CompTIA Advanced Security Practitioner (CASP+) CAS-004 Free Dumps

  1. Home
  2. /
  3. Free Dumps
  4. /
  5. CompTIA Advanced Security Practitioner...

Question 451
0
Please leave a feedback on thisx

A risk assessment determined that company data was leaked to the general public during a migration. Which of the following best explains the root cause of this issue?

  • A. Incomplete firewall rules between the CSP and on-premises infrastructure
  • B. Insufficient logging of cloud activities to company SIEM
  • C. Failure to implement full disk encryption to on-premises data storage
  • D. Misconfiguration of access controls on cloud storage containers

 

 

 

 

 

Question 452
0
Please leave a feedback on thisx

Which of the following objectives best supports leveraging tabletop exercises in business continuity planning?

  • A. Determine the optimal placement of hot/warm sites within the enterprise architecture.
  • B. Create new processes for identified gaps in continuity planning.
  • C. Establish new staff roles and responsibilities for continuity of operations.
  • D. Assess the effectiveness of documented processes against a realistic scenario.

 

 

 

 

Question 453
0
Please leave a feedback on thisx

A security officer at an organization that makes and sells digital artwork must ensure the integrity of the artwork can be maintained. Which of the following are the best ways for the security officer to accomplish this task? (Choose two.)

  • A. Hashing
  • B. ECC
  • C. IPSec
  • D. Tokenization
  • E. Watermarking
  • F. Print blocking

 

 

 

Question 454
0
Please leave a feedback on thisx

A security consultant has been asked to identify a simple, secure solution for a small business with a single access point. A single SSID and no guest access will be used. The customer facility is located in a crowded area of town. The customer has asked that the solution require low administrative overhead. Which of the following should the security consultant recommend?

  • A. WPA3-Personal
  • B. WPA2-TKIP
  • C. WPA2-Enterprise
  • D. WPA3-Enterprise

 

 

 

Question 455
0
Please leave a feedback on thisx

A software developer created an application for a large, multinational company. The company is concerned the program code could be reverse engineered by a foreign entity and intellectual property would be lost. Which of the following techniques should be used to prevent this situation?

  • A. Obfuscation
  • B. Code signing
  • C. Watermarking
  • D. Digital certificates

 

 

Question 456
0
Please leave a feedback on thisx

Which of the following best describes what happens if chain of custody is broken?

  • A. Tracking record details are not properly labeled.
  • B. Vital evidence could be deemed inadmissible.
  • C. Evidence is not exhibited in the court of law.
  • D. Evidence will need to be recollected.

 

 

 

 

Question 457
0
Please leave a feedback on thisx

A security engineer investigates an incident and determines that a rogue device is on the network. Further investigation finds that an employee’s personal device has been set up to access company resources and does not comply with standard security controls. Which of the following should the security engineer recommend to reduce the risk of future reoccurrence?

  • A. Require device certificates to access company resources.
  • B. Enable MFA at the organization’s SSO portal.
  • C. Encrypt all workstation hard drives.
  • D. Hide the company wireless SSID.

 

 

 

 

Question 458
0
Please leave a feedback on thisx

The Chief Information Security Officer (CISO) is working with a new company and needs a legal document to ensure all parties understand their roles during an assessment. Which of the following should the CISO have each party sign?

  • A. SLA
  • B. ISA
  • C. Permissions and access
  • D. Rules of engagement

 

 

 

Question 459
0
Please leave a feedback on thisx

A security analyst is reviewing suspicious emails that were forwarded by users. Which of the following is the best method for the analyst to use when reviewing attachments that came with these emails?

  • A. Reverse engineering
  • B. Protocol analysis
  • C. Sandboxing
  • D. Fuzz testing
  • E. Steganography

 

 

 

 

Question 460
0
Please leave a feedback on thisx

A security engineer is trying to identify instances of a vulnerability in an internally developed line of business software. The software is hosted at the company’s internal data center. Although a standard vulnerability definition does not exist, the identification and remediation results should be tracked in the company’s vulnerability management system. Which of the following should the engineer use to identify this vulnerability?

  • A. SIEM
  • B. CASB
  • C. SCAP
  • D. OVAL

 

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
error: Content is protected !!