Exam Details

  • Exam Code
    :CAS-003
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :791 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-003 Questions & Answers

  • Question 711:

    An organization is concerned with potential data loss in the event of a disaster, and created a backup datacenter as a mitigation strategy. The current storage method is a single NAS used by all servers in both datacenters. Which of the following options increases data availability in the event of a datacenter failure?

    A. Replicate NAS changes to the tape backups at the other datacenter.

    B. Ensure each server has two HBAs connected through two routes to the NAS.

    C. Establish deduplication across diverse storage paths.

    D. Establish a SAN that replicates between datacenters.

  • Question 712:

    A popular commercial virtualization platform allows for the creation of virtual hardware. To virtual machines, this virtual hardware is indistinguishable from real hardware. By implementing virtualized TPMs, which of the following trusted system concepts can be implemented?

    A. Software-based root of trust

    B. Continuous chain of trust

    C. Chain of trust with a hardware root of trust

    D. Software-based trust anchor with no root of trust

  • Question 713:

    An accountant at a small business is trying to understand the value of a server to determine if the business can afford to buy another server for DR. The risk manager only provided the accountant with the SLE of $24,000, ARO of 20% and the exposure factor of 25%. Which of the following is the correct asset value calculated by the accountant?

    A. $4,800

    B. $24,000

    C. $96,000

    D. $120,000

  • Question 714:

    A bank is in the process of developing a new mobile application. The mobile client renders content and communicates back to the company servers via REST/JSON calls. The bank wants to ensure that the communication is stateless between the mobile application and the web services gateway. Which of the following controls MUST be implemented to enable stateless communication?

    A. Generate a one-time key as part of the device registration process.

    B. Require SSL between the mobile application and the web services gateway.

    C. The jsession cookie should be stored securely after authentication.

    D. Authentication assertion should be stored securely on the client.

  • Question 715:

    Which of the following would be used in forensic analysis of a compromised Linux system? (Select THREE).

    A. Check log files for logins from unauthorized IPs.

    B. Check /proc/kmem for fragmented memory segments.

    C. Check for unencrypted passwords in /etc/shadow.

    D. Check timestamps for files modified around time of compromise.

    E. Use lsof to determine files with future timestamps.

    F. Use gpg to encrypt compromised data files.

    G. Verify the MD5 checksum of system binaries.

    H. Use vmstat to look for excessive disk I/O.

  • Question 716:

    The Chief Information Officer (CIO) is reviewing the IT centric BIA and RA documentation. The documentation shows that a single 24 hours downtime in a critical business function will cost the business $2.3 million. Additionally, the business unit which depends on the critical business function has determined that there is a high probability that a threat will materialize based on historical data. The CIO's budget does not allow for full system hardware replacement in case of a catastrophic failure, nor does it allow for the purchase of additional compensating controls. Which of the following should the CIO recommend to the finance director to minimize financial loss?

    A. The company should mitigate the risk.

    B. The company should transfer the risk.

    C. The company should avoid the risk.

    D. The company should accept the risk.

  • Question 717:

    A member of the software development team has requested advice from the security team to implement a new secure lab for testing malware. Which of the following is the NEXT step that the security team should take?

    A. Purchase new hardware to keep the malware isolated.

    B. Develop a policy to outline what will be required in the secure lab.

    C. Construct a series of VMs to host the malware environment.

    D. Create a proposal and present it to management for approval.

  • Question 718:

    A new internal network segmentation solution will be implemented into the enterprise that consists of 200 internal firewalls. As part of running a pilot exercise, it was determined that it takes three changes to deploy a new application onto the network before it is operational. Security now has a significant effect on overall availability. Which of the following would be the FIRST process to perform as a result of these findings?

    A. Lower the SLA to a more tolerable level and perform a risk assessment to see if the solution could be met by another solution. Reuse the firewall infrastructure on other projects.

    B. Perform a cost benefit analysis and implement the solution as it stands as long as the risks are understood by the business owners around the availability issues. Decrease the current SLA expectations to match the new solution.

    C. Engage internal auditors to perform a review of the project to determine why and how the project did not meet the security requirements. As part of the review ask them to review the control effectiveness.

    D. Review to determine if control effectiveness is in line with the complexity of the solution. Determine if the requirements can be met with a simpler solution.

  • Question 719:

    An assessor identifies automated methods for identifying security control compliance through validating sensors at the endpoint and at Tier 2. Which of the following practices satisfy continuous monitoring of authorized information systems?

    A. Independent verification and validation

    B. Security test and evaluation

    C. Risk assessment

    D. Ongoing authorization

  • Question 720:

    A company provides on-demand cloud computing resources for a sensitive project. The company implements a fully virtualized datacenter and terminal server access with two-factor authentication for customer access to the administrative website. The security administrator at the company has uncovered a breach in data confidentiality. Sensitive data from customer A was found on a hidden directory within the VM of company

    A. Company B is not in the same industry as company A and the two are not competitors. Which of the following has MOST likely occurred?

    B. Both VMs were left unsecured and an attacker was able to exploit network vulnerabilities to access each and move the data.

    C. A stolen two factor token was used to move data from one virtual guest to another host on the same network segment.

    D. A hypervisor server was left un-patched and an attacker was able to use a resource exhaustion attack to

    E. gain unauthorized access.

    F. An employee with administrative access to the virtual guests was able to dump the guest memory onto a mapped disk.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.