The fantasy that have a new CompTIA CAS-002 certification of the ambitious IT aspirants may come true soon. If you want to successfully attain the CAS-002 certificate, try out our CompTIA online training program. We have thousands involving candidates who have obtain certified in the CompTIA CAS-002 exam around the globe. Short of CompTIA CompTIA preparation materials, youd better get park in our CompTIA CAS-002 coaching course. Its must be the most effective decision you might have made. The actual candidates for CompTIA CompTIA CAS-002 exam are generally required to get comprehensive and thorough knowing of the CompTIA CAS-002 exam contents. The CAS-002 bootcamp can confirm to be an incredible help for you to get ready for the real test.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for CompTIA CAS-002 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW CAS-002 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/CAS-002-exam-dumps.html

2021 Mar CAS-002 latest exam

Q91. DRAG DROP - (Topic 3) 

Drag and Drop the following information types on to the appropriate CIA category 

Answer: 


Q92. - (Topic 1) 

An industry organization has implemented a system to allow trusted authentication between all of its partners. The system consists of a web of trusted RADIUS servers communicating over the Internet. An attacker was able to set up a malicious server and conduct a successful man-in-the-middle attack. Which of the following controls should be implemented to mitigate the attack in the future? 

A. Use PAP for secondary authentication on each RADIUS server 

B. Disable unused EAP methods on each RADIUS server 

C. Enforce TLS connections between RADIUS servers 

D. Use a shared secret for each pair of RADIUS servers 

Answer:


Q93. - (Topic 1) 

A company is deploying a new iSCSI-based SAN. The requirements are as follows: 

Which of the following design specifications meet all the requirements? (Select TWO). 

A. Targets use CHAP authentication 

B. IPSec using AH with PKI certificates for authentication 

C. Fiber channel should be used with AES 

D. Initiators and targets use CHAP authentication 

E. Fiber channel over Ethernet should be used 

F. IPSec using AH with PSK authentication and 3DES 

G. Targets have SCSI IDs for authentication 

Answer: B,D 


Q94. - (Topic 2) 

Since the implementation of IPv6 on the company network, the security administrator has been unable to identify the users associated with certain devices utilizing IPv6 addresses, even when the devices are centrally managed. 

en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 

ether f8:1e:af:ab:10:a3 

inet6 fw80::fa1e:dfff:fee6:9d8%en1 prefixlen 64 scopeid 0x5 

inet 192.168.1.14 netmask 0xffffff00 broadcast 192.168.1.255 

inet6 2001:200:5:922:1035:dfff:fee6:9dfe prefixlen 64 autoconf 

inet6 2001:200:5:922:10ab:5e21:aa9a:6393 prefixlen 64 autoconf temporary 

nd6 options=1<PERFORMNUD> 

media: autoselect 

status: active 

Given this output, which of the following protocols is in use by the company and what can the system administrator do to positively map users with IPv6 addresses in the future? (Select TWO). 

A. The devices use EUI-64 format 

B. The routers implement NDP 

C. The network implements 6to4 tunneling 

D. The router IPv6 advertisement has been disabled 

E. The administrator must disable IPv6 tunneling 

F. The administrator must disable the mobile IPv6 router flag 

G. The administrator must disable the IPv6 privacy extensions 

H. The administrator must disable DHCPv6 option code 1 

Answer: B,G 


Q95. - (Topic 2) 

Company XYZ finds itself using more cloud-based business tools, and password management is becoming onerous. Security is important to the company; as a result, password replication and shared accounts are not acceptable. Which of the following implementations addresses the distributed login with centralized authentication and has wide compatibility among SaaS vendors? 

A. Establish a cloud-based authentication service that supports SAML. 

B. Implement a new Diameter authentication server with read-only attestation. 

C. Install a read-only Active Directory server in the corporate DMZ for federation. 

D. Allow external connections to the existing corporate RADIUS server. 

Answer:


Up to date CAS-002 exam engine:

Q96. - (Topic 1) 

A new piece of ransomware got installed on a company’s backup server which encrypted the hard drives containing the OS and backup application configuration but did not affect the deduplication data hard drives. During the incident response, the company finds that all backup tapes for this server are also corrupt. Which of the following is the PRIMARY concern? 

A. Determining how to install HIPS across all server platforms to prevent future incidents 

B. Preventing the ransomware from re-infecting the server upon restore 

C. Validating the integrity of the deduplicated data 

D. Restoring the data will be difficult without the application configuration 

Answer:


Q97. - (Topic 2) 

A vulnerability scanner report shows that a client-server host monitoring solution operating in the credit card corporate environment is managing SSL sessions with a weak algorithm which does not meet corporate policy. Which of the following are true statements? (Select TWO). 

A. The X509 V3 certificate was issued by a non trusted public CA. 

B. The client-server handshake could not negotiate strong ciphers. 

C. The client-server handshake is configured with a wrong priority. 

D. The client-server handshake is based on TLS authentication. 

E. The X509 V3 certificate is expired. 

F. The client-server implements client-server mutual authentication with different certificates. 

Answer: B,C 


Q98. - (Topic 2) 

ABC Company must achieve compliance for PCI and SOX. Which of the following would BEST allow the organization to achieve compliance and ensure security? (Select THREE). 

A. Establish a list of users that must work with each regulation 

B. Establish a list of devices that must meet each regulation 

C. Centralize management of all devices on the network 

D. Compartmentalize the network 

E. Establish a company framework 

F. Apply technical controls to meet compliance with the regulation 

Answer: B,D,F 


Q99. - (Topic 2) 

An insurance company has an online quoting system for insurance premiums. It allows potential customers to fill in certain details about their car and obtain a quote. During an investigation, the following patterns were detected: 

Pattern 1 – Analysis of the logs identifies that insurance premium forms are being filled in but only single fields are incrementally being updated. 

Pattern 2 – For every quote completed, a new customer number is created; due to legacy systems, customer numbers are running out. 

Which of the following is the attack type the system is susceptible to, and what is the BEST way to defend against it? (Select TWO). 

A. Apply a hidden field that triggers a SIEM alert 

B. Cross site scripting attack 

C. Resource exhaustion attack 

D. Input a blacklist of all known BOT malware IPs into the firewall 

E. SQL injection 

F. Implement an inline WAF and integrate into SIEM 

G. Distributed denial of service 

H. Implement firewall rules to block the attacking IP addresses 

Answer: C,F 


Q100. - (Topic 1) 

Ann, a software developer, wants to publish her newly developed software to an online store. Ann wants to ensure that the software will not be modified by a third party or end users before being installed on mobile devices. Which of the following should Ann implement to stop modified copies of her software from running on mobile devices? 

A. Single sign-on 

B. Identity propagation 

C. Remote attestation 

D. Secure code review 

Answer: