Act now and download your CompTIA CAS-002 test today! Do not waste time for the worthless CompTIA CAS-002 tutorials. Download Refresh CompTIA CompTIA Advanced Security Practitioner (CASP) exam with real questions and answers and begin to learn CompTIA CAS-002 with a classic professional.

Q171. - (Topic 2) 

A security administrator was recently hired in a start-up company to represent the interest of security and to assist the network team in improving security in the company. The programmers are not on good terms with the security team and do not want to be distracted with security issues while they are working on a major project. Which of the following is the BEST time to make them address security issues in the project? 

A. In the middle of the project 

B. At the end of the project 

C. At the inception of the project 

D. At the time they request 

Answer:


Q172. - (Topic 2) 

A security solutions architect has argued consistently to implement the most secure method of encrypting corporate messages. The solution has been derided as not being cost effective by other members of the IT department. The proposed solution uses symmetric keys to encrypt all messages and is very resistant to unauthorized decryption. The method also requires special handling and security for all key material that goes above and beyond most encryption systems. 

Which of the following is the solutions architect MOST likely trying to implement? 

A. One time pads 

B. PKI 

C. Quantum cryptography 

D. Digital rights management 

Answer:


Q173. - (Topic 5) 

A security administrator was recently hired in a start-up company to represent the interest of security and to assist the network team in improving security in the company. The sales team is continuously contacting the security administrator to answer security questions posed by potential customers/clients. Which of the following is the BEST strategy to minimize the frequency of these requests? 

A. Request the major stakeholder hire a security liaison to assist the sales team with security-related questions. 

B. Train the sales team about basic security, and make them aware of the security policies and procedures of the company. 

C. The job description of the security administrator is to assist the sales team; thus the process should not be changed. 

D. Compile a list of the questions, develop an FAQ on the website, and train the sales team about basic security concepts. 

Answer:


Q174. - (Topic 1) 

An external penetration tester compromised one of the client organization’s authentication servers and retrieved the password database. Which of the following methods allows the penetration tester to MOST efficiently use any obtained administrative credentials on the client organization’s other systems, without impacting the integrity of any of the systems? 

A. Use the pass the hash technique 

B. Use rainbow tables to crack the passwords 

C. Use the existing access to change the password 

D. Use social engineering to obtain the actual password 

Answer:


Q175. - (Topic 2) 

A company that must comply with regulations is searching for a laptop encryption product to use for its 40,000 end points. The product must meet regulations but also be flexible enough to minimize overhead and support in regards to password resets and lockouts. Which of the following implementations would BEST meet the needs? 

A. A partition-based software encryption product with a low-level boot protection and authentication 

B. A container-based encryption product that allows the end users to select which files to encrypt 

C. A full-disk hardware-based encryption product with a low-level boot protection and authentication 

D. A file-based encryption product using profiles to target areas on the file system to encrypt 

Answer:


Q176. - (Topic 2) 

The latest independent research shows that cyber attacks involving SCADA systems grew an average of 15% per year in each of the last four years, but that this year’s growth has slowed to around 7%. Over the same time period, the number of attacks against applications has decreased or stayed flat each year. At the start of the measure period, the incidence of PC boot loader or BIOS based attacks was negligible. Starting two years ago, the growth in the number of PC boot loader attacks has grown exponentially. Analysis of these trends would seem to suggest which of the following strategies should be employed? 

A. Spending on SCADA protections should stay steady; application control spending should increase substantially and spending on PC boot loader controls should increase substantially. 

B. Spending on SCADA security controls should stay steady; application control spending should decrease slightly and spending on PC boot loader protections should increase substantially. 

C. Spending all controls should increase by 15% to start; spending on application controls should be suspended, and PC boot loader protection research should increase by 100%. 

D. Spending on SCADA security controls should increase by 15%; application control spending should increase slightly, and spending on PC boot loader protections should remain steady. 

Answer:


Q177. - (Topic 3) 

Staff from the sales department have administrator rights to their corporate standard operating environment, and often connect their work laptop to customer networks when onsite during meetings and presentations. This increases the risk and likelihood of a security incident when the sales staff reconnects to the corporate LAN. Which of the following controls would BEST protect the corporate network? 

A. Implement a network access control (NAC) solution that assesses the posture of the laptop before granting network access. 

B. Use an independent consulting firm to provide regular network vulnerability assessments and biannually qualitative risk assessments. 

C. Provide sales staff with a separate laptop with no administrator access just for sales visits. 

D. Update the acceptable use policy and ensure sales staff read and acknowledge the policy. 

Answer:


Q178. - (Topic 2) 

A risk manager has decided to use likelihood and consequence to determine the risk of an event occurring to a company asset. Which of the following is a limitation of this approach to risk management? 

A. Subjective and based on an individual's experience. 

B. Requires a high degree of upfront work to gather environment details. 

C. Difficult to differentiate between high, medium, and low risks. 

D. Allows for cost and benefit analysis. 

E. Calculations can be extremely complex to manage. 

Answer:


Q179. - (Topic 2) 

A user is suspected of engaging in potentially illegal activities. Law enforcement has requested that the user continue to operate on the network as normal. However, they would like to have a copy of any communications from the user involving certain key terms. Additionally, the law enforcement agency has requested that the user's ongoing communication be retained in the user's account for future investigations. Which of the following will BEST meet the goals of law enforcement? 

A. Begin a chain-of-custody on for the user's communication. Next, place a legal hold on the user's email account. 

B. Perform an e-discover using the applicable search terms. Next, back up the user's email for a future investigation. 

C. Place a legal hold on the user's email account. Next, perform e-discovery searches to collect applicable emails. 

D. Perform a back up of the user's email account. Next, export the applicable emails that match the search terms. 

Answer:


Q180. - (Topic 3) 

Customer Need: 

“We need the system to produce a series of numbers with no discernible mathematical progression for use by our Java based, PKI-enabled, customer facing website.” 

Which of the following BEST restates the customer need? 

A. The system shall use a pseudo-random number generator seeded the same every time. 

B. The system shall generate a pseudo-random number upon invocation by the existing Java program. 

C. The system shall generate a truly random number based upon user PKI certificates. 

D. The system shall implement a pseudo-random number generator for use by corporate customers. 

Answer: