getcertified4sure.com

What Leading CAS-002 Is?




It is impossible to pass CompTIA CAS-002 exam without any help in the short term. Come to Certleader soon and find the most advanced, correct and guaranteed CompTIA CAS-002 practice questions. You will get a surprising result by our Renew CompTIA Advanced Security Practitioner (CASP) practice guides.

P.S. Refined CAS-002 paper are available on Google Drive, GET MORE: https://drive.google.com/open?id=1MWxVvRqKw5P-3mL6Zi7QlXk_26ObOJ_y


New CompTIA CAS-002 Exam Dumps Collection (Question 3 - Question 12)

Q3. Which of the following should be used to identify overflow vulnerabilities?

A. Fuzzing

B. Input validation

C. Privilege escalation

D. Secure coding standards

Answer: A



Q4. Company XYZ has had repeated vulnerability exploits of a critical nature released to the companyu2021s flagship product. The product is used by a number of large customers. At the Chief Information Security Officeru2021s (CISOu2021s) request, the product manager now has to budget for a team of security consultants to introduce major product security improvements.

Here is a list of improvements in order of priority:

1. A noticeable improvement in security posture immediately.

2. Fundamental changes to resolve systemic issues as an ongoing process

3. Improvements should be strategic as opposed to tactical

4. Customer impact should be minimized

Which of the following recommendations is BEST for the CISO to put forward to the product manager?

A. Patch the known issues and provide the patch to customers. Make a company announcement to customers on the main website to reduce the perceived exposure of the application to alleviate customer concerns. Engage penetration testers and code reviewers to perform an in-depth review of the product. Based on the findings, address the defects and re-test the findings to ensure that any defects have been resolved.

B. Patch the known issues and provide the patch to customers. Engage penetration testers and code reviewers to perform an in-depth review of the product. Based on the findings, address the defects and re-test the findings to ensure that the defects have been resolved. Introduce periodic code review and penetration testing of the product in question and consider including all relevant future projects going forward.

A. C. Patch the known issues and provide the patch to customers. Implement an SSDLC / SDL overlay on top of the SDLC. Train architects, designers, developers, testers and operators on security importance and ensure that security-relevant activities are performed within each of the SDLC phases. Use the product as the primary focal point to close out issues and consider using the SSDLC / SDL overlay for all relevant future projects.

D. Stop active support of the product. Bring forward end-of-life dates for the product so that it can be decommissioned. Start a new project to develop a replacement product and ensure that an SSDLC / SDL overlay on top of the SDLC is formed. Train BAs, architects, designers, developers, testers and operators on security importance and ensure that security-relevant activities are performed within each of the SDLC phases.

Answer: C



Q5. A storage as a service company implements both encryption at rest as well as encryption in transit of customersu2021 data. The security administrator is concerned with the overall security of the encrypted customer data stored by the company servers and wants the development team to implement a solution that will strengthen the customeru2021s encryption key. Which of the following, if implemented, will MOST increase the time an offline password attack against the customersu2021 data would take?

A. key = NULL ; for (int i=0; i<5000; i++) { key = sha(key + password) }

B. password = NULL ; for (int i=0; i<10000; i++) { password = sha256(key) }

C. password = password + sha(password+salt) + aes256(password+salt)

D. key = aes128(sha256(password), password))

Answer: A



Q6. In a SPML exchange, which of the following BEST describes the three primary roles?

A. The Provisioning Service Target (PST) entity makes the provisioning request, the Provisioning Service Provider (PSP) responds to the PST requests, and the Provisioning Service Target (PST) performs the provisioning.

B. The Provisioning Service Provider (PSP) entity makes the provisioning request, the Provisioning Service Target (PST) responds to the PSP requests, and the Provisioning Service Provider (PSP) performs the provisioning.

C. The Request Authority (RA) entity makes the provisioning request, the Provisioning Service Target (PST) responds to the RA requests, and the Provisioning Service Provider (PSP) performs the provisioning.

D. The Request Authority (RA) entity makes the provisioning request, the Provisioning Service Provider (PSP) responds to the RA requests, and the Provisioning Service Target (PST) performs the provisioning.

Answer: D



Q7. In a situation where data is to be recovered from an attackeru2021s location, which of the following are the FIRST things to capture? (Select TWO).

A. Removable media

B. Passwords written on scrap paper

C. Snapshots of data on the monitor

D. Documents on the printer

E. Volatile system memory

F. System hard drive

Answer: C,E



Q8. A Physical Security Manager is ready to replace all 50 analog surveillance cameras with IP cameras with built-in web management. The Security Manager has several security guard desks on different networks that must be able to view the cameras without unauthorized people viewing the video as well. The selected IP camera vendor does not have the ability to authenticate users at the camera level. Which of the following should the Security Manager suggest to BEST secure this environment?

A. Create an IP camera network and deploy NIPS to prevent unauthorized access.

B. Create an IP camera network and only allow SSL access to the cameras.

C. Create an IP camera network and deploy a proxy to authenticate users prior to accessing the cameras.

D. Create an IP camera network and restrict access to cameras from a single management host.

Answer: C



Q9. In an effort to reduce internal email administration costs, a company is determining whether to outsource its email to a managed service provider that provides email, spam, and malware protection. The security manager is asked to provide input regarding any security implications of this change.

Which of the following BEST addresses risks associated with disclosure of intellectual property?

A. Require the managed service provider to implement additional data separation.

B. Require encrypted communications when accessing email.

C. Enable data loss protection to minimize emailing PII and confidential data.

D. Establish an acceptable use policy and incident response policy.

Answer: C



Q10. The security administrator is responsible for the confidentiality of all corporate data. The companyu2021s servers are located in a datacenter run by a different vendor. The vendor datacenter hosts servers for many different clients, all of whom have access to the datacenter. None of the racks are physically secured. Recently, the company has been the victim of several attacks involving data injection and exfiltatration. The security administrator suspects these attacks are due to several new network based attacks facilitated by having physical access to a system. Which of the following BEST describes how to adapt to the threat?

A. Apply port security to all switches, switch to SCP, and implement IPSec tunnels between devices.

B. Apply two factor authentication, require point to point VPNs, and enable log auditing on all devices.

C. Apply port security to all routers, switch to telnet, and implement point to point VPNs on all servers.

D. Apply three factor authentication, implement IPSec, and enable SNMP.

Answer: A



Q11. A companyu2021s security policy states that its own internally developed proprietary Internet facing software must be resistant to web application attacks. Which of the following methods provides the MOST protection against unauthorized access to stored database information?

A. Require all development to follow secure coding practices.

B. Require client-side input filtering on all modifiable fields.

C. Escape character sequences at the application tier.

D. Deploy a WAF with application specific signatures.

Answer: A



Q12. A security services company is scoping a proposal with a client. They want to perform a general security audit of their environment within a two week period and consequently have the following requirements:

Requirement 1 u2013 Ensure their server infrastructure operating systems are at their latest patch levels

Requirement 2 u2013 Test the behavior between the application and database Requirement 3 u2013 Ensure that customer data can not be exfiltrated

Which of the following is the BEST solution to meet the above requirements?

A. Penetration test, perform social engineering and run a vulnerability scanner

B. Perform dynamic code analysis, penetration test and run a vulnerability scanner

C. Conduct network analysis, dynamic code analysis, and static code analysis

D. Run a protocol analyzer perform static code analysis and vulnerability assessment

Answer: B



100% Renew CompTIA CAS-002 Questions & Answers shared by Certifytools, Get HERE: https://www.certifytools.com/CAS-002-exam.html (New 532 Q&As)