Exam Details

  • Exam Code
    :CAS-003
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :791 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-003 Questions & Answers

  • Question 521:

    Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic records for 2000 sales force employees. Source records will be email, PC, network shares, and applications.

    After all restrictions have been lifted, which of the following should the information manager review?

    A. Data retention policy

    B. Legal hold

    C. Chain of custody

    D. Scope statement

  • Question 522:

    The Chief Financial Officer (CFO) of a major hospital system has received a ransom letter that demands a large sum of cryptocurrency be transferred to an anonymous account. If the transfer does not take place within ten hours, the letter states that patient information will be released on the dark web. A partial listing of recent patients is included in the letter. This is the first indication that a breach took place. Which of the following steps should be done FIRST?

    A. Review audit logs to determine the extent of the breach

    B. Pay the hacker under the condition that all information is destroyed

    C. Engage a counter-hacking team to retrieve the data

    D. Notify the appropriate legal authorities and legal counsel

  • Question 523:

    A penetration tester noticed special characters in a database table. The penetration tester configured the browser to use an HTTP interceptor to verify that the front-end user registration web form accepts invalid input in the user's age field. The developer was notified and asked to fix the issue.

    Which of the following is the MOST secure solution for the developer to implement?

    A. IF $AGE == "!@#%^and*()_+<>?":{}[]" THEN ERROR

    B. IF $AGE == [1234567890] {1,3} THEN CONTINUE

    C. IF $AGE != "a-bA-Z!@#$%^and*()_+<>?"{}[]"THEN CONTINUE

    D. IF $AGE == [1-0] {0,2} THEN CONTINUE

  • Question 524:

    The Chief Information Officer (CIO) wants to increase security and accessibility among the organization's cloud SaaS applications. The applications are configured to use passwords, and two-factor authentication is not provided natively. Which of the following would BEST address the CIO's concerns?

    A. Procure a password manager for the employees to use with the cloud applications.

    B. Create a VPN tunnel between the on-premises environment and the cloud providers.

    C. Deploy applications internally and migrate away from SaaS applications.

    D. Implement an IdP that supports SAML and time-based, one-time passwords.

  • Question 525:

    Management is reviewing the results of a recent risk assessment of the organization's policies and procedures. During the risk assessment it is determined that procedures associated with background checks have not been effectively implemented. In response to this risk, the organization elects to revise policies and procedures related to background checks and use a third-party to perform background checks on all new employees.

    Which of the following risk management strategies has the organization employed?

    A. Transfer

    B. Mitigate

    C. Accept

    D. Avoid

    E. Reject

  • Question 526:

    A consultant is hired to perform a passive vulnerability assessment of a company to determine what information might be collected about the company and its employees. The assessment will be considered successful if the consultant can discover the name of one of the IT administrators. Which of the following is MOST likely to produce the needed information?

    A. Whois

    B. DNS enumeration

    C. Vulnerability scanner

    D. Fingerprinting

  • Question 527:

    An engineer is assisting with the design of a new virtualized environment that will house critical company services and reduce the datacenter's physical footprint. The company has expressed concern about the integrity of operating systems and wants to ensure a vulnerability exploited in one datacenter segment would not lead to the compromise of all others.

    Which of the following design objectives should the engineer complete to BEST mitigate the company's concerns? (Choose two.)

    A. Deploy virtual desktop infrastructure with an OOB management network

    B. Employ the use of vT PM with boot attestation

    C. Leverage separate physical hardware for sensitive services and data

    D. Use a community CSP with independently managed security services

    E. Deploy to a private cloud with hosted hypervisors on each physical machine

  • Question 528:

    A company's existing forward proxies support software-based TLS decryption, but are currently at 60% load just dealing with AV scanning and content analysis for HTTP traffic. More than 70% outbound web traffic is currently encrypted. The switching and routing network infrastructure precludes adding capacity, preventing the installation of a dedicated TLS decryption system. The network firewall infrastructure is currently at 30% load and has software decryption modules that can be activated by purchasing additional license keys. An existing project is rolling out agent updates to end-user desktops as part of an endpoint security refresh.

    Which of the following is the BEST way to address these issues and mitigate risks to the organization?

    A. Purchase the SSL, decryption license for the firewalls and route traffic back to the proxies for end-user categorization and malware analysis.

    B. Roll out application whitelisting to end-user desktops and decommission the existing proxies, freeing up network ports.

    C. Use an EDP solution to address the malware issue and accept the diminishing role of the proxy for URL categorization in the short team.

    D. Accept the current risk and seek possible funding approval in the next budget cycle to replace the existing proxies with ones with more capacity.

  • Question 529:

    Which of the following is an external pressure that causes companies to hire security assessors and penetration testers?

    A. Lack of adequate in-house testing skills.

    B. Requirements for geographically based assessments

    C. Cost reduction measures

    D. Regulatory insistence on independent reviews.

  • Question 530:

    An architect was recently hired by a power utility to increase the security posture of the company's power generation and distribution sites. Upon review, the architect identifies legacy hardware with highly vulnerable and unsupported software driving critical operations. These systems must exchange data with each other, be highly synchronized, and pull from the Internet time sources. Which of the following architectural decisions would BEST reduce the likelihood of a successful attack without harming operational capability? (Choose two.)

    A. Isolate the systems on their own network

    B. Install a firewall and IDS between systems and the LAN

    C. Employ own stratum-0 and stratum-1 NTP servers

    D. Upgrade the software on critical systems

    E. Configure the systems to use government-hosted NTP servers

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.