CompTIA CAS-002 - CompTIA Advanced Security Practitioner (CASP) Exam

Question #1 (Topic: Topic 1)
Which of the following activities is commonly deemed OUT OF SCOPE when undertaking
a penetration test?
A. Test password complexity of all login fields and input validation of form fields B. Reverse engineering any thick client software that has been provided for the test C. Undertaking network-based denial of service attacks in production environment D. Attempting to perform blind SQL injection and reflected cross-site scripting attacks E. Running a vulnerability scanning tool to assess network and host weaknesses
Answer: C
Question #2 (Topic: Topic 1)
An insurance company is looking to purchase a smaller company in another country. Which
of the following tasks would the security administrator perform as part of the security due
diligence?
A. Review switch and router configurations B. Review the security policies and standards C. Perform a network penetration test D. Review the firewall rule set and IPS logs
Answer: B
Question #3 (Topic: Topic 1)
After a security incident, an administrator would like to implement policies that would help
reduce fraud and the potential for collusion between employees. Which of the following
would help meet these goals by having co-workers occasionally audit another worker's
position?
A. Least privilege B. Job rotation C. Mandatory vacation D. Separation of duties
Answer: B
Question #4 (Topic: Topic 1)
A large hospital has implemented BYOD to allow doctors and specialists the ability to
access patient medical records on their tablets. The doctors and specialists access patient
records over the hospitals guest WiFi network which is isolated from the internal network
with appropriate security controls. The patient records management system can be
accessed from the guest network and requires two factor authentication. Using a remote
desktop type interface, the doctors and specialists can interact with the hospitals system.
Cut and paste and printing functions are disabled to prevent the copying of data to BYOD
devices. Which of the following are of MOST concern? (Select TWO).
A. Privacy could be compromised as patient records can be viewed in uncontrolled areas. B. Device encryption has not been enabled and will result in a greater likelihood of data loss. C. The guest WiFi may be exploited allowing non-authorized individuals access to confidential patient data. D. Malware may be on BYOD devices which can extract data via key logging and screen scrapes. E. Remote wiping of devices should be enabled to ensure any lost device is rendered inoperable.
Answer: A,D
Question #5 (Topic: Topic 1)
The risk manager is reviewing a report which identifies a requirement to keep a business
critical legacy system operational for the next two years. The legacy system is out of
support because the vendor and security patches are no longer released. Additionally, this
is a proprietary embedded system and little is documented and known about it. Which of
the following should the Information Technology department implement to reduce the
security risk from a compromise of this system?
A. Virtualize the system and migrate it to a cloud provider. B. Segment the device on its own secure network. C. Install an antivirus and HIDS on the system. D. Hire developers to reduce vulnerabilities in the code.
Answer: B
Download Exam
Page: 1 / 107
Total 532 questions