Exam Details

  • Exam Code
    :CAS-003
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :791 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-003 Questions & Answers

  • Question 631:

    An information security manager is concerned that connectivity used to configure and troubleshoot critical network devices could be attacked. The manager has tasked a network security engineer with meeting the following requirements:

    Encrypt all traffic between the network engineer and critical devices.

    Segregate the different networking planes as much as possible.

    Do not let access ports impact configuration tasks.

    Which of the following would be the BEST recommendation for the network security engineer to present?

    A. Deploy control plane protections.

    B. Use SSH over out-of-band management.

    C. Force only TACACS to be allowed.

    D. Require the use of certificates for AAA.

  • Question 632:

    A security administrator wants to implement two-factor authentication for network switches and routers. The solution should integrate with the company's RADIUS server, which is used for authentication to the network infrastructure devices. The security administrator implements the following:

    1.

    An HOTP service is installed on the RADIUS server.

    2.

    The RADIUS server is configured to require the HOTP service for authentication.

    The configuration is successfully tested using a software supplicant and enforced across all network devices. Network administrators report they are unable to log onto the network devices because they are not being prompted for the second factor.

    Which of the following should be implemented to BEST resolve the issue?

    A. Replace the password requirement with the second factor. Network administrators will enter their username and then enter the token in place of their password in the password field.

    B. Configure the RADIUS server to accept the second factor appended to the password. Network administrators will enter a password followed by their token in the password field.

    C. Reconfigure network devices to prompt for username, password, and a token. Network administrators will enter their username and password, and then they will enter the token.

    D. Install a TOTP service on the RADIUS server in addition to the HOTP service. Use the HOTP on older devices that do not support two-factor authentication. Network administrators will use a web portal to log onto these devices.

  • Question 633:

    Engineers at a company believe a certain type of data should be protected from competitors, but the data owner insists the information is not sensitive. An information security engineer is implementing controls to secure the corporate SAN. The controls require dividing data into four groups: non-sensitive, sensitive but accessible, sensitive but export-controlled, and extremely sensitive. Which of the following actions should the engineer take regarding the data?

    A. Label the data as extremely sensitive.

    B. Label the data as sensitive but accessible.

    C. Label the data as non-sensitive.

    D. Label the data as sensitive but export-controlled.

  • Question 634:

    Joe, a penetration tester, is assessing the security of an application binary provided to him by his client. Which of the following methods would be the MOST effective in reaching this objective?

    A. Employ a fuzzing utility

    B. Use a static code analyzer

    C. Run the binary in an application sandbox

    D. Manually review the binary in a text editor

  • Question 635:

    An organization, which handles large volumes of PII, allows mobile devices that can process, store, and transmit PII and other sensitive data to be issued to employees. Security assessors can demonstrate recovery and decryption of remnant sensitive data from device storage after MDM issues a successful wipe command. Assuming availability of the controls, which of the following would BEST protect against the loss of sensitive data in the future?

    A. Implement a container that wraps PII data and stores keying material directly in the container's encrypted application space.

    B. Use encryption keys for sensitive data stored in an eF use-backed memory space that is blown during remote wipe.

    C. Issue devices that employ a stronger algorithm for the authentication of sensitive data stored on them.

    D. Procure devices that remove the bootloader binaries upon receipt of an MDM-issued remote wipe command.

  • Question 636:

    During the deployment of a new system, the implementation team determines that APIs used to integrate the new system with a legacy system are not functioning properly. Further investigation shows there is a misconfigured encryption algorithm used to secure data transfers between systems. Which of the following should the project manager use to determine the source of the defined algorithm in use?

    A. Code repositories

    B. Security requirements traceability matrix

    C. Software development lifecycle

    D. Data design diagram

    E. Roles matrix

    F. Implementation guide

  • Question 637:

    The security configuration management policy states that all patches must undergo testing procedures before being moved into production. The sec... analyst notices a single web application server has been downloading and applying patches during non-business hours without testing. There are no apparent adverse reaction, server functionality does not seem to be affected, and no malware was found after a scan. Which of the following action should the analyst take?

    A. Reschedule the automated patching to occur during business hours.

    B. Monitor the web application service for abnormal bandwidth consumption.

    C. Create an incident ticket for anomalous activity.

    D. Monitor the web application for service interruptions caused from the patching.

  • Question 638:

    An internal staff member logs into an ERP platform and clicks on a record. The browser URL changes to:

    URL: http://192.168.0.100/ERP/accountId=5andaction=SELECT

    Which of the following is the MOST likely vulnerability in this ERP platform?

    A. Brute forcing of account credentials

    B. Plan-text credentials transmitted over the Internet

    C. Insecure direct object reference

    D. SQL injection of ERP back end

  • Question 639:

    A company is acquiring incident response and forensic assistance from a managed security service provider in the event of a data breach. The company has selected a partner and must now provide required documents to be reviewed and evaluated.

    Which of the following documents would BEST protect the company and ensure timely assistance? (Choose two.)

    A. RA

    B. BIA

    C. NDA

    D. RFI

    E. RFQ

    F. MSA

  • Question 640:

    A regional business is expecting a severe winter storm next week. The IT staff has been reviewing corporate policies on how to handle various situations and found some are missing or incomplete. After reporting this gap in documentation to the information security manager, a document is immediately drafted to move various personnel to other locations to avoid downtime in operations. This is an example of:

    A. a disaster recovery plan

    B. an incident response plan

    C. a business continuity plan

    D. a risk avoidance plan

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.