Exam CAS-004: CompTIA Advanced Security Practitioner (CASP)
Exam Number: CAS-004 | Length of test: 90 mins |
Exam Name: CompTIA Advanced Security Practitioner (CASP) | Number of questions in the actual exam: 55-90 |
Format: PDF, VPLUS | Passing Score: 6++/900 |
Total Questions: 564 $30 Premium PDF file 2 months updates Last updated: December-2024 |
Total Questions: 564 FREE Premium VPLUS file Last updated: December-2024 |
Download practice test questions – CAS-004 exam topic
Title | Size | Hits | Download |
---|---|---|---|
CompTIA.CAS-004.vSep-2024.by.Yando.183q | 2.95 MB | 27 | Download |
CompTIA.CAS-004.vSep-2024.by.Yando.183q | 2.49 MB | 24 | Download |
CompTIA.CAS-004.vJul-2024.by.Oin.207q | 5.23 MB | 52 | Download |
CompTIA.CAS-004.vJul-2024.by.Oin.207q | 4.72 MB | 50 | Download |
CompTIA.CAS-004.vFeb-2024.by.Heery.154q | 4.32 MB | 58 | Download |
Some new sample questions:
Question:
An ASIC manufacturer wishing to best reduce downstream supply chain risk can provide validation instructions for consumers that:
A. Leverage physically uncloneable functions.
B. Analyze an emplaced holographic icon on the board.
C. Include schematics traceable via X-ray interrogation.
D. Incorporate MD5 hashes of the ASIC design file.
Question:
An analyst is working to address a potential compromise of a corporate endpoint and discovers the attacker accessed a user’s credentials. However, it is unclear if the system baseline was modified to achieve persistence. Which of the following would most likely support forensic activities in this scenario?
A. Side-channel analysis
B. Bit-level disk duplication
C. Software composition analysis
D. SCAP scanner
Question:
An administrator completed remediation for all the findings of a penetration test and notifies the management team that the systems are ready to be placed back into production. Which of the following steps should the management team require the analyst to perform immediately before placing the systems back into production?
A. Rescan for corrections/changes.
B. Conduct the entire penetration test again.
C. Harden the targeted systems.
D. Ensure a host-based IPS is in place.
……..
New questions:
Q
A company’s BIA indicates that any loss of more than one hour of data would be catastrophic to the business. Which of the following must be in place to meet this requirement?
A. RPO
B. RTO
C. SLA
D. DRP
E. BCP
Q
A company moved its on-premises services to the cloud. Although a recent audit verified that data throughout the cloud service is properly classified and documented, other systems are unable to act or filter based on this information. Which of the following should the company deploy to allow other cloud-based systems to consume this information?
A. Data mapping
B. Data labeling
C. Log scraping
D. Resource tagging
Q
A security analyst is assessing a new application written in Java. The security analyst must determine which vulnerabilities exist during runtime. Which of the following would provide the most exhaustive list of vulnerabilities while meeting the objective?
A. Input validation
B. Dynamic analysis
C. Side-channel analysis
D. Fuzz testing
E. Static analysis
Q
A security administrator at a global organization wants to update password complexity rules for a system containing personally identifiable information. Which of the following would be the best resource for this information?
A. NIST
B. GDPR
C. CMMI
D. COPPA
………..
Some new questions:
Q
During a software assurance assessment, an engineer notices the source code contains multiple instances of strcpy. which does not verify the buffer length. Which of the following solutions should be integrated into the SDLC process to reduce future risks?
A. Require custom IDS/IPS detection signatures for each type of insecure function found.
B. Perform a penetration test before moving to the next step of the SDLC.
C. Update the company’s secure coding policy to exclude insecure functions.
D. Perform DAST/SAST scanning before handoff to another team.
Q
A control systems analyst is reviewing the defensive posture of engineering workstations on the shop floor. Upon evaluation, the analyst makes the following observations:
* Unsupported, end-of-life operating systems were still prevalent on the shop floor.
* There are no security controls for systems with supported operating systems.
* There is little uniformity of installed software among the workstations.
Which of the following would have the greatest impact on the attack surface?
A. Deploy antivirus software to all of the workstations.
B. Increase the level of monitoring on the workstations.
C. Utilize network-based allow and block lists.
D. Harden all of the engineering workstations using a common strategy.
Q
A DNS forward lookup zone named complia.org must:
* Ensure the DNS is protected from on-path attacks.
* Ensure zone transfers use mutual authentication and are authenticated and negotiated.
Which of the following should the security architect configure to meet these requirements? (Select two).
A. Public keys
B. Conditional forwarders
C. Root hints
D. DNSSEC
E. CNAME records
F. SRV records
Q
An application engineer is using the Swagger framework to leverage REST APIs to authenticate endpoints. The engineer is receiving HTTP 403 responses. Which of the following should the engineer do to correct this issue? (Select two).
A. Obtain a security token.
B. Obtain a public key.
C. Leverage Kerberos for authentication
D. Leverage OAuth for authentication.
E. Leverage LDAP for authentication.
F. Obtain a hash value.
…….
Some new questions:
Q
A security engineer needs to implement a cost-effective authentication scheme for a new web-based application that requires:
* Rapid authentication
* Flexible authorization
* Ease of deployment
* Low cost but high functionality
Which of the following approaches best meets these objectives?
A. Kerberos
B. EAP
C. SAML
D. OAuth
E. TACACS+
Q
A technician accidentally deleted the secret key that was corresponding to the public key pinned to a busy online magazine. To remedy the situation, the technician obtained a new certificate with a different key. However, paying subscribers were locked out of the website until the key-pinning policy expired. Which of the following alternatives should the technician adopt to prevent a similar issue in the future?
A. Registration authority
B. Certificate revocation list
C. Client authentication
D. Certificate authority authorization
Q
Which of the following should an organization implement to prevent unauthorized API key sharing?
A. OTP
B. Encryption
C. API gateway
D. HSM
………………..