schedule server downtime from 12:00 to 1:00 PM. 

B. Install an SSL VPN to Company A's datacenter, have users connect to a standard virtual workstation image, set workstation time of day restrictions. 

C. Create an extranet web portal using third party web based office applications. Ensure that Company A maintains the administrative access. 

D. Schedule server downtime from 12:00 to 1:00 PM, implement a Terminal Server 

Gateway, use remote installation services to standardize application on user’s laptops. 


Q16. - (Topic 4) 

The Universal Research Association has just been acquired by the Association of Medical Business Researchers. The new conglomerate has funds to upgrade or replace hardware as part of the acquisition, but cannot fund labor for major software projects. Which of the following will MOST likely result in some IT resources not being integrated? 

A. One of the companies may use an outdated VDI. 

B. Corporate websites may be optimized for different web browsers. 

C. Industry security standards and regulations may be in conflict. 

D. Data loss prevention standards in one company may be less stringent. 


Q17. - (Topic 3) 

An intrusion detection system logged an attack attempt from a remote IP address. One week later, the attacker successfully compromised the network. Which of the following MOST likely occurred? 

A. The IDS generated too many false negatives. 

B. The attack occurred after hours. 

C. The IDS generated too many false positives. 

D. No one was reviewing the IDS event logs. 


Q18. - (Topic 3) 

An administrator receives reports that the network is running slow for users connected to a certain switch. Viewing the network traffic, the administrator reviews the following: 

18:51:59.042108 IP linuxwksta.55467 > dns.company.com.domain: 39462+ PTR? (42) 

18:51:59.055732 IP dns.company.com.domain > linuxwksta.55467: 39462 NXDomain 0/0/0 (42) 

18:51:59.055842 IP linuxwksta.48287 > dns.company.com.domain: 46767+ PTR? (42) 

18:51:59.069816 IP dns.company.com.domain > linuxwksta.48287: 46767 NXDomain 0/0/0 (42) 

18:51:59.159060 IP linuxwksta.42491 > Flags [P.], seq 1989625106:1989625154, ack 2067334822, win 1525, options [nop,nop,TS val 16021424 ecr 215646227], length 48 

18:51:59.159145 IP linuxwksta.48854 > dns.company.com.domain: 3834+ PTR? (41) 

18:51:59.159314 IP > linuxwksta.42491: Flags [P.], seq 1:49, ack 48, win 124, options [nop,nop,TS val 215647479 ecr 16021424], length 48 

18:51:59.159330 IP linuxwksta.42491 > Flags [.], ack 49, win 1525, options [nop,nop,TS val 16021424 ecr 215647479], length 0 

18:51:59.165342 IP dns.company.com.domain > linuxwksta.48854: 3834 NXDomain 0/0/0 


18:51:59.397461 ARP, Request who-has tell, length 46 

18:51:59.397597 IP linuxwksta.37684 > dns.company.com.domain: 15022+ PTR? (41) 

Given the traffic report, which of the following is MOST likely causing the slow traffic? 

A. DNS poisoning 

B. Improper network zoning 

C. ARP poisoning 

D. Improper LUN masking 


Q19. - (Topic 1) 

A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important? 

A. Insecure direct object references, CSRF, Smurf 

B. Privilege escalation, Application DoS, Buffer overflow 

C. SQL injection, Resource exhaustion, Privilege escalation 

D. CSRF, Fault injection, Memory leaks 


Q20. - (Topic 4) 

select id, firstname, lastname from authors User input= firstname= Hack;man lastname=Johnson Which of the following types of attacks is the user attempting? 

A. XML injection 

B. Command injection 

C. Cross-site scripting 

D. SQL injection