PrepAway - Latest Free Exam Questions & Answers

Category: CAS-002 (v.2)

Briefing CAS-002 : CompTIA Advanced Security Practitioner (update December 14th, 2017)

Which of the following should Ann perform to test wheth…

Ann is testing the robustness of a marketing website through an intercepting proxy. She has intercepted the
following HTTP request:
POST /login.aspx HTTP/1.1
Host: comptia.org
Content-type: text/html
txtUsername=ann&txtPassword=ann&alreadyLoggedIn=false&submit=true
Which of the following should Ann perform to test whether the website is susceptible to a simple authentication
bypass?

Which of the following are security weaknesses in this …

A penetration tester is inspecting traffic on a new mobile banking application and sends the following web
request:
POST http://www.example.com/resources/NewBankAccount HTTP/1.1
Content-type: application/json
{
“account”:
[
{ “creditAccount”:”Credit Card Rewards account”} { “salesLeadRef”:”www.example.com/badcontent/
exploitme.exe”}
],
“customer”:
[
{ “name”:”Joe Citizen”} { “custRef”:”3153151”}
]
}
The banking website responds with:
HTTP/1.1 200 OK
{
“newAccountDetails”:
[
{ “cardNumber”:”1234123412341234”} { “cardExpiry”:”2020-12-31”}
{ “cardCVV”:”909”}
],
“marketingCookieTracker”:“JSESSIONID=000000001”
“returnCode”:“Account added successfully”
}
Which of the following are security weaknesses in this example? (Select TWO).

Which of the following steps should Joe take to reach t…

Joe is a security architect who is tasked with choosing a new NIPS platform that has the ability to perform SSL
inspection, analyze up to 10Gbps of traffic, can be centrally managed and only reveals inspected application
payload data to specified internal security employees. Which of the following steps should Joe take to reach the
desired outcome?

Which of the following should the security administrato…

A security administrator is performing VDI traffic data collection on a virtual server which migrates from one
host to another. While reviewing the data collected by the protocol analyzer, the security administrator notices
that sensitive data is present in the packet capture. Which of the following should the security administrator
recommend to ensure the confidentiality of sensitive information during live VM migration, while minimizing
latency issues?

Which of the following solutions will address the enter…

An enterprise must ensure that all devices that connect to its networks have been previously approved. The
solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs
and administrative overhead, the security architect wants to outsource identity proofing and second factor digital
delivery to the third party. Which of the following solutions will address the enterprise requirements?

Which of the following is the MOST accurate statement?

An internal development team has migrated away from Waterfall development to use Agile development.
Overall, this has been viewed as a successful initiative by the stakeholders as it has improved time-to-market.
However, some staff within the security team have contended that Agile development is not secure. Which of
the following is the MOST accurate statement?


Page 11 of 24« First...910111213...20...Last »