PrepAway - Latest Free Exam Questions & Answers

Category: CAS-002

Exam CAS-002 : CompTIA Advanced Security Practitioner

Which of the following questions is the MOST important?

The helpdesk department desires to roll out a remote support application for internal use on all company computers. This tool should allow remote desktop sharing,
system log gathering, chat, hardware logging, inventory management, and remote registry access. The risk management team has been asked to review vendor
responses to the RFQ. Which of the following questions is the MOST important?

Which of the following software development methods is …

A company has received the contract to begin developing a new suite of software tools to replace an aging collaboration solution. The original collaboration solution
has been in place for nine years, contains over a million lines of code, and took over two years to develop originally. The SDLC has been broken up into eight
primary stages, with each stage requiring an in-depth risk analysis before moving on to the next phase. Which of the following software development methods is
MOST applicable?

Which of the following additional controls should be im…

An organization has decided to reduce labor costs by outsourcing back office processing of credit applications to a provider located in another country. Data

sovereignty and privacy concerns raised by the security team resulted in the third-party provider only accessing and processing the data via remote desktop
sessions. To facilitate communications and improve productivity, staff at the third party has been provided with corporate email accounts that are only accessible
via the remote desktop sessions. Email forwarding is blocked and staff at the third party can only communicate with staff within the organization. Which of the
following additional controls should be implemented to prevent data loss? (Select THREE).

Which of the following is being described?

A company has issued a new mobile device policy permitting BYOD and company-issued devices. The company-issued device has a managed middleware client

that restricts the applications allowed on company devices and provides those that are approved. The middleware client provides configuration standardization for
both company owned and BYOD to secure data and communication to the device according to industry best practices. The policy states that, “BYOD clients must
meet the company’s infrastructure requirements to permit a connection.” The company also issues a memorandum separate from the policy, which provides
instructions for the purchase, installation, and use of the middleware client on BYOD. Which of the following is being described?

Which of the following should the sales manager do to e…

A company sales manager received a memo from the company’s financial department which stated that the company would not be putting its software products
through the same security testing as previous years to reduce the research and development cost by 20 percent for the upcoming year. The memo also stated that
the marketing material and service level agreement for each product would remain unchanged. The sales manager has reviewed the sales goals for the upcoming
year and identified an increased target across the software products that will be affected by the financial department’s change. All software products will continue to
go through new development in the coming year. Which of the following should the sales manager do to ensure the company stays out of trouble?

Which of the following BEST describes how the security …

A completely new class of web-based vulnerabilities has been discovered. Claims have been made that all common web-based development frameworks are
susceptible to attack. Proof-of- concept details have emerged on the Internet. A security advisor within a company has been asked to provide recommendations on
how to respond quickly to these vulnerabilities. Which of the following BEST describes how the security advisor should respond?

Which of the following departments are the MOST heavily…

An intruder was recently discovered inside the data center, a highly sensitive area. To gain access, the intruder circumvented numerous layers of physical and
electronic security measures. Company leadership has asked for a thorough review of physical security controls to prevent this from happening again. Which of the
following departments are the MOST heavily invested in rectifying the problem? (Select THREE).


Page 15 of 23« First...10...1314151617...20...Last »