Exam Details

  • Exam Code
    :CAS-003
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :791 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-003 Questions & Answers

  • Question 571:

    The finance department for an online shopping website has discovered that a number of customers were able to purchase goods and services without any payments. Further analysis conducted by the security investigations team indicated that the website allowed customers to update a payment amount for shipping. A specially crafted value could be entered and cause a roll over, resulting in the shipping cost being subtracted from the balance and in some instances resulted in a negative balance. As a result, the system processed the negative balance as zero dollars. Which of the following BEST describes the application issue?

    A. Race condition

    B. Click-jacking

    C. Integer overflow

    D. Use after free

    E. SQL injection

  • Question 572:

    A security administrator is assessing a new application. The application uses an API that is supposed to encrypt text strings that are stored in memory. How might the administrator test that the strings are indeed encrypted in memory?

    A. Use fuzzing techniques to examine application inputs

    B. Run nmap to attach to application memory

    C. Use a packet analyzer to inspect the strings

    D. Initiate a core dump of the application

    E. Use an HTTP interceptor to capture the text strings

  • Question 573:

    A security administrator has noticed that an increased number of employees' workstations are becoming infected with malware. The company deploys an enterprise antivirus system as well as a web content filter, which blocks access to malicious web sites where malware files can be downloaded. Additionally, the company implements technical measures to disable external storage. Which of the following is a technical control that the security administrator should implement next to reduce malware infection?

    A. Implement an Acceptable Use Policy which addresses malware downloads.

    B. Deploy a network access control system with a persistent agent.

    C. Enforce mandatory security awareness training for all employees and contractors.

    D. Block cloud-based storage software on the company network.

  • Question 574:

    A vulnerability scanner report shows that a client-server host monitoring solution operating in the credit card corporate environment is managing SSL sessions with a weak algorithm which does not meet corporate policy. Which of the following are true statements? (Select TWO).

    A. The X509 V3 certificate was issued by a non trusted public CA.

    B. The client-server handshake could not negotiate strong ciphers.

    C. The client-server handshake is configured with a wrong priority.

    D. The client-server handshake is based on TLS authentication.

    E. The X509 V3 certificate is expired.

    F. The client-server implements client-server mutual authentication with different certificates.

  • Question 575:

    A critical system audit shows that the payroll system is not meeting security policy due to missing OS security patches. Upon further review, it appears that the system is not being patched at all. The vendor states that the system is only supported on the current OS patch level. Which of the following compensating controls should be used to mitigate the vulnerability of missing OS patches on this system?

    A. Isolate the system on a secure network to limit its contact with other systems

    B. Implement an application layer firewall to protect the payroll system interface

    C. Monitor the system's security log for unauthorized access to the payroll application

    D. Perform reconciliation of all payroll transactions on a daily basis

  • Question 576:

    The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality. Which of the following equipment MUST be deployed to guard against unknown threats?

    A. Cloud-based antivirus solution, running as local admin, with push technology for definition updates.

    B. Implementation of an offsite data center hosting all company data, as well as deployment of VDI for all client computing needs.

    C. Host based heuristic IPS, segregated on a management VLAN, with direct control of the perimeter firewall ACLs.

    D. Behavior based IPS with a communication link to a cloud based vulnerability and threat feed.

  • Question 577:

    Company XYZ has purchased and is now deploying a new HTML5 application. The company wants to hire a penetration tester to evaluate the security of the client and server components of the proprietary web application before launch. Which of the following is the penetration tester MOST likely to use while performing black box testing of the security of the company's purchased application? (Select TWO).

    A. Code review

    B. Sandbox

    C. Local proxy

    D. Fuzzer

    E. Port scanner

  • Question 578:

    The risk manager at a small bank wants to use quantitative analysis to determine the ALE of running a business system at a location which is subject to fires during the year. A risk analyst reports to the risk manager that the asset value of the business system is $120,000 and, based on industry data, the exposure factor to fires is only 20% due to the fire suppression system installed at the site. Fires occur in the area on average every four years. Which of the following is the ALE?

    A. $6,000

    B. $24,000

    C. $30,000

    D. $96,000

  • Question 579:

    The administrator is troubleshooting availability issues on an FCoE-based storage array that uses deduplication. The single controller in the storage array has failed, so the administrator wants to move the drives to a storage array from a different manufacturer in order to access the data. Which of the following issues may potentially occur?

    A. The data may not be in a usable format.

    B. The new storage array is not FCoE based.

    C. The data may need a file system check.

    D. The new storage array also only has a single controller.

  • Question 580:

    Ann, a systems engineer, is working to identify an unknown node on the corporate network. To begin her investigative work, she runs the following nmap command string: user@hostname:~$ sudo nmap 192.168.1.54 Based on the output, nmap is unable to identify the OS running on the node, but the following ports are open on the device: TCP/22 TCP/111 TCP/512-514 TCP/2049 TCP/32778 Based on this information, which of the following operating systems is MOST likely running on the unknown node?

    A. Linux

    B. Windows

    C. Solaris

    D. OSX

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.