Proper study guides for Replace CompTIA CompTIA Advanced Security Practitioner (CASP) certified begins with CompTIA CAS-002 preparation products which designed to deliver the Realistic CAS-002 questions by making you pass the CAS-002 test at your first time. Try the free CAS-002 demo right now.

Q261. - (Topic 5) 

An asset manager is struggling with the best way to reduce the time required to perform asset location activities in a large warehouse. A project manager indicated that RFID might be a valid solution if the asset manager’s requirements were supported by current RFID capabilities. Which of the following requirements would be MOST difficult for the asset manager to implement? 

A. The ability to encrypt RFID data in transmission 

B. The ability to integrate environmental sensors into the RFID tag 

C. The ability to track assets in real time as they move throughout the facility 

D. The ability to assign RFID tags a unique identifier 

Answer:


Q262. - (Topic 3) 

When attending the latest security conference, an information security administrator noticed only a few people carrying a laptop around. Most other attendees only carried their smartphones. 

Which of the following would impact the security of conference’s resources? 

A. Wireless network security may need to be increased to decrease access of mobile devices. 

B. Physical security may need to be increased to deter or prevent theft of mobile devices. 

C. Network security may need to be increased by reducing the number of available physical network jacks. 

D. Wireless network security may need to be decreased to allow for increased access of mobile devices. 

Answer:


Q263. - (Topic 4) 

A large enterprise introduced a next generation firewall appliance into the Internet facing DMZ. All Internet traffic passes through this appliance. Four hours after implementation the network engineering team discovered that traffic through the DMZ now has un-acceptable latency, and is recommending that the new firewall be taken offline. At what point in the implementation process should this problem have been discovered? 

A. During the product selection phase 

B. When testing the appliance 

C. When writing the RFP for the purchase process 

D. During the network traffic analysis phase 

Answer:


Q264. - (Topic 1) 

A developer is determining the best way to improve security within the code being developed. The developer is focusing on input fields where customers enter their credit card details. Which of the following techniques, if implemented in the code, would be the MOST effective in protecting the fields from malformed input? 

A. Client side input validation 

B. Stored procedure 

C. Encrypting credit card details 

D. Regular expression matching 

Answer:


Q265. - (Topic 4) 

A new IDS device is generating a very large number of irrelevant events. Which of the following would BEST remedy this problem? 

A. Change the IDS to use a heuristic anomaly filter. 

B. Adjust IDS filters to decrease the number of false positives. 

C. Change the IDS filter to data mine the false positives for statistical trending data. 

D. Adjust IDS filters to increase the number of false negatives. 

Answer:


Q266. - (Topic 4) 

Which of the following protocols only facilitates access control? A. XACML 

B. Kerberos 

C. SPML 

D. SAML 

Answer:


Q267. - (Topic 1) 

A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important? 

A. Insecure direct object references, CSRF, Smurf 

B. Privilege escalation, Application DoS, Buffer overflow 

C. SQL injection, Resource exhaustion, Privilege escalation 

D. CSRF, Fault injection, Memory leaks 

Answer:


Q268. - (Topic 1) 

A network administrator with a company’s NSP has received a CERT alert for targeted adversarial behavior at the company. In addition to the company’s physical security, which of the following can the network administrator use to detect the presence of a malicious actor physically accessing the company’s network or information systems from within? (Select TWO). 

A. RAS 

B. Vulnerability scanner 

C. HTTP intercept 

D. HIDS 

E. Port scanner 

F. Protocol analyzer 

Answer: D,F 


Q269. - (Topic 1) 

A user has a laptop configured with multiple operating system installations. The operating systems are all installed on a single SSD, but each has its own partition and logical volume. Which of the following is the BEST way to ensure confidentiality of individual operating system data? 

A. Encryption of each individual partition 

B. Encryption of the SSD at the file level 

C. FDE of each logical volume on the SSD 

D. FDE of the entire SSD as a single disk 

Answer:


Q270. - (Topic 1) 

The Chief Information Officer (CIO) is reviewing the IT centric BIA and RA documentation. The documentation shows that a single 24 hours downtime in a critical business function will cost the business $2.3 million. Additionally, the business unit which depends on the critical business function has determined that there is a high probability that a threat will materialize based on historical data. The CIO’s budget does not allow for full system hardware replacement in case of a catastrophic failure, nor does it allow for the purchase of additional compensating controls. Which of the following should the CIO recommend to the finance director to minimize financial loss? 

A. The company should mitigate the risk. 

B. The company should transfer the risk. 

C. The company should avoid the risk. 

D. The company should accept the risk. 

Answer: