Exam Details

  • Exam Code
    :CAS-003
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :791 Q&As
  • Last Updated
    :Jan 22, 2024

CompTIA CompTIA Certifications CAS-003 Questions & Answers

  • Question 751:

    An administrator is tasked with securing several website domains on a web server. The administrator elects to secure www.example.com, mail.example.org, archive.example.com, and www.example.org with the same certificate. Which of the following would allow the administrator to secure those domains with a single issued certificate?

    A. Intermediate Root Certificate

    B. Wildcard Certificate

    C. EV x509 Certificate

    D. Subject Alternative Names Certificate

  • Question 752:

    There have been some failures of the company's internal facing website. A security engineer has found the WAF to be the root cause of the failures. System logs show that the WAF has been unavailable for 14 hours over the past month, in four separate situations. One of these situations was a two hour scheduled maintenance time, aimed at improving the stability of the WAF. Using the MTTR based on the last month's performance figures, which of the following calculations is the percentage of uptime assuming there were 722 hours in the month?

    A. 92.24 percent

    B. 98.06 percent

    C. 98.34 percent

    D. 99.72 percent

  • Question 753:

    An attacker attempts to create a DoS event against the VoIP system of a company. The attacker uses a tool to flood the network with a large number of SIP INVITE traffic. Which of the following would be LEAST likely to thwart such an attack?

    A. Install IDS/IPS systems on the network

    B. Force all SIP communication to be encrypted

    C. Create separate VLANs for voice and data traffic

    D. Implement QoS parameters on the switches

  • Question 754:

    The DLP solution has been showing some unidentified encrypted data being sent using FTP to a remote server. A vulnerability scan found a collection of Linux servers that are missing OS level patches. Upon further investigation, a technician notices that there are a few unidentified processes running on a number of the servers. What would be a key FIRST step for the data security team to undertake at this point?

    A. Capture process ID data and submit to anti-virus vendor for review.

    B. Reboot the Linux servers, check running processes, and install needed patches.

    C. Remove a single Linux server from production and place in quarantine.

    D. Notify upper management of a security breach.

    E. Conduct a bit level image, including RAM, of one or more of the Linux servers.

  • Question 755:

    An insurance company has an online quoting system for insurance premiums. It allows potential customers to fill in certain details about their car and obtain a quote. During an investigation, the following patterns were detected:

    Pattern 1 -Analysis of the logs identifies that insurance premium forms are being filled in but only single fields are incrementally being updated.

    Pattern 2 -For every quote completed, a new customer number is created; due to legacy systems, customer numbers are running out.

    Which of the following is the attack type the system is susceptible to, and what is the BEST way to defend against it? (Select TWO).

    A. Apply a hidden field that triggers a SIEM alert

    B. Cross site scripting attack

    C. Resource exhaustion attack

    D. Input a blacklist of all known BOT malware IPs into the firewall

    E. SQL injection

    F. Implement an inline WAF and integrate into SIEM

    G. Distributed denial of service

    H. Implement firewall rules to block the attacking IP addresses

  • Question 756:

    Company ABC is hiring customer service representatives from Company XYZ. The representatives reside at Company XYZ's headquarters. Which of the following BEST prevents Company XYZ representatives from gaining access to unauthorized Company ABC systems?

    A. Require each Company XYZ employee to use an IPSec connection to the required systems

    B. Require Company XYZ employees to establish an encrypted VDI session to the required systems

    C. Require Company ABC employees to use two-factor authentication on the required systems

    D. Require a site-to-site VPN for intercompany communications

  • Question 757:

    A senior network security engineer has been tasked to decrease the attack surface of the corporate network. Which of the following actions would protect the external network interfaces from external attackers performing network scanning?

    A. Remove contact details from the domain name registrar to prevent social engineering attacks.

    B. Test external interfaces to see how they function when they process fragmented IP packets.

    C. Enable a honeynet to capture and facilitate future analysis of malicious attack vectors.

    D. Filter all internal ICMP message traffic, forcing attackers to use full-blown TCP port scans against external network interfaces.

  • Question 758:

    An administrator wants to enable policy based flexible mandatory access controls on an open source OS to prevent abnormal application modifications or executions. Which of the following would BEST accomplish this?

    A. Access control lists

    B. SELinux

    C. IPtables firewall

    D. HIPS

  • Question 759:

    A new piece of ransomware got installed on a company's backup server which encrypted the hard drives containing the OS and backup application configuration but did not affect the deduplication data hard drives. During the incident response, the company finds that all backup tapes for this server are also corrupt. Which of the following is the PRIMARY concern?

    A. Determining how to install HIPS across all server platforms to prevent future incidents

    B. Preventing the ransomware from re-infecting the server upon restore

    C. Validating the integrity of the deduplicated data

    D. Restoring the data will be difficult without the application configuration

  • Question 760:

    Since the implementation of IPv6 on the company network, the security administrator has been unable to identify the users associated with certain devices utilizing IPv6 addresses, even when the devices are centrally managed. en1: flags=8863 mtu 1500 ether f8:1e:af:ab:10:a3 inet6 fw80::fa1e:dfff:fee6:9d8%en1 prefixlen 64 scopeid 0x5 inet 192.168.1.14 netmask 0xffffff00 broadcast 192.168.1.255 inet6 2001:200:5:922:1035:dfff:fee6:9dfe prefixlen 64 autoconf inet6 2001:200:5:922:10ab:5e21:aa9a:6393 prefixlen 64 autoconf temporary nd6 options=1 media: autoselect status: active Given this output, which of the following protocols is in use by the company and what can the system administrator do to positively map users with IPv6 addresses in the future? (Select TWO).

    A. The devices use EUI-64 format

    B. The routers implement NDP

    C. The network implements 6to4 tunneling

    D. The router IPv6 advertisement has been disabled

    E. The administrator must disable IPv6 tunneling

    F. The administrator must disable the mobile IPv6 router flag

    G. The administrator must disable the IPv6 privacy extensions

    H. The administrator must disable DHCPv6 option code 1

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.