[Validated] CAS-002 CompTIA practice 31-40 (Apr 2017)

CAS-002 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library! Try it Free Today!

https://www.exambible.com/CAS-002-exam/

Product Description:
Exam Number/Code: CAS-002
Exam name: CompTIA Advanced Security Practitioner (CASP)
n questions with full explanations
Certification: CompTIA Certification
Last updated on Global synchronizing

Free Certification Real IT CAS-002 Exam pdf Collection

Q31. - (Topic 2) 

An educational institution would like to make computer labs available to remote students. The labs are used for various IT networking, security, and programming courses. The requirements are: 

1. Each lab must be on a separate network segment. 

2. Labs must have access to the Internet, but not other lab networks. 

3. Student devices must have network access, not simple access to hosts on the lab networks. 

4. Students must have a private certificate installed before gaining access. 

5. Servers must have a private certificate installed locally to provide assurance to the students. 

6. All students must use the same VPN connection profile. 

Which of the following components should be used to achieve the design in conjunction with directory services? 

A. L2TP VPN over TLS for remote connectivity, SAML for federated authentication, firewalls between each lab segment 

B. SSL VPN for remote connectivity, directory services groups for each lab group, ACLs on routing equipment 

C. IPSec VPN with mutual authentication for remote connectivity, RADIUS for authentication, ACLs on network equipment 

D. Cloud service remote access tool for remote connectivity, OAuth for authentication, ACL on routing equipment 

Answer:


Q32. - (Topic 5) 

Joe, a hacker, has discovered he can specifically craft a webpage that when viewed in a browser crashes the browser and then allows him to gain remote code execution in the context of the victim’s privilege level. The browser crashes due to an exception error when a heap memory that is unused is accessed. Which of the following BEST describes the application issue? 

A. Integer overflow 

B. Click-jacking 

C. Race condition 

D. SQL injection 

E. Use after free 

F. Input validation 

Answer:


Q33. - (Topic 3) 

A security researcher is about to evaluate a new secure VoIP routing appliance. The appliance manufacturer claims the new device is hardened against all known attacks and several un-disclosed zero day exploits. The code base used for the device is a combination of compiled C and TC/TKL scripts. Which of the following methods should the security research use to enumerate the ports and protocols in use by the appliance? 

A. Device fingerprinting 

B. Switchport analyzer 

C. Grey box testing 

D. Penetration testing 

Answer:


Q34. - (Topic 3) 

A new startup company with very limited funds wants to protect the organization from external threats by implementing some type of best practice security controls across a number of hosts located in the application zone, the production zone, and the core network. The 50 hosts in the core network are a mixture of Windows and Linux based systems, used by development staff to develop new applications. The single Windows host in the application zone is used exclusively by the production team to control software deployments into the production zone. There are 10 UNIX web application hosts in the production zone which are publically accessible. 

Development staff is required to install and remove various types of software from their hosts on a regular basis while the hosts in the zone rarely require any type of configuration changes. 

Which of the following when implemented would provide the BEST level of protection with the LEAST amount of disruption to staff? 

A. NIPS in the production zone, HIPS in the application zone, and anti-virus / anti-malware across all Windows hosts. 

B. NIPS in the production zone, NIDS in the application zone, HIPS in the core network, and anti-virus / anti-malware across all hosts. 

C. HIPS in the production zone, NIPS in the application zone, and HIPS in the core network. 

D. NIDS in the production zone, HIDS in the application zone, and anti-virus / anti-malware across all hosts. 

Answer:


Q35. - (Topic 1) 

A developer has implemented a piece of client-side JavaScript code to sanitize a user’s provided input to a web page login screen. The code ensures that only the upper case and lower case letters are entered in the username field, and that only a 6-digit PIN is entered in the password field. A security administrator is concerned with the following web server log: 

10.235.62.11 – - [02/Mar/2014:06:13:04] “GET /site/script.php?user=admin&pass=pass%20or%201=1 HTTP/1.1” 200 5724 

Given this log, which of the following is the security administrator concerned with and which fix should be implemented by the developer? 

A. The security administrator is concerned with nonprintable characters being used to gain administrative access, and the developer should strip all nonprintable characters. 

B. The security administrator is concerned with XSS, and the developer should normalize Unicode characters on the browser side. 

C. The security administrator is concerned with SQL injection, and the developer should implement server side input validation. 

D. The security administrator is concerned that someone may log on as the administrator, and the developer should ensure strong passwords are enforced. 

Answer:


Q36. - (Topic 5) 

The threat abatement program manager tasked the software engineer with identifying the fastest implementation of a hash function to protect passwords with the least number of collisions. Which of the following should the software engineer implement to best meet the requirements? 

A. hash = sha512(password + salt);for (k = 0; k < 4000; k++) {hash = sha512 (hash);} 

B. hash = md5(password + salt);for (k = 0; k < 5000; k++) {hash = md5 (hash);} 

C. hash = sha512(password + salt);for (k = 0; k < 3000; k++) {hash = sha512 (hash + password + salt);} 

D. hash1 = sha1(password + salt);hash = sha1 (hash1); 

Answer:


Q37. - (Topic 1) 

Three companies want to allow their employees to seamlessly connect to each other’s wireless corporate networks while keeping one consistent wireless client configuration. Each company wants to maintain its own authentication infrastructure and wants to ensure that an employee who is visiting the other two companies is authenticated by the home office when connecting to the other companies’ wireless network. All three companies have agreed to standardize on 802.1x EAP-PEAP-MSCHAPv2 for client configuration. Which of the following should the three companies implement? 

A. The three companies should agree on a single SSID and configure a hierarchical RADIUS system which implements trust delegation. 

B. The three companies should implement federated authentication through Shibboleth connected to an LDAP backend and agree on a single SSID. 

C. The three companies should implement a central portal-based single sign-on and agree to use the same CA when issuing client certificates. 

D. All three companies should use the same wireless vendor to facilitate the use of a shared cloud based wireless controller. 

Answer:


Q38. - (Topic 2) 

A penetration tester is inspecting traffic on a new mobile banking application and sends the following web request: 

POST http://www.example.com/resources/NewBankAccount HTTP/1.1 

Content-type: application/json 

“account”: 

{ “creditAccount”:”Credit Card Rewards account”} { 

 “salesLeadRef”:”www.example.com/badcontent/exploitme.exe”} 

], 

“customer”: 

{ “name”:”Joe Citizen”} { “custRef”:”3153151”} 

The banking website responds with: 

HTTP/1.1 200 OK 

“newAccountDetails”: 

{ “cardNumber”:”1234123412341234”} { “cardExpiry”:”2020-12-31”} 

{ “cardCVV”:”909”} 

], 

“marketingCookieTracker”:“JSESSIONID=000000001” 

“returnCode”:“Account added successfully” 

Which of the following are security weaknesses in this example? (Select TWO). 

A. Missing input validation on some fields 

B. Vulnerable to SQL injection 

C. Sensitive details communicated in clear-text 

D. Vulnerable to XSS 

E. Vulnerable to malware file uploads 

F. JSON/REST is not as secure as XML 

Answer: A,C 


Q39. - (Topic 4) 

An audit at a popular on-line shopping site reveals that a flaw in the website allows customers to purchase goods at a discounted rate. To improve security the Chief Information Security Officer (CISO) has requested that the web based shopping cart application undergo testing to validate user input in both free form text fields and drop down boxes. 

Which of the following is the BEST combination of tools and / or methods to use? 

A. Blackbox testing and fingerprinting 

B. Code review and packet analyzer 

C. Fuzzer and HTTP interceptor 

D. Enumerator and vulnerability assessment 

Answer:


Q40. - (Topic 1) 

The helpdesk department desires to roll out a remote support application for internal use on all company computers. This tool should allow remote desktop sharing, system log gathering, chat, hardware logging, inventory management, and remote registry access. The risk management team has been asked to review vendor responses to the RFQ. Which of the following questions is the MOST important? 

A. What are the protections against MITM? 

B. What accountability is built into the remote support application? 

C. What encryption standards are used in tracking database? 

D. What snapshot or “undo” features are present in the application? 

E. What encryption standards are used in remote desktop and file transfer functionality? 

Answer: