CompTIA Advanced Security Practitioner (CASP+) CAS-004 v1.0 (CAS-004)

Page:    1 / 27   
Total 396 questions

An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented.
Which of the following processes can be used to identify potential prevention recommendations?

  • A. Detection
  • B. Remediation
  • C. Preparation
  • D. Recovery


Answer : A

Some end users of an e-commerce website are reporting a delay when browsing pages. The website uses TLS 1.2. A security architect for the website troubleshoots by connecting from home to the website and capturing traffic via Wireshark. The security architect finds that the issue is the time required to validate the certificate. Which of the following solutions should the security architect recommend?

  • A. Adding more nodes to the web server clusters
  • B. Changing the cipher algorithm used on the web server
  • C. Implementing OCSP stapling on the server
  • D. Upgrading to TLS 1.3


Answer : D

A security engineer was auditing an organization's current software development practice and discovered that multiple open-source libraries were Integrated into the organization's software. The organization currently performs SAST and DAST on the software it develops.
Which of the following should the organization incorporate into the SDLC to ensure the security of the open-source libraries?

  • A. Perform additional SAST/DAST on the open-source libraries.
  • B. Implement the SDLC security guidelines.
  • C. Track the library versions and monitor the CVE website for related vulnerabilities.
  • D. Perform unit testing of the open-source libraries.


Answer : C

Reference:
https://www.whitesourcesoftware.com/resources/blog/application-security-best-practices/

A security analyst is investigating a possible buffer overflow attack. The following output was found on a user's workstation: graphic.linux_randomization.prg
Which of the following technologies would mitigate the manipulation of memory segments?

  • A. NX bit
  • B. ASLR
  • C. DEP
  • D. HSM


Answer : B

Reference:
http://webpages.eng.wayne.edu/~fy8421/19sp-csc5290/labs/lab2-instruction.pdf
(3)

An e-commerce company is running a web server on premises, and the resource utilization is usually less than 30%. During the last two holiday seasons, the server experienced performance issues because of too many connections, and several customers were not able to finalize purchase orders. The company is looking to change the server configuration to avoid this kind of performance issue.
Which of the following is the MOST cost-effective solution?

  • A. Move the server to a cloud provider.
  • B. Change the operating system.
  • C. Buy a new server and create an active-active cluster.
  • D. Upgrade the server with a new one.


Answer : A

A company has decided to purchase a license for software that is used to operate a mission-critical process. The third-party developer is new to the industry but is delivering what the company needs at this time.
Which of the following BEST describes the reason why utilizing a source code escrow will reduce the operational risk to the company if the third party stops supporting the application?

  • A. The company will have access to the latest version to continue development.
  • B. The company will be able to force the third-party developer to continue support.
  • C. The company will be able to manage the third-party developerג€™s development process.
  • D. The company will be paid by the third-party developer to hire a new development team.


Answer : A

A security analyst is researching containerization concepts for an organization. The analyst is concerned about potential resource exhaustion scenarios on the
Docker host due to a single application that is overconsuming available resources.
Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?

  • A. Union filesystem overlay
  • B. Cgroups
  • C. Linux namespaces
  • D. Device mapper


Answer : B

Reference:
https://www.ibm.com/support/pages/deep-dive-yarn-cgroups-hadoop-dev

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Which of the following would be BEST for the developer to perform? (Choose two.)

  • A. Utilize code signing by a trusted third party.
  • B. Implement certificate-based authentication.
  • C. Verify MD5 hashes.
  • D. Compress the program with a password.
  • E. Encrypt with 3DES.
  • F. Make the DACL read-only.


Answer : AB

A company is moving most of its customer-facing production systems to the cloud-facing production systems to the cloud. IaaS is the service model being used.
The Chief Executive Officer is concerned about the type of encryption available and requires the solution must have the highest level of security.
Which of the following encryption methods should the cloud security engineer select during the implementation phase?

  • A. Instance-based
  • B. Storage-based
  • C. Proxy-based
  • D. Array controller-based


Answer : A

A vulnerability analyst identified a zero-day vulnerability in a company's internally developed software. Since the current vulnerability management system does not have any checks for this vulnerability, an engineer has been asked to create one.
Which of the following would be BEST suited to meet these requirements?

  • A. ARF
  • B. ISACs
  • C. Node.js
  • D. OVAL


Answer : D

An organization recently started processing, transmitting, and storing its customers' credit card information. Within a week of doing so, the organization suffered a massive breach that resulted in the exposure of the customers' information.
Which of the following provides the BEST guidance for protecting such information while it is at rest and in transit?

  • A. NIST
  • B. GDPR
  • C. PCI DSS
  • D. ISO


Answer : C

Reference:
https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard

Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?

  • A. Improving the availability of messages
  • B. Ensuring non-repudiation of messages
  • C. Enforcing protocol conformance for messages
  • D. Assuring the integrity of messages


Answer : C

A company wants to protect its intellectual property from theft. The company has already applied ACLs and DACs.
Which of the following should the company use to prevent data theft?

  • A. Watermarking
  • B. DRM
  • C. NDA
  • D. Access logging


Answer : B

A satellite communications ISP frequently experiences outages and degraded modes of operation over one of its legacy satellite links due to the use of deprecated hardware and software. Three days per week, on average, a contracted company must follow a checklist of 16 different high-latency commands that must be run in serial to restore nominal performance. The ISP wants this process to be automated.
Which of the following techniques would be BEST suited for this requirement?

  • A. Deploy SOAR utilities and runbooks.
  • B. Replace the associated hardware.
  • C. Provide the contractors with direct access to satellite telemetry data.
  • D. Reduce link latency on the affected ground and satellite segments.


Answer : A

A company processes data subject to NDAs with partners that define the processing and storage constraints for the covered data. The agreements currently do not permit moving the covered data to the cloud, and the company would like to renegotiate the terms of the agreements.
Which of the following would MOST likely help the company gain consensus to move the data to the cloud?

  • A. Designing data protection schemes to mitigate the risk of loss due to multitenancy
  • B. Implementing redundant stores and services across diverse CSPs for high availability
  • C. Emulating OS and hardware architectures to blur operations from CSP view
  • D. Purchasing managed FIM services to alert on detected modifications to covered data


Answer : A

Page:    1 / 27   
Total 396 questions