CAS-002 testing software(311 to 318) for IT professionals: Jun 2017 Edition

Master the CAS-002 CompTIA Advanced Security Practitioner (CASP) content and be ready for exam day success quickly with this Testking CAS-002 vce. We guarantee it!We make it a reality and give you real CAS-002 questions in our CompTIA CAS-002 braindumps.Latest 100% VALID CompTIA CAS-002 Exam Questions Dumps at below page. You can use our CompTIA CAS-002 braindumps and pass your exam.

2017 NEW RECOMMEND

Free VCE & PDF File for CompTIA CAS-002 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW CAS-002 Exam Dumps (PDF & VCE):
Available on:
http://www.certleader.com/CAS-002-dumps.html

Q311. – (Topic 5) 

A company uses a custom Line of Business (LOB) application to facilitate all back-end manufacturing control. Upon investigation, it has been determined that the database used by the LOB application uses a proprietary data format. The risk management group has flagged this as a potential weakness in the company’s operational robustness. Which of the following would be the GREATEST concern when analyzing the manufacturing control application? 

A. Difficulty backing up the custom database 

B. Difficulty migrating to new hardware 

C. Difficulty training new admin personnel 

D. Difficulty extracting data from the database 

Answer:

Q312. – (Topic 2) 

The telecommunications manager wants to improve the process for assigning company-owned mobile devices and ensuring data is properly removed when no longer needed. Additionally, the manager wants to onboard and offboard personally owned mobile devices that will be used in the BYOD initiative. Which of the following should be implemented to ensure these processes can be automated? (Select THREE). 

A. SIM’s PIN 

B. Remote wiping 

C. Chargeback system 

D. MDM software 

E. Presence software 

F. Email profiles 

G. Identity attestation 

H. GPS tracking 

Answer: B,D,G 

Q313. – (Topic 1) 

Which of the following provides the BEST risk calculation methodology? 

A. Annual Loss Expectancy (ALE) x Value of Asset 

B. Potential Loss x Event Probability x Control Failure Probability 

C. Impact x Threat x Vulnerability 

D. Risk Likelihood x Annual Loss Expectancy (ALE) 

Answer:

Q314. – (Topic 1) 

Which of the following describes a risk and mitigation associated with cloud data storage? 

A. Risk: Shared hardware caused data leakageMitigation: Strong encryption at rest 

B. Risk: Offsite replicationMitigation: Multi-site backups 

C. Risk: Data loss from de-duplicationMitigation: Dynamic host bus addressing 

D. Risk: Combined data archivingMitigation: Two-factor administrator authentication 

Answer:

Q315. – (Topic 1) 

A security administrator is tasked with implementing two-factor authentication for the company VPN. The VPN is currently configured to authenticate VPN users against a backend RADIUS server. New company policies require a second factor of authentication, and the Information Security Officer has selected PKI as the second factor. Which of the following should the security administrator configure and implement on the VPN concentrator to implement the second factor and ensure that no error messages are displayed to the user during the VPN connection? (Select TWO). 

A. The user’s certificate private key must be installed on the VPN concentrator. 

B. The CA’s certificate private key must be installed on the VPN concentrator. 

C. The user certificate private key must be signed by the CA. 

D. The VPN concentrator’s certificate private key must be signed by the CA and installed on the VPN concentrator. 

E. The VPN concentrator’s certificate private key must be installed on the VPN concentrator. 

F. The CA’s certificate public key must be installed on the VPN concentrator. 

Answer: E,F 

Q316. – (Topic 3) 

At 10:35 a.m. a malicious user was able to obtain a valid authentication token which allowed read/write access to the backend database of a financial company. At 10:45 a.m. the security administrator received multiple alerts from the company’s statistical anomaly-based IDS about a company database administrator performing unusual transactions. At 

10:55 a.m. the security administrator resets the database administrator’s password. 

At 11:00 a.m. the security administrator is still receiving alerts from the IDS about unusual transactions from the same user. Which of the following is MOST likely the cause of the alerts? 

A. The IDS logs are compromised. 

B. The new password was compromised. 

C. An input validation error has occurred. 

D. A race condition has occurred. 

Answer:

Q317. – (Topic 2) 

A small company is developing a new Internet-facing web application. The security requirements are: 

1. Users of the web application must be uniquely identified and authenticated. 

2. Users of the web application will not be added to the company’s directory services. 

3. Passwords must not be stored in the code. 

Which of the following meets these requirements? 

A. Use OpenID and allow a third party to authenticate users. 

B. Use TLS with a shared client certificate for all users. 

C. Use SAML with federated directory services. 

D. Use Kerberos and browsers that support SAML. 

Answer:

Q318. – (Topic 4) 

A systems administrator establishes a CIFS share on a Unix device to share data to windows systems. The security authentication on the windows domain is set to the highest level. Windows users are stating that they cannot authenticate to the Unix share. Which of the following settings on the Unix server is the cause of this problem? 

A. Refuse LM and only accept NTLMv2 

B. Accept only LM 

C. Refuse NTLMv2 and accept LM 

D. Accept only NTLM 

Answer:

Certleader Dumps
Certleader is a company specialized on providing high quality IT exam materials and fully committed to assist our respected clients crack any IT certification tests on their 1st efforts.