PrepAway - Latest Free Exam Questions & Answers

Category: CAS-002

Exam CAS-002 : CompTIA Advanced Security Practitioner

Which of the following business processes and/or practi…

A facilities manager has observed varying electric use on the company’s metered service lines. The facility management rarely interacts with the IT department
unless new equipment is being delivered. However, the facility manager thinks that there is a correlation between spikes in electric use and IT department activity.
Which of the following business processes and/or practices would provide better management of organizational resources with the IT department’s needs? (Select
TWO).

Which of the following values is the single loss expect…

An IT manager is concerned about the cost of implementing a web filtering solution in an effort to mitigate the risks associated with malware and resulting data
leakage. Given that the ARO is twice per year, the ALE resulting from a data leak is $25,000 and the ALE after implementing the web filter is $15,000. The web
filtering solution will cost the organization $10,000 per year. Which of the following values is the single loss expectancy of a data leakage event after implementing
the web filtering solution?

Which of the following should the project manager relea…

A project manager working for a large city government is required to plan and build a WAN, which will be required to host official business and public access. It is
also anticipated that the city’s emergency and first response communication systems will be required to operate across the same network. The project manager has
experience with enterprise IT projects, but feels this project has an increased complexity as a result of the mixed business / public use and the critical

infrastructure it will provide. Which of the following should the project manager release to the public, academia, and private industry to ensure the city provides due
care in considering all project factors prior to building its new WAN?

Which of the following actions should be taken by the s…

ODBC access to a database on a network-connected host is required. The host does not have a security mechanism to authenticate the incoming ODBC
connection, and the application requires that the connection have read/write permissions. In order to further secure the data, a nonstandard configuration would
need to be implemented. The information in the database is not sensitive, but was not readily accessible prior to the implementation of the ODBC connection.
Which of the following actions should be taken by the security analyst?


Page 3 of 2312345...1020...Last »