CompTIA Advanced Security Practitioner (CASP+) CAS-004 Free Dumps

  1. Home
  2. /
  3. Free Dumps
  4. /
  5. CompTIA Advanced Security Practitioner...

Question 301
0
Please leave a feedback on thisx

A Chief Security Officer (CSO) is concerned about the number of successful ransomware attacks that have hit the company. The data indicates most of the attacks came through a fake email. The company has added training, and the CSO now wants to evaluate whether the training has been successful. Which of the following should the CSO implement?

  • A. Simulating a spam campaign
  • B. Conducting a sanctioned vishing attack
  • C. Performing a risk assessment
  • D. Executing a penetration test

 

 

 

Question 302
0
Please leave a feedback on thisx

A company hosts a large amount of data in blob storage for its customers. The company recently had a number of issues with this data being prematurely deleted before the scheduled backup processes could be completed. The management team has asked the security architect for a recommendation that allows blobs to be deleted occasionally, but only after a successful backup. Which of the following solutions will BEST meet this requirement?

  • A. Mirror the blobs at a local data center.
  • B. Enable fast recovery on the storage account.
  • C. Implement soft delete for blobs.
  • D. Make the blob immutable.

 

 

Question 303
0
Please leave a feedback on thisx

To save time, a company that is developing a new VPN solution has decided to use the OpenSSL library within its proprietary software. Which of the following should the company consider to maximize risk reduction from vulnerabilities introduced by OpenSSL?

  • A. Include stable, long-term releases of third-party libraries instead of using newer versions.
  • B. Ensure the third-party library implements the TLS and disable weak ciphers.
  • C. Compile third-party libraries into the main code statically instead of using dynamic loading.
  • D. Implement an ongoing, third-party software and library review and regression testing.

 

 

 

Question 304
0
Please leave a feedback on thisx

An organization recently completed a security controls assessment. The results highlighted the following vulnerabilities:

• Out-of-date definitions
• Misconfigured operating systems
• An inability to detect active attacks
• Unimpeded access to critical servers’ USB ports

Which of the following will most likely reduce the risks that were identified by the assessment team?

  • A. Install EDR on endpoints, configure group policy, lock server room doors, and install a camera system with guards watching 24/7.
  • B. Create an information security program that addresses user training, perform weekly audits of user workstations, and utilize a centralized configuration management program.
  • C. Update antivirus definitions, install NGFW with logging enabled, use USB port lockers, and run SCAP scans weekly.
  • D. Implement a vulnerability management program and a SIEM tool with alerting, install a badge system with zones, and restrict privileged access.

 

 

 

 

Question 305
0
Please leave a feedback on thisx

SIMULATION

A security engineer needs to review the configurations of several devices on the network to meet the following requirements:

• The PostgreSQL server must only allow connectivity in the 10.1.2.0/24 subnet.
• The SSH daemon on the database server must be configured to listen to port 4022.
• The SSH daemon must only accept connections from a single workstation.
• All host-based firewalls must be disabled on all workstations.
• All devices must have the latest updates from within the past eight days.
• All HDDs must be configured to secure data at rest.
• Cleartext services are not allowed.
• All devices must be hardened when possible.

INSTRUCTIONS

Click on the various workstations and network devices to review the posture assessment results. Remediate any possible issues or indicate that no issue is found.

Click on Server A to review output data. Select commands in the appropriate tab to remediate connectivity problems to the PostgreSQL database via SSH.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

CASP+_CAS-004_305__Certget

CASP+_CAS-004_305a__Certget

 

CASP+_CAS-004_305b__Certget

CASP+_CAS-004_305c__Certget

 

CASP+_CAS-004_305d__Certget

CASP+_CAS-004_305e__Certget

CASP+_CAS-004_305f__Certget

CASP+_CAS-004_305g__Certget

CASP+_CAS-004_305h__Certget

CASP+_CAS-004_305i__Certget

CASP+_CAS-004_305j__Certget

CASP+_CAS-004_305j1__Certget

 

CASP+_CAS-004_305j2__Certget

 

Answer :

CASP+_CAS-004_305j3__Certget

 

 

 

 

 

Question 306
0
Please leave a feedback on thisx

A new, online file hosting service is being offered. The service has the following security requirements:

• Threats to customer data integrity and availability should be remediated first.
• The environment should be dynamic to match increasing customer demands.
• The solution should not interfere with customers’ ability to access their data at anytime.
• Security analysts should focus on high-risk items.

Which of the following would BEST satisfy the requirements?

  • A. Expanding the use of IPS and NGFW devices throughout the environment
  • B. Increasing the number of analysts to identify risks that need remediation
  • C. Implementing a SOAR solution to address known threats
  • D. Integrating enterprise threat feeds in the existing SIEM

 

 

 

 

 

Question 307
0
Please leave a feedback on thisx

Due to internal resource constraints, the management team has asked the principal security architect to recommend a solution that shifts most of the responsibility for application-level controls to the cloud provider. In the shared responsibility model, which of the following levels of service meets this requirement?

  • A. IaaS
  • B. SaaS
  • C. FaaS
  • D. PaaS

 

 

 

 

Question 308
0
Please leave a feedback on thisx

In comparison with traditional on-premises infrastructure configurations, defining ACLs in a CSP relies on:

  • A. cloud-native applications.
  • B. containerization.
  • C. serverless configurations.
  • D. software-defined networking.
  • E. secure access service edge.

 

 

 

 

 

Question 309
0
Please leave a feedback on thisx

HOTSPOT

A product development team has submitted code snippets for review prior to release.

INSTRUCTIONS

Analyze the code snippets, and then select one vulnerability, and one fix for each code snippet.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Code Snippet 1

CASP+_CAS-004_309__Certget

Code Snippet 2

CASP+_CAS-004_309a__Certget

CASP+_CAS-004_309b__Certget

CASP+_CAS-004_309c__Certget

 

 

 

 

 

Question 310
0
Please leave a feedback on thisx

A pharmaceutical company was recently compromised by ransomware. Given the following EDR output from the process investigation:

CASP+_CAS-004_310__Certget

On which of the following devices and processes did the ransomware originate?

  • A. cpt-ws018, powershell.exe
  • B. cpt-ws026, DearCry.exe
  • C. cpt-ws002, NO-AV.exe
  • D. cpt-ws026, NO-AV.exe
  • E. cpt-ws002, DearCry.exe

 

 

 

 

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
error: Content is protected !!