★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW CAS-002 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/CAS-002-dumps.html


By just as a possible CompTIA Credentialed a single shows a single comprehends huge choice associated with competencies essental to CompTIA professionals while in the decided on employment purpose. A great CompTIA CAS-002 was in sought after demand in this sector. A great CAS-002 CompTIA elevates ones presence together with boosts the means to access a industrys most challenging opportunities. This need for professionals while in the i . t . (The item) industry is substantial, and also the level of competition for job opportunities is strong.

2021 Sep comptia casp cas-002 pdf:

Q181. - (Topic 1) 

A penetration tester is assessing a mobile banking application. Man-in-the-middle attempts via a HTTP intercepting proxy are failing with SSL errors. Which of the following controls has likely been implemented by the developers? 

A. SSL certificate revocation 

B. SSL certificate pinning 

C. Mobile device root-kit detection 

D. Extended Validation certificates 

Answer: B 


Q182. - (Topic 4) 

A business owner has raised concerns with the Chief Information Security Officer (CISO) because money has been spent on IT security infrastructure, but corporate assets are still found to be vulnerable. The business recently implemented a patch management product and SOE hardening initiative. A third party auditor reported findings against the business because some systems were missing patches. Which of the following statements BEST describes this situation? 

A. The business owner is at fault because they are responsible for patching the systems and have already been given patch management and SOE hardening products. 

B. The audit findings are invalid because remedial steps have already been applied to patch servers and the remediation takes time to complete. 

C. The CISO has not selected the correct controls and the audit findings should be assigned to them instead of the business owner. 

D. Security controls are generally never 100% effective and gaps should be explained to stakeholders and managed accordingly. 

Answer: D 


Q183. - (Topic 3) 

A corporation has Research and Development (R&D) and IT support teams, each requiring separate networks with independent control of their security boundaries to support department objectives. The corporation’s Information Security Officer (ISO) is responsible for providing firewall services to both departments, but does not want to increase the hardware footprint within the datacenter. Which of the following should the ISO consider to provide the independent functionality required by each department’s IT teams? 

A. Put both departments behind the firewall and assign administrative control for each department to the corporate firewall. 

B. Provide each department with a virtual firewall and assign administrative control to the physical firewall. 

C. Put both departments behind the firewall and incorporate restrictive controls on each department’s network. 

CompTIA CAS-002 : Practice Test 

D. Provide each department with a virtual firewall and assign appropriate levels of management for the virtual device. 

Answer: D 


Q184. - (Topic 1) 

A new web based application has been developed and deployed in production. A security engineer decides to use an HTTP interceptor for testing the application. Which of the following problems would MOST likely be uncovered by this tool? 

A. The tool could show that input validation was only enabled on the client side 

B. The tool could enumerate backend SQL database table and column names 

C. The tool could force HTTP methods such as DELETE that the server has denied 

D. The tool could fuzz the application to determine where memory leaks occur 

Answer: A 


Q185. - (Topic 1) 

A systems administrator establishes a CIFS share on a UNIX device to share data to 

Windows systems. The security authentication on the Windows domain is set to the highest level. Windows users are stating that they cannot authenticate to the UNIX share. Which of the following settings on the UNIX server would correct this problem? 

A. Refuse LM and only accept NTLMv2 

B. Accept only LM 

C. Refuse NTLMv2 and accept LM 

D. Accept only NTLM 

Answer: A 


CAS-002 test questions

Up to the immediate present comptia casp cas-002 pdf:

Q186. - (Topic 1) 

A security manager for a service provider has approved two vendors for connections to the 

service provider backbone. One vendor will be providing authentication services for its payment card service, and the other vendor will be providing maintenance to the service provider infrastructure sites. Which of the following business agreements is MOST relevant to the vendors and service provider’s relationship? 

A. Memorandum of Agreement 

B. Interconnection Security Agreement 

C. Non-Disclosure Agreement 

D. Operating Level Agreement 

Answer: B 


Q187. - (Topic 1) 

The technology steering committee is struggling with increased requirements stemming from an increase in telecommuting. The organization has not addressed telecommuting in the past. The implementation of a new SSL-VPN and a VOIP phone solution enables personnel to work from remote locations with corporate assets. Which of the following steps must the committee take FIRST to outline senior management’s directives? 

A. Develop an information classification scheme that will properly secure data on corporate systems. 

B. Implement database views and constrained interfaces so remote users will be unable to access PII from personal equipment. 

C. Publish a policy that addresses the security requirements for working remotely with company equipment. 

D. Work with mid-level managers to identify and document the proper procedures for telecommuting. 

Answer: C 


Q188. - (Topic 3) 

A WAF without customization will protect the infrastructure from which of the following attack combinations? 

A. DDoS, DNS poisoning, Boink, Teardrop 

B. Reflective XSS, HTTP exhaustion, Teardrop 

C. SQL Injection, DOM based XSS, HTTP exhaustion 

D. SQL Injection, CSRF, Clickjacking 

Answer: C 


Q189. - (Topic 4) 

Company XYZ plans to donate 1,000 used computers to a local school. The company has a large research and development section and some of the computers were previously used to store proprietary research. 

The security administrator is concerned about data remnants on the donated machines, but the company does not have a device sanitization section in the data handling policy. 

Which of the following is the BEST course of action for the security administrator to take? 

A. Delay the donation until a new policy is approved by the Chief Information Officer (CIO), and then donate the machines. 

B. Delay the donation until all storage media on the computers can be sanitized. 

C. Reload the machines with an open source operating system and then donate the machines. 

D. Move forward with the donation, but remove all software license keys from the machines. 

Answer: B 


Q190. - (Topic 1) 

An organization is selecting a SaaS provider to replace its legacy, in house Customer Resource Management (CRM) application. Which of the following ensures the organization mitigates the risk of managing separate user credentials? 

A. Ensure the SaaS provider supports dual factor authentication. 

B. Ensure the SaaS provider supports encrypted password transmission and storage. 

C. Ensure the SaaS provider supports secure hash file exchange. 

D. Ensure the SaaS provider supports role-based access control. 

E. Ensure the SaaS provider supports directory services federation. 

Answer: E