Exam Details

  • Exam Code
    :CAS-003
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :791 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-003 Questions & Answers

  • Question 731:

    A large hospital has implemented BYOD to allow doctors and specialists the ability to access patient medical records on their tablets. The doctors and specialists access patient records over the hospital's guest WiFi network which is isolated from the internal network with appropriate security controls. The patient records management system can be accessed from the guest network and require two factor authentication. Using a remote desktop type interface, the doctors and specialists can interact with the hospital's system. Cut and paste and printing functions are disabled to prevent the copying of data to BYOD devices. Which of the following are of MOST concern? (Select TWO).

    A. Privacy could be compromised as patient records can be viewed in uncontrolled areas.

    B. Device encryption has not been enabled and will result in a greater likelihood of data loss.

    C. The guest WiFi may be exploited allowing non-authorized individuals access to confidential patient data.

    D. Malware may be on BYOD devices which can extract data via key logging and screen scrapes.

    E. Remote wiping of devices should be enabled to ensure any lost device is rendered inoperable.

  • Question 732:

    The latest independent research shows that cyber attacks involving SCADA systems grew an average of 15% per year in each of the last four years, but that this year's growth has slowed to around 7%. Over the same time period, the number of attacks against applications has decreased or stayed flat each year. At the start of the measure period, the incidence of PC boot loader or BIOS based attacks was negligible. Starting two years ago, the growth in the number of PC boot loader attacks has grown exponentially. Analysis of these trends would seem to suggest which of the following strategies should be employed?

    A. Spending on SCADA protections should stay steady; application control spending should increase substantially and spending on PC boot loader controls should increase substantially.

    B. Spending on SCADA security controls should stay steady; application control spending should decrease slightly and spending on PC boot loader protections should increase substantially.

    C. Spending all controls should increase by 15% to start; spending on application controls should be suspended, and PC boot loader protection research should increase by 100%.

    D. Spending on SCADA security controls should increase by 15%; application control spending should increase slightly, and spending on PC boot loader protections should remain steady.

  • Question 733:

    An external penetration tester compromised one of the client organization's authentication servers and retrieved the password database. Which of the following methods allows the penetration tester to MOST efficiently use any obtained administrative credentials on the client organization's other systems, without impacting the integrity of any of the systems?

    A. Use the pass the hash technique

    B. Use rainbow tables to crack the passwords

    C. Use the existing access to change the password

    D. Use social engineering to obtain the actual password

  • Question 734:

    An organization has implemented an Agile development process for front end web application development. A new security architect has just joined the company and wants to integrate security activities into the SDLC. Which of the following activities MUST be mandated to ensure code quality from a security perspective? (Select TWO).

    A. Static and dynamic analysis is run as part of integration

    B. Security standards and training is performed as part of the project

    C. Daily stand-up meetings are held to ensure security requirements are understood

    D. For each major iteration penetration testing is performed

    E. Security requirements are story boarded and make it into the build

    F. A security design is performed at the end of the requirements phase

  • Question 735:

    A well-known retailer has experienced a massive credit card breach. The retailer had gone through an audit and had been presented with a potential problem on their network. Vendors were authenticating directly to the retailer's AD servers, and an improper firewall rule allowed pivoting from the AD server to the DMZ where credit card servers were kept. The firewall rule was needed for an internal application that was developed, which presents risk. The retailer determined that because the vendors were required to have site to site VPN's no other security action was taken.

    To prove to the retailer the monetary value of this risk, which of the following type of calculations is needed?

    A. Residual Risk calculation

    B. A cost/benefit analysis

    C. Quantitative Risk Analysis

    D. Qualitative Risk Analysis

  • Question 736:

    At 9:00 am each morning, all of the virtual desktops in a VDI implementation become extremely slow and/or unresponsive. The outage lasts for around 10 minutes, after which everything runs properly again. The administrator has traced the problem to a lab of thin clients that are all booted at 9:00 am each morning. Which of the following is the MOST likely cause of the problem and the BEST solution? (Select TWO).

    A. Add guests with more memory to increase capacity of the infrastructure.

    B. A backup is running on the thin clients at 9am every morning.

    C. Install more memory in the thin clients to handle the increased load while booting.

    D. Booting all the lab desktops at the same time is creating excessive I/O.

    E. Install 10-Gb uplinks between the hosts and the lab to increase network capacity.

    F. Install faster SSD drives in the storage system used in the infrastructure.

    G. The lab desktops are saturating the network while booting.

    H. The lab desktops are using more memory than is available to the host systems.

  • Question 737:

    A security administrator is shown the following log excerpt from a Unix system: 2013 Oct 10 07:14:57 web14 sshd[1632]: Failed password for root from 198.51.100.23 port 37914 ssh2 2013 Oct 10 07:14:57 web14 sshd[1635]: Failed password for root from 198.51.100.23 port 37915 ssh2 2013 Oct 10 07:14:58 web14 sshd[1638]: Failed password for root from 198.51.100.23 port 37916 ssh2 2013 Oct 10 07:15:59 web14 sshd[1640]: Failed password for root from 198.51.100.23 port 37918 ssh2 2013 Oct 10 07:16:00 web14 sshd[1641]: Failed password for root from 198.51.100.23 port 37920 ssh2 2013 Oct 10 07:16:00 web14 sshd[1642]: Successful login for root from 198.51.100.23 port 37924 ssh2 Which of the following is the MOST likely explanation of what is occurring and the BEST immediate response? (Select TWO).

    A. An authorized administrator has logged into the root account remotely.

    B. The administrator should disable remote root logins.

    C. Isolate the system immediately and begin forensic analysis on the host.

    D. A remote attacker has compromised the root account using a buffer overflow in sshd.

    E. A remote attacker has guessed the root password using a dictionary attack.

    F. Use iptables to immediately DROP connections from the IP 198.51.100.23.

    G. A remote attacker has compromised the private key of the root account.

    H. Change the root password immediately to a password not found in a dictionary.

  • Question 738:

    A human resources manager at a software development company has been tasked with recruiting personnel for a new cyber defense division in the company. This division will require personnel to have high technology skills and industry certifications. Which of the following is the BEST method for this manager to gain insight into this industry to execute the task?

    A. Interview candidates, attend training, and hire a staffing company that specializes in technology jobs

    B. Interview employees and managers to discover the industry hot topics and trends

    C. Attend meetings with staff, internal training, and become certified in software management

    D. Attend conferences, webinars, and training to remain current with the industry and job requirements

  • Question 739:

    A company is facing penalties for failing to effectively comply with e-discovery requests. Which of the following could reduce the overall risk to the company from this issue?

    A. Establish a policy that only allows filesystem encryption and disallows the use of individual file encryption.

    B. Require each user to log passwords used for file encryption to a decentralized repository.

    C. Permit users to only encrypt individual files using their domain password and archive all old user passwords.

    D. Allow encryption only by tools that use public keys from the existing escrowed corporate PKI.

  • Question 740:

    During a new desktop refresh, all hosts are hardened at the OS level before deployment to comply with policy. Six months later, the company is audited for compliance to regulations. The audit discovers that 40 percent of the desktops do not meet requirements. Which of the following is the MOST likely cause of the noncompliance?

    A. The devices are being modified and settings are being overridden in production.

    B. The patch management system is causing the devices to be noncompliant after issuing the latest patches.

    C. The desktop applications were configured with the default username and password.

    D. 40 percent of the devices use full disk encryption.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.