Skip to content

What Top Quality CAS-002 pdf Is?

Proper study guides for Up to date CompTIA CompTIA Advanced Security Practitioner (CASP) certified begins with CompTIA CAS-002 preparation products which designed to deliver the Actual CAS-002 questions by making you pass the CAS-002 test at your first time. Try the free CAS-002 demo right now.


Free VCE & PDF File for CompTIA CAS-002 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW CAS-002 Exam Dumps (PDF & VCE):
Available on:

Q71. – (Topic 2) 

A project manager working for a large city government is required to plan and build a WAN, which will be required to host official business and public access. It is also anticipated that the city’s emergency and first response communication systems will be required to operate across the same network. The project manager has experience with enterprise IT projects, but feels this project has an increased complexity as a result of the mixed business / public use and the critical infrastructure it will provide. Which of the following should the project manager release to the public, academia, and private industry to ensure the city provides due care in considering all project factors prior to building its new WAN? 






Q72. – (Topic 1) 

The Chief Executive Officer (CEO) of a small start-up company wants to set up offices around the country for the sales staff to generate business. The company needs an effective communication solution to remain in constant contact with each other, while maintaining a secure business environment. A junior-level administrator suggests that the company and the sales staff stay connected via free social media. Which of the following decisions is BEST for the CEO to make? 

A. Social media is an effective solution because it is easily adaptable to new situations. 

B. Social media is an ineffective solution because the policy may not align with the business. 

C. Social media is an effective solution because it implements SSL encryption. 

D. Social media is an ineffective solution because it is not primarily intended for business applications. 


Q73. – (Topic 4) 

A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store cryptographic keys used to sign code and code modules on the VMs. Which of the following will meet this goal without requiring any hardware pass-through implementations? 

A. vTPM 





Q74. – (Topic 4) 

Which of the following BEST describes the implications of placing an IDS device inside or outside of the corporate firewall? 

A. Placing the IDS device inside the firewall will allow it to monitor potential internal attacks but may increase the load on the system. 

B. Placing the IDS device outside the firewall will allow it to monitor potential remote attacks while still allowing the firewall to block the attack. 

C. Placing the IDS device inside the firewall will allow it to monitor potential remote attacks but may increase the load on the system. 

D. Placing the IDS device outside the firewall will allow it to monitor potential remote attacks but the firewall will not be able to block the attacks. 


Q75. – (Topic 3) 

Within the company, there is executive management pressure to start advertising to a new target market. Due to the perceived schedule and budget inefficiencies of engaging a technology business unit to commission a new micro-site, the marketing department is engaging third parties to develop the site in order to meet time-to-market demands. From a security perspective, which of the following options BEST balances the needs between marketing and risk management? 

A. The third party should be contractually obliged to perform adequate security activities, and evidence of those activities should be confirmed by the company prior to launch. 

B. Outsourcing is a valid option to increase time-to-market. If a security incident occurs, it is not of great concern as the reputational damage will be the third party’s responsibility. 

C. The company should never outsource any part of the business that could cause a security or privacy incident. It could lead to legal and compliance issues. 

D. If the third party has an acceptable record to date on security compliance and is provably faster and cheaper, then it makes sense to outsource in this specific situation. 


Q76. – (Topic 2) 

A security tester is testing a website and performs the following manual query: 

The following response is received in the payload: 

“ORA-000001: SQL command not properly ended” 

Which of the following is the response an example of? 

A. Fingerprinting 

B. Cross-site scripting 

C. SQL injection 

D. Privilege escalation 


Q77. – (Topic 4) 

A medium-sized company has recently launched an online product catalog. It has decided to keep the credit card purchasing in-house as a secondary potential income stream has been identified in relation to sales leads. The company has decided to undertake a PCI assessment in order to determine the amount of effort required to meet the business objectives. Which compliance category would this task be part of? 

A. Government regulation 

B. Industry standard 

C. Company guideline 

D. Company policy 


Q78. – (Topic 2) 

An insurance company has an online quoting system for insurance premiums. It allows potential customers to fill in certain details about their car and obtain a quote. During an investigation, the following patterns were detected: 

Pattern 1 – Analysis of the logs identifies that insurance premium forms are being filled in but only single fields are incrementally being updated. 

Pattern 2 – For every quote completed, a new customer number is created; due to legacy systems, customer numbers are running out. 

Which of the following is the attack type the system is susceptible to, and what is the BEST way to defend against it? (Select TWO). 

A. Apply a hidden field that triggers a SIEM alert 

B. Cross site scripting attack 

C. Resource exhaustion attack 

D. Input a blacklist of all known BOT malware IPs into the firewall 

E. SQL injection 

F. Implement an inline WAF and integrate into SIEM 

G. Distributed denial of service 

H. Implement firewall rules to block the attacking IP addresses 

Answer: C,F 

Q79. – (Topic 3) 

In order for a company to boost profits by implementing cost savings on non-core business activities, the IT manager has sought approval for the corporate email system to be hosted in the cloud. The compliance officer has been tasked with ensuring that data lifecycle issues are taken into account. Which of the following BEST covers the data lifecycle end-to-end? 

A. Creation and secure destruction of mail accounts, emails, and calendar items 

B. Information classification, vendor selection, and the RFP process 

C. Data provisioning, processing, in transit, at rest, and de-provisioning 

D. Securing virtual environments, appliances, and equipment that handle email 


Q80. – (Topic 5) 

Noticing latency issues at its connection to the Internet, a company suspects that it is being targeted in a Distributed Denial of Service attack. A security analyst discovers numerous inbound monlist requests coming to the company’s NTP servers. Which of the following mitigates this activity with the LEAST impact to existing operations? 

A. Block in-bound connections to the company’s NTP servers. 

B. Block IPs making monlist requests. 

C. Disable the company’s NTP servers. 

D. Disable monlist on the company’s NTP servers.