Pinpoint CAS-002 lab Reviews & Tips

Your success in CompTIA CAS-002 is our sole target and we develop all our CAS-002 braindumps in a way that facilitates the attainment of this target. Not only is our CAS-002 study material the best you can find, it is also the most detailed and the most updated. CAS-002 Practice Exams for CompTIA CASP CAS-002 are written to the highest standards of technical accuracy.

P.S. Approved CAS-002 interactive bootcamp are available on Google Drive, GET MORE:

New CompTIA CAS-002 Exam Dumps Collection (Question 5 - Question 14)

Q5. Which of the following activities is commonly deemed u201cOUT OF SCOPEu201d when undertaking a penetration test?

A. Test password complexity of all login fields and input validation of form fields

B. Reverse engineering any thick client software that has been provided for the test

C. Undertaking network-based denial of service attacks in production environment

D. Attempting to perform blind SQL injection and reflected cross-site scripting attacks

A. E. Running a vulnerability scanning tool to assess network and host weaknesses

Answer: C

Q6. A company has a single subnet in a small office. The administrator wants to limit non-web related traffic to the corporate intranet server as well as prevent abnormal HTTP requests and HTTP protocol anomalies from causing problems with the web server. Which of the following is the MOST likely solution?

A. Application firewall and NIPS

B. Edge firewall and HIDS

C. ACLs and anti-virus

D. Host firewall and WAF

Answer: D

Q7. A security administrator is redesigning, and implementing a service-oriented architecture to replace an old, in-house software processing system, tied to a corporate sales website. After performing the business process analysis, the administrator decides the services need to operate in a dynamic fashion. The company has also been the victim of data injection attacks in the past and needs to build in mitigation features. Based on these requirements and past vulnerabilities, which of the following needs to be incorporated into the SOA?

A. Point to point VPNs for all corporate intranet users.

B. Cryptographic hashes of all data transferred between services.

C. Service to service authentication for all workflows.

D. Two-factor authentication and signed code

Answer: C

Q8. A corporation has expanded for the first time by integrating several newly acquired businesses.

Which of the following are the FIRST tasks that the security team should undertake? (Select TWO).

A. Remove acquired companies Internet access.

B. Federate identity management systems.

C. Install firewalls between the businesses.

D. Re-image all end user computers to a standard image.

E. Develop interconnection policy.

F. Conduct a risk analysis of each acquired companyu2019s networks.

Answer: E,F

Q9. A new internal network segmentation solution will be implemented into the enterprise that consists of 200 internal firewalls. As part of running a pilot exercise, it was determined that it takes three changes to deploy a new application onto the network before it is operational. Security now has a significant affect on overall availability. Which of the following would be the FIRST process to perform as a result of these findings?

A. Lower the SLA to a more tolerable level and perform a risk assessment to see if the solution could be met by another solution. Reuse the firewall infrastructure on other projects.

B. Perform a cost benefit analysis and implement the solution as it stands as long as the risks are understood by the business owners around the availability issues. Decrease the current SLA expectations to match the new solution.

C. Engage internal auditors to perform a review of the project to determine why and how the project did not meet the security requirements. As part of the review ask them to review the control effectiveness.

D. Review to determine if control effectiveness is in line with the complexity of the solution. Determine if the requirements can be met with a simpler solution.

Answer: D

Q10. The helpdesk is receiving multiple calls about slow and intermittent Internet access from the finance department. The following information is compiled:

Caller 1, IP, NETMASK

Caller 2, IP, NETMASK

Caller 3, IP, NETMASK

All callers are connected to the same switch and are routed by a router with five built-in interfaces. The upstream router interfaceu2019s MAC is 00-01-42-32-ab-1a

A packet capture shows the following:

09:05:15.934840 arp reply is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)

09:06:16.124850 arp reply is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)

09:07:25.439811 arp reply is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)

09:08:10.937590 IP > ICMP echo request, id 2305, seq 1,

length 65534

09:08:10.937591 IP > ICMP echo request, id 2306, seq 2,

length 65534

09:08:10.937592 IP > ICMP echo request, id 2307, seq 3,

length 65534

Which of the following is occurring on the network?

A. A man-in-the-middle attack is underway on the network.

B. An ARP flood attack is targeting at the router.

C. The default gateway is being spoofed on the network.

D. A denial of service attack is targeting at the router.

Answer: D

Q11. CORRECT TEXTThe IDS has detected abnormal behavior on this network. Click on the network devices to view device information. Based on this information, the following tasks should be completed:

1. Select the server that is a victim of a cross-site scripting (XSS) attack. 2 Select the source of the brute force password attack.

3. Modify the access control list (ACL) on the router(s) to ONLY block the XSS attack.

Instructions: Simulations can be reset at anytime to the initial state: however, all selections will be deleted

Answer: Please review following steps:

Q12. The Chief Information Security Officer (CISO) at a large organization has been reviewing some security-related incidents at the organization and comparing them to current industry trends. The desktop security engineer feels that the use of USB storage devices on office computers has contributed to the frequency of security incidents. The CISO knows the acceptable use policy prohibits the use of USB storage devices. Every user receives a popup warning about this policy upon login. The SIEM system produces a report of USB violations on a monthly basis; yet violations continue to occur. Which of the following preventative controls would MOST effectively mitigate the logical risks associated with the use of USB storage devices?

A. Revise the corporate policy to include possible termination as a result of violations

B. Increase the frequency and distribution of the USB violations report

C. Deploy PKI to add non-repudiation to login sessions so offenders cannot deny the offense

D. Implement group policy objects

Answer: D

Q13. As part of the ongoing information security plan in a large software development company, the Chief Information officer (CIO) has decided to review and update the companyu2019s privacy policies and procedures to reflect the changing business environment and business requirements.

Training and awareness of the new policies and procedures has been incorporated into the security awareness program which should be:

A. presented by top level management to only data handling staff.

B. customized for the various departments and staff roles.

C. technical in nature to ensure all development staff understand the procedures.

D. used to promote the importance of the security department.

Answer: B

Q14. An administrator is reviewing logs and sees the following entry:

Message: Access denied with code 403 (phase 2). Pattern match "\bunion\b.{1,100}?\bselect\b" at ARGS:$id. [data "union all select"] [severity "CRITICAL"] [tag "WEB_ATTACK"] [tag "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"] [tag


Action: Intercepted (phase 2) Apache-Handler: php5-script Which of the following attacks was being attempted?

A. Session hijacking

B. Cross-site script

C. SQL injection

D. Buffer overflow

Answer: C

P.S. Easily pass CAS-002 Exam with 2passeasy Approved Dumps & pdf vce, Try Free: (532 New Questions)