PrepAway - Latest Free Exam Questions & Answers

Category: CAS-002 (v.2)

Briefing CAS-002 : CompTIA Advanced Security Practitioner (update December 14th, 2017)

which of the following strategies should be employed?

The latest independent research shows that cyber attacks involving SCADA systems grew an average of 15%
per year in each of the last four years, but that this year’s growth has slowed to around 7%. Over the same time
period, the number of attacks against applications has decreased or stayed flat each year. At the start of the
measure period, the incidence of PC boot loader or BIOS based attacks was negligible. Starting two years ago,
the growth in the number of PC boot loader attacks has grown exponentially. Analysis of these trends would
seem to suggest which of the following strategies should be employed?

Which of the following will BEST meet the goals of law …

A user is suspected of engaging in potentially illegal activities. Law enforcement has requested that the user
continue to operate on the network as normal. However, they would like to have a copy of any communications
from the user involving certain key terms. Additionally, the law enforcement agency has requested that the
user’s ongoing communication be retained in the user’s account for future investigations. Which of the following
will BEST meet the goals of law enforcement?

The security administrator instead suggests that the de…

A recently hired security administrator is advising developers about the secure integration of a legacy in-house
application with a new cloud based processing system. The systems must exchange large amounts of fixed
format data such as names, addresses, and phone numbers, as well as occasional chunks of data in
unpredictable formats. The developers want to construct a new data format and create custom tools to parse
and process the data. The security administrator instead suggests that the developers:

Which of the following recommendations would BEST meet …

A security administrator has been asked to select a cryptographic algorithm to meet the criteria of a new
application. The application utilizes streaming video that can be viewed both on computers and mobile devices.
The application designers have asked that the algorithm support the transport encryption with the lowest
possible performance overhead. Which of the following recommendations would BEST meet the needs of the
application designers? (Select TWO).

Which of the following restricts different zone adminis…

ABC Corporation uses multiple security zones to protect systems and information, and all of the VM hosts are
part of a consolidated VM infrastructure. Each zone has different VM administrators. Which of the following
restricts different zone administrators from directly accessing the console of a VM host from another zone?

Which of the following activities MUST be mandated to e…

An organization has implemented an Agile development process for front end web application development. A
new security architect has just joined the company and wants to integrate security activities into the SDLC.
Which of the following activities MUST be mandated to ensure code quality from a security perspective? (Select
TWO).


Page 10 of 24« First...89101112...20...Last »