Exam Details

  • Exam Code
    :CAS-003
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :791 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-003 Questions & Answers

  • Question 591:

    select id, firstname, lastname from authors User input= firstname= Hack;man lastname=Johnson Which of the following types of attacks is the user attempting?

    A. XML injection

    B. Command injection

    C. Cross-site scripting

    D. SQL injection

  • Question 592:

    A security engineer is a new member to a configuration board at the request of management. The company has two new major IT projects starting this year and wants to plan security into the application deployment. The board is primarily concerned with the applications' compliance with federal assessment and authorization standards. The security engineer asks for a timeline to determine when a security assessment of both applications should occur and does not attend subsequent configuration board meetings. If the security engineer is only going to perform a security assessment, which of the following steps in system authorization has the security engineer omitted?

    A. Establish the security control baseline

    B. Build the application according to software development security standards

    C. Review the results of user acceptance testing

    D. Consult with the stakeholders to determine which standards can be omitted

  • Question 593:

    An enterprise must ensure that all devices that connect to its networks have been previously approved. The solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs and administrative overhead, the security architect wants to outsource identity proofing and second factor digital delivery to the third party. Which of the following solutions will address the enterprise requirements?

    A. Implementing federated network access with the third party.

    B. Using a HSM at the network perimeter to handle network device access.

    C. Using a VPN concentrator which supports dual factor via hardware tokens.

    D. Implementing 802.1x with EAP-TTLS across the infrastructure.

  • Question 594:

    A security analyst, Ann, states that she believes Internet facing file transfer servers are being attacked. Which of the following is evidence that would aid Ann in making a case to management that action needs to be taken to safeguard these servers?

    A. Provide a report of all the IP addresses that are connecting to the systems and their locations

    B. Establish alerts at a certain threshold to notify the analyst of high activity

    C. Provide a report showing the file transfer logs of the servers

    D. Compare the current activity to the baseline of normal activity

  • Question 595:

    The technology steering committee is struggling with increased requirements stemming from an increase in telecommuting. The organization has not addressed telecommuting in the past. The implementation of a new SSL-VPN and a VOIP phone solution enables personnel to work from remote locations with corporate assets. Which of the following steps must the committee take FIRST to outline senior management's directives?

    A. Develop an information classification scheme that will properly secure data on corporate systems.

    B. Implement database views and constrained interfaces so remote users will be unable to access PII from personal equipment.

    C. Publish a policy that addresses the security requirements for working remotely with company equipment.

    D. Work with mid-level managers to identify and document the proper procedures for telecommuting.

  • Question 596:

    A system worth $100,000 has an exposure factor of eight percent and an ARO of four. Which of the following figures is the system's SLE?

    A. $2,000

    B. $8,000

    C. $12,000

    D. $32,000

  • Question 597:

    A software project manager has been provided with a requirement from the customer to place limits on the types of transactions a given user can initiate without external interaction from another user with elevated privileges. This requirement is BEST described as an implementation of:

    A. an administrative control

    B. dual control

    C. separation of duties

    D. least privilege

    E. collusion

  • Question 598:

    Joe, a penetration tester, is tasked with testing the security robustness of the protocol between a mobile web application and a RESTful application server. Which of the following security tools would be required to assess the security between the mobile web application and the RESTful application server? (Select TWO).

    A. Jailbroken mobile device

    B. Reconnaissance tools

    C. Network enumerator

    D. HTTP interceptor

    E. Vulnerability scanner

    F. Password cracker

  • Question 599:

    An organization has decided to reduce labor costs by outsourcing back office processing of credit applications to a provider located in another country. Data sovereignty and privacy concerns raised by the security team resulted in the third-party provider only accessing and processing the data via remote desktop sessions. To facilitate communications and improve productivity, staff at the third party has been provided with corporate email accounts that are only accessible via the remote desktop sessions. Email forwarding is blocked and staff at the third party can only communicate with staff within the organization. Which of the following additional controls should be implemented to prevent data loss? (Select THREE).

    A. Implement hashing of data in transit

    B. Session recording and capture

    C. Disable cross session cut and paste

    D. Monitor approved credit accounts

    E. User access audit reviews

    F. Source IP whitelisting

  • Question 600:

    A systems administrator establishes a CIFS share on a UNIX device to share data to Windows systems. The security authentication on the Windows domain is set to the highest level. Windows users are stating that they cannot authenticate to the UNIX share. Which of the following settings on the UNIX server would correct this problem?

    A. Refuse LM and only accept NTLMv2

    B. Accept only LM

    C. Refuse NTLMv2 and accept LM

    D. Accept only NTLM

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.