Vcehome > CompTIA > CompTIA Advanced Security Practitioner > CAS-003 > CAS-003 Online Practice Questions and Answers

CAS-003 Online Practice Questions and Answers

Questions 4

The Chief Information Security Officer (CISO) at a large organization has been reviewing some security-related incidents at the organization and comparing them to current industry trends. The desktop security engineer feels that the use of USB storage devices on office computers has contributed to the frequency of security incidents. The CISO knows the acceptable use policy prohibits the use of USB storage devices. Every user receives a popup warning about this policy upon login. The SIEM system produces a report of USB violations on a monthly basis; yet violations continue to occur.

Which of the following preventative controls would MOST effectively mitigate the logical risks associated with the use of USB storage devices?

A. Revise the corporate policy to include possible termination as a result of violations

B. Increase the frequency and distribution of the USB violations report

C. Deploy PKI to add non-repudiation to login sessions so offenders cannot deny the offense

D. Implement group policy objects

Browse 791 Q&As
Questions 5

An organization is concerned with potential data loss in the event of a disaster, and created a backup datacenter as a mitigation strategy. The current storage method is a single NAS used by all servers in both datacenters. Which of the following options increases data availability in the event of a datacenter failure?

A. Replicate NAS changes to the tape backups at the other datacenter.

B. Ensure each server has two HBAs connected through two routes to the NAS.

C. Establish deduplication across diverse storage paths.

D. Establish a SAN that replicates between datacenters.

Browse 791 Q&As
Questions 6

A security analyst, who is working in a Windows environment, has noticed a significant amount of IPv6 traffic originating from a client, even though IPv6 is not currently in use. The client is a stand-alone device, not connected to the AD that manages a series of SCADA devices used for manufacturing.

Which of the following is the appropriate command to disable the client's IPv6 stack?

A. Option A

B. Option B

C. Option C

D. Option D

Browse 791 Q&As
Questions 7

A critical system audit shows that the payroll system is not meeting security policy due to missing OS security patches. Upon further review, it appears that the system is not being patched at all. The vendor states that the system is only supported on the current OS patch level. Which of the following compensating controls should be used to mitigate the vulnerability of missing OS patches on this system?

A. Isolate the system on a secure network to limit its contact with other systems

B. Implement an application layer firewall to protect the payroll system interface

C. Monitor the system's security log for unauthorized access to the payroll application

D. Perform reconciliation of all payroll transactions on a daily basis

Browse 791 Q&As
Questions 8

A vulnerability scanner report shows that a client-server host monitoring solution operating in the credit card corporate environment is managing SSL sessions with a weak algorithm which does not meet corporate policy. Which of the following are true statements? (Select TWO).

A. The X509 V3 certificate was issued by a non trusted public CA.

B. The client-server handshake could not negotiate strong ciphers.

C. The client-server handshake is configured with a wrong priority.

D. The client-server handshake is based on TLS authentication.

E. The X509 V3 certificate is expired.

F. The client-server implements client-server mutual authentication with different certificates.

Browse 791 Q&As
Questions 9

An organization is engaged in international business operations and is required to comply with various legal frameworks. In addition to changes in legal frameworks, which of the following is a primary purpose of a compliance management program?

A. Following new requirements that result from contractual obligations

B. Answering requests from auditors that relate to e-discovery

C. Responding to changes in regulatory requirements

D. Developing organizational policies that relate to hiring and termination procedures

Browse 791 Q&As
Questions 10

Which of the following BEST represents a risk associated with merging two enterprises during an acquisition?

A. The consolidation of two different IT enterprises increases the likelihood of the data loss because there are now two backup systems

B. Integrating two different IT systems might result in a successful data breach if threat intelligence is not shared between the two enterprises

C. Merging two enterprise networks could result in an expanded attack surface and could cause outages if trust and permission issues are not handled carefully

D. Expanding the set of data owners requires an in-depth review of all data classification decisions, impacting availability during the review

Browse 791 Q&As
Questions 11

A user workstation was infected with a new malware variant as a result of a drive-by download. The security administrator reviews key controls on the infected workstation and discovers the following:

Which of the following would BEST prevent the problem from reoccurring in the future? (Choose two.)

A. Install HIPS

B. Enable DLP

C. Install EDR

D. Install HIDS

E. Enable application blacklisting

F. Improve patch management processes

Browse 791 Q&As
Questions 12

The audit team was only provided the physical and logical addresses of the network without any type of access credentials.

Which of the following methods should the audit team use to gain initial access during the security assessment? (Choose two.)

A. Tabletop exercise

B. Social engineering

C. Runtime debugging

D. Reconnaissance

E. Code review

F. Remote access tool

Browse 791 Q&As
Questions 13

A consultant is planning an assessment of a customer-developed system. The system consists of a custom-engineered board with modified open-source drivers and a one-off management GUI The system relies on two- factor authentication for interactive sessions, employs strong certificate-based data-in-transit encryption, and randomly switches ports for each session. Which of the following would yield the MOST useful information?

A. Password cracker

B. Wireless network analyzer

C. Fuzzing tools D. Reverse engineering principles

Browse 791 Q&As
Exam Code: CAS-003
Exam Name: CompTIA Advanced Security Practitioner (CASP+)
Last Update: Jan 22, 2024
Questions: 791 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99