It is more faster and easier to pass the CompTIA CAS-002 exam by using Pinpoint CompTIA CompTIA Advanced Security Practitioner (CASP) questuins and answers. Immediate access to the Update CAS-002 Exam and find the same core area CAS-002 questions with professionally verified answers, then PASS your exam with a high score now.

Q141. - (Topic 4) 

Two storage administrators are discussing which SAN configurations will offer the MOST confidentiality. Which of the following configurations would the administrators use? (Select TWO). 

A. Deduplication 

B. Zoning 

C. Snapshots 

D. Multipathing 

E. LUN masking 

Answer: B,E 


Q142. - (Topic 5) 

An extensible commercial software system was upgraded to the next minor release version to patch a security vulnerability. After the upgrade, an unauthorized intrusion into the system was detected. The software vendor is called in to troubleshoot the issue and reports that all core components were updated properly. Which of the following has been overlooked in securing the system? (Select TWO). 

A. The company’s IDS signatures were not updated. 

B. The company’s custom code was not patched. 

C. The patch caused the system to revert to http. 

D. The software patch was not cryptographically signed. 

E. The wrong version of the patch was used. 

F. Third-party plug-ins were not patched. 

Answer: B,F 


Q143. - (Topic 3) 

A financial company implements end-to-end encryption via SSL in the DMZ, and only IPSec in transport mode with AH enabled and ESP disabled throughout the internal network. The company has hired a security consultant to analyze the network infrastructure and provide a solution for intrusion prevention. Which of the following recommendations should the consultant provide to the security administrator? 

A. Switch to TLS in the DMZ. Implement NIPS on the internal network, and HIPS on the DMZ. 

B. Switch IPSec to tunnel mode. Implement HIPS on the internal network, and NIPS on the DMZ. 

C. Disable AH. Enable ESP on the internal network, and use NIPS on both networks. 

D. Enable ESP on the internal network, and place NIPS on both networks. 

Answer:


Q144. - (Topic 5) 

The Chief Risk Officer (CRO) has requested that the MTD, RTO and RPO for key business applications be identified and documented. Which of the following business documents would MOST likely contain the required values? 

A. MOU 

B. BPA 

C. RA 

D. SLA 

E. BIA 

Answer:


Q145. - (Topic 4) 

A security code reviewer has been engaged to manually review a legacy application. A number of systemic issues have been uncovered relating to buffer overflows and format string vulnerabilities. 

The reviewer has advised that future software projects utilize managed code platforms if at all possible. 

Which of the following languages would suit this recommendation? (Select TWO). 

A. C 

B. C# 

C. C++ 

D. Perl 

E. Java 

Answer: B,E 


Q146. CORRECT TEXT - (Topic 2) 

An administrator wants to install a patch to an application. Given the scenario, download, verify and install the patch in the most secure manner. 

Instructions: The last install that is completed will be the final submission. 

Answer: Please check the explanation part for full details on solution. 


Q147. - (Topic 1) 

After being notified of an issue with the online shopping cart, where customers are able to arbitrarily change the price of listed items, a programmer analyzes the following piece of code used by a web based shopping cart. 

SELECT ITEM FROM CART WHERE ITEM=ADDSLASHES($USERINPUT); 

The programmer found that every time a user adds an item to the cart, a temporary file is created on the web server /tmp directory. The temporary file has a name which is generated by concatenating the content of the $USERINPUT variable and a timestamp in the form of MM-DD-YYYY, (e.g. smartphone-12-25-2013.tmp) containing the price of the item being purchased. Which of the following is MOST likely being exploited to manipulate the price of a shopping cart’s items? 

A. Input validation 

B. SQL injection 

C. TOCTOU 

D. Session hijacking 

Answer:


Q148. - (Topic 4) 

Which of the following BEST describes the implications of placing an IDS device inside or outside of the corporate firewall? 

A. Placing the IDS device inside the firewall will allow it to monitor potential internal attacks but may increase the load on the system. 

B. Placing the IDS device outside the firewall will allow it to monitor potential remote attacks while still allowing the firewall to block the attack. 

C. Placing the IDS device inside the firewall will allow it to monitor potential remote attacks but may increase the load on the system. 

D. Placing the IDS device outside the firewall will allow it to monitor potential remote attacks but the firewall will not be able to block the attacks. 

Answer:


Q149. - (Topic 2) 

An organization has several production critical SCADA supervisory systems that cannot follow the normal 30-day patching policy. Which of the following BEST maximizes the protection of these systems from malicious software? 

A. Configure a firewall with deep packet inspection that restricts traffic to the systems 

B. Configure a separate zone for the systems and restrict access to known ports 

C. Configure the systems to ensure only necessary applications are able to run 

D. Configure the host firewall to ensure only the necessary applications have listening ports 

Answer:


Q150. - (Topic 1) 

The helpdesk manager wants to find a solution that will enable the helpdesk staff to better serve company employees who call with computer-related problems. The helpdesk staff is currently unable to perform effective troubleshooting and relies on callers to describe their technology problems. Given that the helpdesk staff is located within the company headquarters and 90% of the callers are telecommuters, which of the following tools should the helpdesk manager use to make the staff more effective at troubleshooting while at the same time reducing company costs? (Select TWO). 

A. Web cameras 

B. Email 

C. Instant messaging 

D. BYOD 

E. Desktop sharing 

F. Presence 

Answer: C,E