Exam Details

  • Exam Code
    :CAS-003
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :791 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-003 Questions & Answers

  • Question 721:

    A security administrator wants to deploy a dedicated storage solution which is inexpensive, can natively integrate with AD, allows files to be selectively encrypted and is suitable for a small number of users at a satellite office. Which of the following would BEST meet the requirement?

    A. SAN

    B. NAS

    C. Virtual SAN

    D. Virtual storage

  • Question 722:

    The risk manager has requested a security solution that is centrally managed, can easily be updated, and protects end users' workstations from both known and unknown malicious attacks when connected to either the office or home network. Which of the following would BEST meet this requirement?

    A. HIPS

    B. UTM

    C. Antivirus

    D. NIPS

    E. DLP

  • Question 723:

    The network administrator at an enterprise reported a large data leak. One compromised server was used to aggregate data from several critical application servers and send it out to the Internet using HTTPS. Upon investigation, there have been no user logins over the previous week and the endpoint protection software is not reporting any issues. Which of the following BEST provides insight into where the compromised server collected the information?

    A. Review the flow data against each server's baseline communications profile.

    B. Configure the server logs to collect unusual activity including failed logins and restarted services.

    C. Correlate data loss prevention logs for anomalous communications from the server.

    D. Setup a packet capture on the firewall to collect all of the server communications.

  • Question 724:

    Due to compliance regulations, a company requires a yearly penetration test. The Chief Information Security Officer (CISO) has asked that it be done under a black box methodology.

    Which of the following would be the advantage of conducting this kind of penetration test?

    A. The risk of unplanned server outages is reduced.

    B. Using documentation provided to them, the pen-test organization can quickly determine areas to focus on.

    C. The results will show an in-depth view of the network and should help pin-point areas of internal weakness.

    D. The results should reflect what attackers may be able to learn about the company.

  • Question 725:

    A large company is preparing to merge with a smaller company. The smaller company has been very profitable, but the smaller company's main applications were created in-house. Which of the following actions should the large company's security administrator take in preparation for the merger?

    A. A review of the mitigations implemented from the most recent audit findings of the smaller company should be performed.

    B. An ROI calculation should be performed to determine which company's application should be used.

    C. A security assessment should be performed to establish the risks of integration or co-existence.

    D. A regression test should be performed on the in-house software to determine security risks associated with the software.

  • Question 726:

    Executive management is asking for a new manufacturing control and workflow automation solution. This application will facilitate management of proprietary information and closely guarded corporate trade secrets.

    The information security team has been a part of the department meetings and come away with the following notes:

    Human resources would like complete access to employee data stored in the application. They would like automated data interchange with the employee management application, a cloud-based SaaS application.

    Sales is asking for easy order tracking to facilitate feedback to customers.

    Legal is asking for adequate safeguards to protect trade secrets. They are also concerned with data ownership questions and legal jurisdiction.

    Manufacturing is asking for ease of use. Employees working the assembly line cannot be bothered with additional steps or overhead. System interaction needs to be quick and easy. Quality assurance is concerned about managing the end

    product and tracking overall performance of the product being produced. They would like read-only access to the entire workflow process for monitoring and baselining.

    The favored solution is a user friendly software application that would be hosted onsite. It has extensive ACL functionality, but also has readily available APIs for extensibility. It supports read-only access, kiosk automation, custom fields, and

    data encryption.

    Which of the following departments' request is in contrast to the favored solution?

    A. Manufacturing

    B. Legal

    C. Sales

    D. Quality assurance

    E. Human resources

  • Question 727:

    The Chief Executive Officer (CEO) of a large prestigious enterprise has decided to reduce business costs by outsourcing to a third party company in another country. Functions to be outsourced include: business analysts, testing, software development and back office functions that deal with the processing of customer data. The Chief Risk Officer (CRO) is concerned about the outsourcing plans. Which of the following risks are MOST likely to occur if adequate controls are not implemented?

    A. Geographical regulation issues, loss of intellectual property and interoperability agreement issues

    B. Improper handling of client data, interoperability agreement issues and regulatory issues

    C. Cultural differences, increased cost of doing business and divestiture issues

    D. Improper handling of customer data, loss of intellectual property and reputation damage

  • Question 728:

    A web services company is planning a one-time high-profile event to be hosted on the corporate website. An outage, due to an attack, would be publicly embarrassing, so Joe, the Chief Executive Officer (CEO), has requested that his security engineers put temporary preventive controls in place. Which of the following would MOST appropriately address Joe's concerns?

    A. Ensure web services hosting the event use TCP cookies and deny_hosts.

    B. Configure an intrusion prevention system that blocks IPs after detecting too many incomplete sessions.

    C. Contract and configure scrubbing services with third-party DDoS mitigation providers.

    D. Purchase additional bandwidth from the company's Internet service provider.

  • Question 729:

    A mature organization with legacy information systems has incorporated numerous new processes and dependencies to manage security as its networks and infrastructure are modernized. The Chief Information Office has become increasingly frustrated with frequent releases, stating that the organization needs everything to work completely, and the vendor should already have those desires built into the software product. The vendor has been in constant communication with personnel and groups within the organization to understand its business process and capture new software requirements from users. Which of the following methods of software development is this organization's configuration management process using?

    A. Agile

    B. SDL

    C. Waterfall

    D. Joint application development

  • Question 730:

    The Chief Information Security Officer (CISO) at a large organization has been reviewing some security-related incidents at the organization and comparing them to current industry trends. The desktop security engineer feels that the use of USB storage devices on office computers has contributed to the frequency of security incidents. The CISO knows the acceptable use policy prohibits the use of USB storage devices. Every user receives a popup warning about this policy upon login. The SIEM system produces a report of USB violations on a monthly basis; yet violations continue to occur.

    Which of the following preventative controls would MOST effectively mitigate the logical risks associated with the use of USB storage devices?

    A. Revise the corporate policy to include possible termination as a result of violations

    B. Increase the frequency and distribution of the USB violations report

    C. Deploy PKI to add non-repudiation to login sessions so offenders cannot deny the offense

    D. Implement group policy objects

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.