Exam Details

  • Exam Code
    :CAS-003
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :791 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-003 Questions & Answers

  • Question 581:

    A security manager for a service provider has approved two vendors for connections to the service provider backbone. One vendor will be providing authentication services for its payment card service, and the other vendor will be providing maintenance to the service provider infrastructure sites. Which of the following business agreements is MOST relevant to the vendors and service provider's relationship?

    A. Memorandum of Agreement

    B. Interconnection Security Agreement

    C. Non-Disclosure Agreement

    D. Operating Level Agreement

  • Question 582:

    A risk manager has decided to use likelihood and consequence to determine the risk of an event occurring to a company asset. Which of the following is a limitation of this approach to risk management?

    A. Subjective and based on an individual's experience.

    B. Requires a high degree of upfront work to gather environment details.

    C. Difficult to differentiate between high, medium, and low risks.

    D. Allows for cost and benefit analysis.

    E. Calculations can be extremely complex to manage.

  • Question 583:

    Company policy requires that all company laptops meet the following baseline requirements:

    Software requirements:

    Antivirus Anti-malware Anti-spyware Log monitoring Full-disk encryption Terminal services enabled for RDP Administrative access for local users

    Hardware restrictions:

    Bluetooth disabled FireWire disabled WiFi adapter disabled

    Ann, a web developer, reports performance issues with her laptop and is not able to access any network resources. After further investigation, a bootkit was discovered and it was trying to access external websites. Which of the following hardening techniques should be applied to mitigate this specific issue from reoccurring? (Select TWO).

    A. Group policy to limit web access

    B. Restrict VPN access for all mobile users

    C. Remove full-disk encryption

    D. Remove administrative access to local users

    E. Restrict/disable TELNET access to network resources

    F. Perform vulnerability scanning on a daily basis

    G. Restrict/disable USB access

  • Question 584:

    A security consultant is conducting a network assessment and wishes to discover any legacy backup Internet connections the network may have. Where would the consultant find this information and why would it be valuable?

    A. This information can be found in global routing tables, and is valuable because backup connections typically do not have perimeter protection as strong as the primary connection.

    B. This information can be found by calling the regional Internet registry, and is valuable because backup connections typically do not require VPN access to the network.

    C. This information can be found by accessing telecom billing records, and is valuable because backup connections typically have much lower latency than primary connections.

    D. This information can be found by querying the network's DNS servers, and is valuable because backup DNS servers typically allow recursive queries from Internet hosts.

  • Question 585:

    A small company's Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the company's security posture quickly with regard to targeted attacks. Which of the following should the CSO conduct FIRST?

    A. Survey threat feeds from services inside the same industry.

    B. Purchase multiple threat feeds to ensure diversity and implement blocks for malicious traffic.

    C. Conduct an internal audit against industry best practices to perform a qualitative analysis.

    D. Deploy a UTM solution that receives frequent updates from a trusted industry vendor.

  • Question 586:

    Joe is a security architect who is tasked with choosing a new NIPS platform that has the ability to perform SSL inspection, analyze up to 10Gbps of traffic, can be centrally managed and only reveals inspected application payload data to specified internal security employees. Which of the following steps should Joe take to reach the desired outcome?

    A. Research new technology vendors to look for potential products. Contribute to an RFP and then evaluate RFP responses to ensure that the vendor product meets all mandatory requirements. Test the product and make a product recommendation.

    B. Evaluate relevant RFC and ISO standards to choose an appropriate vendor product. Research industry surveys, interview existing customers of the product and then recommend that the product be purchased.

    C. Consider outsourcing the product evaluation and ongoing management to an outsourced provider on the basis that each of the requirements are met and a lower total cost of ownership (TCO) is achieved.

    D. Choose a popular NIPS product and then consider outsourcing the ongoing device management to a cloud provider. Give access to internal security employees so that they can inspect the application payload data.

    E. Ensure that the NIPS platform can also deal with recent technological advancements, such as threats emerging from social media, BYOD and cloud storage prior to purchasing the product.

  • Question 587:

    The security engineer receives an incident ticket from the helpdesk stating that DNS lookup requests are no longer working from the office. The network team has ensured that Layer 2 and Layer 3 connectivity are working. Which of the following tools would a security engineer use to make sure the DNS server is listening on port 53?

    A. PING

    B. NESSUS

    C. NSLOOKUP

    D. NMAP

  • Question 588:

    Using SSL, an administrator wishes to secure public facing server farms in three subdomains:

    dc1.east.company.com, dc2.central.company.com, and dc3.west.company.com. Which of the following is the number of wildcard SSL certificates that should be purchased?

    A. 0

    B. 1

    C. 3

    D. 6

  • Question 589:

    An administrator wishes to replace a legacy clinical software product as it has become a security risk. The legacy product generates $10,000 in revenue a month. The new software product has an initial cost of $180,000 and a yearly maintenance of $2,000 after the first year. However, it will generate $15,000 in revenue per month and be more secure. How many years until there is a return on investment for this new package?

    A. 1

    B. 2

    C. 3

    D. 4

  • Question 590:

    ABC Company must achieve compliance for PCI and SOX. Which of the following would BEST allow the organization to achieve compliance and ensure security? (Select THREE).

    A. Establish a list of users that must work with each regulation

    B. Establish a list of devices that must meet each regulation

    C. Centralize management of all devices on the network

    D. Compartmentalize the network

    E. Establish a company framework

    F. Apply technical controls to meet compliance with the regulation

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.