Download CompTIA Advanced Security Practitioner (CASP).CAS-002.PracticeDumps.2018-05-28.230q.vcex

Vendor: CompTIA
Exam Code: CAS-002
Exam Name: CompTIA Advanced Security Practitioner (CASP)
Date: May 28, 2018
File Size: 4 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
A Chief Information Security Officer (CISO) has requested that a SIEM solution be implemented. The CISO wants to know upfront what the projected TCO would be before looking further into this concern. Two vendor proposals have been received:
  • Vendor A: product-based solution which can be purchased by the pharmaceutical company.
  • Capital expenses to cover central log collectors, correlators, storage and management consoles expected to be $150,000. Operational expenses are expected to be a 0.5 full time employee (FTE) to manage the solution, and 1 full time employee to respond to incidents per year. 
  • Vendor B: managed service-based solution which can be the outsourcer for the pharmaceutical company’s needs.
Bundled offering expected to be $100,000 per year. 
Operational expenses for the pharmaceutical company to partner with the vendor are expected to be a 0.5 FTE per year. 
Internal employee costs are averaged to be $80,000 per year per FTE. Based on calculating TCO of the two vendor proposals over a 5 year period, which of the following options is MOST accurate?
  1. Based on cost alone, having an outsourced solution appears cheaper.
  2. Based on cost alone, having an outsourced solution appears to be more expensive.
  3. Based on cost alone, both outsourced an in-sourced solutions appear to be the same.
  4. Based on cost alone, having a purchased product solution appears cheaper.
Correct answer: A
Question 2
A port in a fibre channel switch failed, causing a costly downtime on the company’s primary website. Which of the following is the MOST likely cause of the downtime?
  1. The web server iSCSI initiator was down.
  2. The web server was not multipathed.
  3. The SAN snapshots were not up-to-date.
  4. The SAN replication to the backup site failed.
Correct answer: B
Question 3
An internal development team has migrated away from Waterfall development to use Agile development. Overall, this has been viewed as a successful initiative by the stakeholders as it has improved time-to-market. However, some staff within the security team have contended that Agile development is not secure. 
Which of the following is the MOST accurate statement?
  1. Agile and Waterfall approaches have the same effective level of security posture. They both need similar amounts of security effort at the same phases of development.
  2. Agile development is fundamentally less secure than Waterfall due to the lack of formal up-front design and inability to perform security reviews.
  3. Agile development is more secure than Waterfall as it is a more modern methodology which has the advantage of having been able to incorporate security best practices of recent years.
  4. Agile development has different phases and timings compared to Waterfall. Security activities need to be adapted and performed within relevant Agile phases.
Correct answer: D
Question 4
A vulnerability scanner report shows that a client-server host monitoring solution operating in the credit card corporate environment is managing SSL sessions with a weak algorithm which does not meet corporate policy. Which of the following are true statements? (Select TWO).
  1. The X509 V3 certificate was issued by a non trusted public CA.
  2. The client-server handshake could not negotiate strong ciphers.
  3. The client-server handshake is configured with a wrong priority.
  4. The client-server handshake is based on TLS authentication.
  5. The X509 V3 certificate is expired.
  6. The client-server implements client-server mutual authentication with different certificates.
Correct answer: BC
Question 5
Which of the following represents important technical controls for securing a SAN storage infrastructure? (Select TWO).
  1. Synchronous copy of data
  2. RAID configuration
  3. Data de-duplication
  4. Storage pool space allocation
  5. Port scanning
  6. LUN masking/mapping
  7. Port mapping
Correct answer: FG
Question 6
An enterprise must ensure that all devices that connect to its networks have been previously approved. The solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs and administrative overhead, the security architect wants to outsource identity proofing and second factor digital delivery to the third party. Which of the following solutions will address the enterprise requirements?
  1. Implementing federated network access with the third party.
  2. Using a HSM at the network perimeter to handle network device access.
  3. Using a VPN concentrator which supports dual factor via hardware tokens.
  4. Implementing 802.1x with EAP-TTLS across the infrastructure.
Correct answer: D
Question 7
A security administrator is performing VDI traffic data collection on a virtual server which migrates from one host to another. While reviewing the data collected by the protocol analyzer, the security administrator notices that sensitive data is present in the packet capture. 
Which of the following should the security administrator recommend to ensure the confidentiality of sensitive information during live VM migration, while minimizing latency issues?
  1. A separate physical interface placed on a private VLAN should be configured for live host operations.
  2. Database record encryption should be used when storing sensitive information on virtual servers.
  3. Full disk encryption should be enabled across the enterprise to ensure the confidentiality of sensitive data.
  4. Sensitive data should be stored on a backend SAN which uses an isolated fiber channel network.
Correct answer: A
Question 8
Joe is a security architect who is tasked with choosing a new NIPS platform that has the ability to perform SSL inspection, analyze up to 10Gbps of traffic, can be centrally managed and only reveals inspected application payload data to specified internal security employees. Which of the following steps should Joe take to reach the desired outcome?
  1. Research new technology vendors to look for potential products. Contribute to an RFP and then evaluate RFP responses to ensure that the vendor product meets all mandatory requirements. Test the product and make a product recommendation.
  2. Evaluate relevant RFC and ISO standards to choose an appropriate vendor product. Research industry surveys, interview existing customers of the product and then recommend that the product be purchased.
  3. Consider outsourcing the product evaluation and ongoing management to an outsourced provider on the basis that each of the requirements are met and a lower total cost of ownership (TCO) is achieved.
  4. Choose a popular NIPS product and then consider outsourcing the ongoing device management to a cloud provider. Give access to internal security employees so that they can inspect the application payload data.
  5. Ensure that the NIPS platform can also deal with recent technological advancements, such as threats emerging from social media, BYOD and cloud storage prior to purchasing the product.
Correct answer: A
Question 9
A penetration tester is inspecting traffic on a new mobile banking application and sends the following web request:
POST http://www.example.com/resources/NewBankAccount HTTP/1.1
Content-type: application/json
“account”:
  { “creditAccount”:”Credit Card Rewards account”}  { “salesLeadRef”:”www.example.com/badcontent/exploitme.exe”}
], 
“customer”:
  { “name”:”Joe Citizen”}  { “custRef”:”3153151”}
The banking website responds with:
HTTP/1.1 200 OK 
“newAccountDetails”:
  { “cardNumber”:”1234123412341234”}  { “cardExpiry”:”2020-12-31”}
  { “cardCVV”:”909”}
], 
“marketingCookieTracker”:“JSESSIONID=000000001”
“returnCode”:“Account added successfully”
Which of the following are security weaknesses in this example? (Select TWO).
  1. Missing input validation on some fields
  2. Vulnerable to SQL injection
  3. Sensitive details communicated in clear-text
  4. Vulnerable to XSS
  5. Vulnerable to malware file uploads
  6. JSON/REST is not as secure as XML
Correct answer: AC
Question 10
Joe, a penetration tester, is tasked with testing the security robustness of the protocol between a mobile web application and a RESTful application server. 
Which of the following security tools would be required to assess the security between the mobile web application and the RESTful application server? (Select TWO).
  1. Jailbroken mobile device
  2. Reconnaissance tools
  3. Network enumerator
  4. HTTP interceptor
  5. Vulnerability scanner
  6. Password cracker
Correct answer: DE
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!