Proper study guides for Rebirth CompTIA CompTIA Advanced Security Practitioner (CASP) certified begins with CompTIA CAS-002 preparation products which designed to deliver the Pinpoint CAS-002 questions by making you pass the CAS-002 test at your first time. Try the free CAS-002 demo right now.

P.S. Pinpoint CAS-002 bootcamp are available on Google Drive, GET MORE: https://drive.google.com/open?id=1pX9Yg2aTb9vNu1CE0teKLNqAkStO5U85


New CompTIA CAS-002 Exam Dumps Collection (Question 8 - Question 17)

Q1. Three companies want to allow their employees to seamlessly connect to each otheru2021s wireless corporate networks while keeping one consistent wireless client configuration. Each company wants to maintain its own authentication infrastructure and wants to ensure

that an employee who is visiting the other two companies is authenticated by the home office when connecting to the other companiesu2021 wireless network. All three companies have agreed to standardize on 802.1x EAP-PEAP-MSCHAPv2 for client configuration. Which of the following should the three companies implement?

A. The three companies should agree on a single SSID and configure a hierarchical RADIUS system which implements trust delegation.

B. The three companies should implement federated authentication through Shibboleth connected to an LDAP backend and agree on a single SSID.

C. The three companies should implement a central portal-based single sign-on and agree to use the same CA when issuing client certificates.

D. All three companies should use the same wireless vendor to facilitate the use of a shared cloud based wireless controller.

Answer: A



Q2. An administrator receives reports that the network is running slow for users connected to a certain switch. Viewing the network traffic, the administrator reviews the following:

18:51:59.042108 IP linuxwksta.55467 > dns.company.com.domain: 39462+ PTR? 222.17.4.10.in-addr.arpa. (42)

18:51:59.055732 IP dns.company.com.domain > linuxwksta.55467: 39462 NXDomain 0/0/0 (42)

18:51:59.055842 IP linuxwksta.48287 > dns.company.com.domain: 46767+ PTR? 255.19.4.10.in-addr.arpa. (42)

18:51:59.069816 IP dns.company.com.domain > linuxwksta.48287: 46767 NXDomain 0/0/0 (42)

18:51:59.159060 IP linuxwksta.42491 > 10.4.17.72.iscsi-target: Flags [P.], seq 1989625106:1989625154, ack 2067334822, win 1525, options [nop,nop,TS val 16021424

ecr 215646227], length 48

18:51:59.159145 IP linuxwksta.48854 > dns.company.com.domain: 3834+ PTR? 72.17.4.10.in-addr.arpa. (41)

18:51:59.159314 IP 10.4.17.72.iscsi-target > linuxwksta.42491: Flags [P.], seq 1:49, ack 48, win 124, options [nop,nop,TS val 215647479 ecr 16021424], length 48

18:51:59.159330 IP linuxwksta.42491 > 10.4.17.72.iscsi-target: Flags [.], ack 49, win 1525, options [nop,nop,TS val 16021424 ecr 215647479], length 0

18:51:59.165342 IP dns.company.com.domain > linuxwksta.48854: 3834 NXDomain 0/0/0 (41)

18:51:59.397461 ARP, Request who-has 10.4.16.58 tell 10.4.16.1, length 46 18:51:59.397597 IP linuxwksta.37684 > dns.company.com.domain: 15022+ PTR?

58.16.4.10.in-addr.arpa. (41)

Given the traffic report, which of the following is MOST likely causing the slow traffic?

A. DNS poisoning

B. Improper network zoning

C. ARP poisoning

D. Improper LUN masking

Answer: B



Q3. A corporation has Research and Development (R&D) and IT support teams, each requiring separate networks with independent control of their security boundaries to support department objectives. The corporationu2021s Information Security Officer (ISO) is responsible for providing firewall services to both departments, but does not want to increase the hardware footprint within the datacenter. Which of the following should the ISO consider to provide the independent functionality required by each departmentu2021s IT teams?

A. Put both departments behind the firewall and assign administrative control for each department to the corporate firewall.

B. Provide each department with a virtual firewall and assign administrative control to the physical firewall.

C. Put both departments behind the firewall and incorporate restrictive controls on each departmentu2021s network.

A. D. Provide each department with a virtual firewall and assign appropriate levels of management for the virtual device.

Answer: D



Q4. A new startup company with very limited funds wants to protect the organization from external threats by implementing some type of best practice security controls across a number of hosts located in the application zone, the production zone, and the core network. The 50 hosts in the core network are a mixture of Windows and Linux based systems, used by development staff to develop new applications. The single Windows host in the application zone is used exclusively by the production team to control software deployments into the production zone. There are 10 UNIX web application hosts in the production zone which are publically accessible.

Development staff is required to install and remove various types of software from their hosts on a regular basis while the hosts in the zone rarely require any type of configuration changes.

Which of the following when implemented would provide the BEST level of protection with the LEAST amount of disruption to staff?

A. NIPS in the production zone, HIPS in the application zone, and anti-virus / anti-malware across all Windows hosts.

B. NIPS in the production zone, NIDS in the application zone, HIPS in the core network, and anti-virus / anti-malware across all hosts.

A. C. HIPS in the production zone, NIPS in the application zone, and HIPS in the core network.

D. NIDS in the production zone, HIDS in the application zone, and anti-virus / anti-malware across all hosts.

Answer: A



Q5. A retail bank has had a number of issues in regards to the integrity of sensitive information across all of its customer databases. This has resulted in the banku2021s share price decreasing in value by 50% and regulatory intervention and monitoring.

The new Chief Information Security Officer (CISO) as a result has initiated a program of work to solve the issues.

The business has specified that the solution needs to be enterprise grade and meet the following requirements:

In order to solve this problem, which of the following security solutions will BEST meet the above requirements? (Select THREE).

A. Implement a security operations center to provide real time monitoring and incident response with self service reporting capability.

B. Implement an aggregation based SIEM solution to be deployed on the log servers of the major platforms, applications, and infrastructure.

C. Implement a security operations center to provide real time monitoring and incident response and an event correlation dashboard with self service reporting capability.

D. Ensure that the network operations center has the tools to provide real time monitoring and incident response and an event correlation dashboard with self service reporting capabilities.

E. Implement an agent only based SIEM solution to be deployed on all major platforms, applications, and infrastructures.

F. Ensure appropriate auditing is enabled to capture the required information.

G. Manually pull the logs from the major platforms, applications, and infrastructures to a central secure server.

Answer: B,C,F



Q6. A security manager is developing new policies and procedures. Which of the following is a best practice in end user security?

A. Employee identity badges and physical access controls to ensure only staff are allowed onsite.

B. A training program that is consistent, ongoing, and relevant.

C. Access controls to prevent end users from gaining access to confidential data.

D. Access controls for computer systems and networks with two-factor authentication.

Answer: B



Q7. An insurance company has an online quoting system for insurance premiums. It allows potential customers to fill in certain details about their car and obtain a quote. During an investigation, the following patterns were detected:

Pattern 1 u2013 Analysis of the logs identifies that insurance premium forms are being filled in but only single fields are incrementally being updated.

Pattern 2 u2013 For every quote completed, a new customer number is created; due to legacy systems, customer numbers are running out.

Which of the following is the attack type the system is susceptible to, and what is the BEST way to defend against it? (Select TWO).

A. Apply a hidden field that triggers a SIEM alert

B. Cross site scripting attack

C. Resource exhaustion attack

D. Input a blacklist of all known BOT malware IPs into the firewall

E. SQL injection

F. Implement an inline WAF and integrate into SIEM

G. Distributed denial of service

H. Implement firewall rules to block the attacking IP addresses

Answer: C,F



Q8. A security policy states that all applications on the network must have a password length of eight characters. There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in six months, and two are not expected to be upgraded or removed from the network. Which of the following processes should be followed?

A. Establish a risk matrix

B. Inherit the risk for six months

C. Provide a business justification to avoid the risk

D. Provide a business justification for a risk exception

Answer: D



Q9. A business owner has raised concerns with the Chief Information Security Officer (CISO) because money has been spent on IT security infrastructure, but corporate assets are still found to be vulnerable. The business recently implemented a patch management product and SOE hardening initiative. A third party auditor reported findings against the business because some systems were missing patches. Which of the following statements BEST describes this situation?

A. The business owner is at fault because they are responsible for patching the systems and have already been given patch management and SOE hardening products.

B. The audit findings are invalid because remedial steps have already been applied to patch servers and the remediation takes time to complete.

C. The CISO has not selected the correct controls and the audit findings should be assigned to them instead of the business owner.

D. Security controls are generally never 100% effective and gaps should be explained to stakeholders and managed accordingly.

Answer: D



Q10. CORRECT TEXT

Answer: 192.18.1.0/24 any 192.168.20.0/24 3389 any



Recommend!! Get the Pinpoint CAS-002 dumps in VCE and PDF From Examcollectionplus, Welcome to download: https://www.examcollectionplus.net/vce-CAS-002/ (New 532 Q&As Version)