PrepAway - Latest Free Exam Questions & Answers

Category: CAS-002 (v.1)

Exam CAS-002 : CompTIA Advanced Security Practitioner (update May 22th, 2017)

Which of the following BEST explains why this company s…

The Chief Executive Officer (CEO) of a company that allows telecommuting has challenged the Chief Security
Officer’s (CSO) request to harden the corporate network’s perimeter. The CEO argues that the company
cannot protect its employees at home, so the risk at work is no different. Which of the following BEST explains
why this company should proceed with protecting its corporate network boundary?

Which of the following risk strategies did the CISO imp…

The Chief Information Security Officer (CISO) at a company knows that many users store business documentson public cloud-based storage, and realizes this is a risk to the company. In response, the CISO implements a
mandatory training course in which all employees are instructed on the proper use of cloud-based storage.
Which of the following risk strategies did the CISO implement?

Which of the following are of MOST concern?

A large hospital has implemented BYOD to allow doctors and specialists the ability to access patient medical
records on their tablets. The doctors and specialists access patient records over the hospital’s guest WiFi
network which is isolated from the internal network with appropriate security controls. The patient records
management system can be accessed from the guest network and requires two factor authentication. Using a
remote desktop type interface, the doctors and specialists can interact with the hospital’s system. Cut and paste
and printing functions are disabled to prevent the copying of data to BYOD devices. Which of the following are
of MOST concern? (Select TWO).

Which of the following designs BEST supports the given …

The senior security administrator wants to redesign the company DMZ to minimize the risks associated with
both external and internal threats. The DMZ design must support security in depth, change management and
configuration processes, and support incident reconstruction. Which of the following designs BEST supports
the given requirements?

Which of the following processes should be followed?

A security policy states that all applications on the network must have a password length of eight characters.
There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in
six months, and two are not expected to be upgraded or removed from the network. Which of the following
processes should be followed?


Page 35 of 40« First...102030...3334353637...40...Last »