PrepAway - Latest Free Exam Questions & Answers

Category: CAS-002 (v.1)

Exam CAS-002 : CompTIA Advanced Security Practitioner (update May 22th, 2017)

Which of the following steps should Joe take to reach t…

Joe is a security architect who is tasked with choosing a new NIPS platform that has the ability to perform SSLinspection, analyze up to 10Gbps of traffic, can be centrally managed and only reveals inspected application
payload data to specified internal security employees. Which of the following steps should Joe take to reach the
desired outcome?

what is the BEST way to defend against it?

An insurance company has an online quoting system for insurance premiums. It allows potential customers to
fill in certain details about their car and obtain a quote. During an investigation, the following patterns were
detected:
Pattern 1 Analysis of the logs identifies that insurance premium forms are being filled in but only single fieldsare incrementally being updated. Pattern 2 For every quote completed, a new customer number is created;
due to legacy systems, customer numbers are running out.
Which of the following is the attack type the system is susceptible to, and what is the BEST way to defend
against it? (Select TWO).

Which of the following provides the MOST secure method …

An organization recently upgraded its wireless infrastructure to support 802.1x and requires all clients to use
this method. After the upgrade, several critical wireless clients fail to connect because they are only pre-shared
key compliant. For the foreseeable future, none of the affected clients have an upgrade path to put them into
compliance with the 802.1x requirement. Which of the following provides the MOST secure method of
integrating the non-compliant clients into the network?

Which of the following hardening techniques should be a…

Company policy requires that all company laptops meet the following baseline requirements:
Software requirements:
Antivirus Anti-malware Anti-spyware
Log monitoring
Full-disk encryption
Terminal services enabled for RDP Administrative access for local users Hardware restrictions: Bluetooth
disabled FireWire disabled WiFi adapter disabled Ann, a web developer, reports performance issues with her
laptop and is not able to access any network resources. After further investigation, a bootkit was discovered
and it was trying to access external websites. Which of the following hardening techniques should be applied to
mitigate this specific issue from reoccurring? (Select TWO).

Which of the following should be the revised aggregate …

An IT auditor is reviewing the data classification for a sensitive system. The company has classified the data
stored in the sensitive system according to the following matrix:
DATA TYPECONFIDENTIALITYINTEGRITYAVAILABILITY
—————————————————————————————————————-
FinancialHIGHHIGHLOW
Client nameMEDIUMMEDIUMHIGH Client addressLOWMEDIUMLOW
—————————————————————————————————————–
AGGREGATEMEDIUMMEDIUMMEDIUM
The auditor is advising the company to review the aggregate score and submit it to senior management. Which
of the following should be the revised aggregate score?


Page 11 of 40« First...910111213...203040...Last »