CompTIA Advanced Security Practitioner (CASP+) CAS-004 Free Dumps

  1. Home
  2. /
  3. Free Dumps
  4. /
  5. CompTIA Advanced Security Practitioner...

Question 441
0
Please leave a feedback on thisx

A security architect is implementing a SOAR solution in an organization’s cloud production environment to support detection capabilities. Which of the following will be the most likely benefit?

  • A. Improved security operations center performance
  • B. Automated firewall log collection tasks
  • C. Optimized cloud resource utilization
  • D. Increased risk visibility

 

 

 

Question 442
0
Please leave a feedback on thisx

A security administrator wants to enable a feature that would prevent a compromised encryption key from being used to decrypt all the VPN traffic. Which of the following should the security administrator use?

  • A. Salsa20 cipher
  • B. TLS-based VPN
  • C. PKI-based IKE IPSec negotiation
  • D. Perfect forward secrecy

 

 

 

Question 443
0
Please leave a feedback on thisx

A help desk analyst suddenly begins receiving numerous calls from remote employees who state they are unable to connect to the VPN. The employees indicate the VPN client software is warning about an expired certificate. The help desk analyst determines the VPN certificate is valid. Which of the following is the most likely cause of the issue?

  • A. The certificate has been compromised and needs to be replaced.
  • B. The VPN concentrator is running an old version of code and needs to be upgraded.
  • C. The NTP settings on the VPN concentrator are incorrectly configured.
  • D. The end users are using outdated VPN client software.

 

 

 

 

 

Question 444
0
Please leave a feedback on thisx

A security analyst has been provided the following partial Snort IDS rule to review and add into the company’s Snort IDS to identify a CVE:

alert tcp any any -> SHOME_NET 3389 (flow:to_server,established; content:”MS_T120|00|”; fasc_pattern:only)

Which of the following should the analyst recommend to mitigate this type of vulnerability?

  • A. IPSec rules
  • B. OS patching
  • C. Two-factor authentication
  • D. TCP wrappers

 

 

Question 445
0
Please leave a feedback on thisx

A security assessor identified an internet-facing web service API provider that was deemed vulnerable. Execution of testssl provided the following insight:

CASP+_CAS-004_445__Certget

Which of the following configuration changes would BEST mitigate chosen ciphertext attacks?

  • A. Enable 3DES ciphers IDEA.
  • B. Enable export ciphers.
  • C. Enable PFS ciphers.
  • D. Enable AEAD.

 

 

 

 

Question 446
0
Please leave a feedback on thisx

An organization’s load balancers have reached end of life and have a vulnerability that will require them to be replaced. The load balancers are scheduled to be decommissioned within the next month. The management team has decided not to resolve this risk and instead allow the load balancers to remain in place until their decommission date. Which of the following risk handling techniques is the management team using?

  • A. Avoid
  • B. Mitigate
  • C. Accept
  • D. Transfer

 

 

 

Question 447
0
Please leave a feedback on thisx

A security analyst is reviewing a new IOC in which data is injected into an online process. The IOC shows the data injection could happen in the following ways:

• Five numerical digits followed by a dash, followed by four numerical digits; or
• Five numerical digits

When one of these IOCs is identified. the online process stops working. Which of the following regular expressions should be implemented in the NIPS?

  • A. ^\d{4}(-\d{5})?$
  • B. ^\d{5}(-\d{4})?$
  • C. ^\d{5-4}$
  • D. ^\d{9}$

 

 

Question 448
0
Please leave a feedback on thisx

Which of the following testing plans is used to discuss disaster recovery scenarios with representatives from multiple departments within an incident response team but without taking any invasive actions?

  • A. Disaster recovery checklist
  • B. Tabletop exercise
  • C. Full interruption test
  • D. Parallel test

 

 

 

Question 449
0
Please leave a feedback on thisx

Recently, two large engineering companies in the same line of business decided to approach cyberthreats in a united way. Which of the following best describes this unified approach?

  • A. NDA
  • B. ISA
  • C. SLA
  • D. MOU

 

 

 

Question 450
0
Please leave a feedback on thisx

Application owners are reporting performance issues with traffic using port 1433 from the cloud environment. A security administrator has various pcap files to analyze the data between the related source and destination servers. Which of the following tools should be used to help troubleshoot the issue?

  • A. Fuzz testing
  • B. Wireless vulnerability scan
  • C. Exploit framework
  • D. Password cracker
  • E. Protocol analyzer

 

 

 

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
error: Content is protected !!