DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Ace CompTIA CAS-003 Certification Exam Questions & Study Resources, CompTIA CASP+ Certification | SPOTO

Prepare for the CompTIA CAS-003 Certification Exam with our comprehensive practice tests and study resources. Our free test materials include exam questions and answers, sample questions, mock exams, and more to help you ace the exam. Developed by experts in the field, our practice tests cover all the essential topics, including risk management, enterprise security operations, architecture, research, collaboration, and integration of enterprise security. Whether you're seeking exam preparation or looking for an exam simulator, our exam materials have got you covered. Get ready to excel in your CASP+ certification exam with our online exam questions and expert guidance. Start practicing today to boost your confidence and ensure success on exam day.
Take other online exams

Question #1
Following a merger, the number of remote sites for a company has doubled to 52. The company has decided to secure each remote site with an NGFW to provide web filtering, NIDS/NIPS, and network antivirus. The Chief Information Officer (CIO) has requested that the security engineer provide recommendations on sizing for the firewall with the requirements that it be easy to manage and provide capacity for growth. The tables below provide information on a subset of remote sites and the firewall options: Which of
A. Vendor C for small remote sites, and Vendor B for large sites
B. Vendor B for all remote sites
C. Vendor C for all remote sites
D. Vendor A for all remote sites
E. Vendor D for all remote sites
View answer
Correct Answer: A
Question #2
Providers at a healthcare system with many geographically dispersed clinics have been fined five times this year after an auditor received notice of the following SMS messages: Which of the following represents the BEST solution for preventing future files?
A. Implement a secure text-messaging application for mobile devices and workstations
B. Write a policy requiring this information to be given over the phone only
C. Provide a courier service to deliver sealed documents containing public health informatics
D. Implement FTP services between clinics to transmit text documents with the information
E. Implement a system that will tokenize patient number
View answer
Correct Answer: CD
Question #3
During a routine network scan, a security administrator discovered an unidentified service running on a new embedded and unmanaged HVAC controller, which is used to monitor the company's datacenter Port state 161/UDP open 162/UDP open 163/TCP open The enterprise monitoring service requires SNMP and SNMPTRAP connectivity to operate. Which of the following should the security administrator implement to harden the system?
A. Patch and restart the unknown services
B. Segment and firewall the controller's network
C. Disable the unidentified service on the controller
D. Implement SNMPv3 to secure communication
E. Disable TCP/UDP PORTS 161 THROUGH 163
View answer
Correct Answer: D
Question #4
After a large organization has completed the acquisition of a smaller company, the smaller company must implement new host-based security controls to connect its employees’ devices to the network. Given that the network requires 802.1X EAP-PEAP to identify and authenticate devices, which of the following should the security administrator do to integrate the new employees’ devices into the network securely?
A. Distribute a NAC client and use the client to push the company’s private key to all the new devices
B. Distribute the device connection policy and a unique public/private key pair to each new employee’s device
C. Install a self-signed SSL certificate on the company’s RADIUS server and distribute the certificate’s public key to all new client devices
D. Install an 802
View answer
Correct Answer: B
Question #5
A security administrator was doing a packet capture and noticed a system communicating with an unauthorized address within the 2001::/32 prefix. The network administrator confirms there is no IPv6 routing into or out of the network. Which of the following is the BEST course of action?
A. Investigate the network traffic and block UDP port 3544 at the firewall
B. Remove the system from the network and disable IPv6 at the router
C. Locate and remove the unauthorized 6to4 relay from the network
D. Disable the switch port and block the 2001::/32 traffic at the firewall
View answer
Correct Answer: A
Question #6
An information security manager is concerned that connectivity used to configure and troubleshoot critical network devices could be attacked. The manager has tasked a network security engineer with meeting the following requirements: Encrypt all traffic between the network engineer and critical devices. Segregate the different networking planes as much as possible. Do not let access ports impact configuration tasks. Which of the following would be the BEST recommendation for the network security engineer to
A. Deploy control plane protections
B. Use SSH over out-of-band management
C. Force only TACACS to be allowed
D. Require the use of certificates for AAA
View answer
Correct Answer: B
Question #7
A pharmacy gives its clients online access to their records and the ability to review bills and make payments. A new SSL vulnerability on a special platform was discovered, allowing an attacker to capture the data between the end user and the web server providing these services. After invest the new vulnerability, it was determined that the web services providing are being impacted by this new threat. Which of the following data types a MOST likely at risk of exposure based on this new threat? (Select TWO)
A. Cardholder data
B. intellectual property
C. Personal health information
D. Employee records
E. Corporate financial data
View answer
Correct Answer: A
Question #8
A security architect is designing a system to satisfy user demand for reduced transaction time, increased security and message integrity, and improved cryptographic security. The resultant system will be used in an environment with a broad user base where many asynchronous transactions occur every minute and must be publicly verifiable. Which of the following solutions BEST meets all of the architect’s objectives?
A. An internal key infrastructure that allows users to digitally sign transaction logs
B. An agreement with an entropy-as-a-service provider to increase the amount of randomness in generated keys
C. A publicly verified hashing algorithm that allows revalidation of message integrity at a future date
D. An open distributed transaction ledger that requires proof of work to append entrie
View answer
Correct Answer: D
Question #9
Which of the following system would be at the GREATEST risk of compromise if found to have an open vulnerability associated with perfect ... secrecy?
A. Endpoints
B. VPN concentrators
C. Virtual hosts
D. SIEM
E. Layer 2 switches
View answer
Correct Answer: A
Question #10
A vulnerability scanner report shows that a client-server host monitoring solution operating in the credit card corporate environment is managing SSL sessions with a weak algorithm which does not meet corporate policy. Which of the following are true statements? (Select TWO).
A. The X509 V3 certificate was issued by a non trusted public CA
B. The client-server handshake could not negotiate strong ciphers
C. The client-server handshake is configured with a wrong priority
D. The client-server handshake is based on TLS authentication
E. The X509 V3 certificate is expired
F. The client-server implements client-server mutual authentication with different certificate
View answer
Correct Answer: B
Question #11
Due to a recent breach, the Chief Executive Officer (CEO) has requested the following activities be conducted during incident response planning: Involve business owners and stakeholders Create an applicable scenario Conduct a biannual verbal review of the incident response plan Report on the lessons learned and gaps identified Which of the following exercises has the CEO requested?
A. Parallel operations
B. Full transition
C. Internal review
D. Tabletop
E. Partial simulation
View answer
Correct Answer: D
Question #12
A security analyst is inspecting pseudocode of the following multithreaded application: 1. perform daily ETL of data 1.1 validate that yesterday’s data model file exists 1.2 validate that today’s data model file does not exist 1.2 extract yesterday’s data model 1.3 transform the format 1.4 load the transformed data into today’s data model file 1.5 exit Which of the following security concerns is evident in the above pseudocode?
A. Time of check/time of use
B. Resource exhaustion
C. Improper storage of sensitive data
D. Privilege escalation
View answer
Correct Answer: C
Question #13
A managed service provider is designing a log aggregation service for customers who no longer want to manage an internal SIEM infrastructure. The provider expects that customers will send all types of logs to them, and that log files could contain very sensitive entries. Customers have indicated they want on-premises and cloud-based infrastructure logs to be stored in this new service. An engineer, who is designing the new service, is deciding how to segment customers. Which of the following is the BEST sta
A. Single-tenancy is often more expensive and has less efficient resource utilizatio
B. Multi-tenancy may increase the risk of cross-customer exposure in the event of service vulnerabilities
C. The managed service provider should outsource security of the platform to an existing cloud compan
D. This will allow the new log service to be launched faster and with well-tested security controls
E. Due to the likelihood of large log volumes, the service provider should use a multi-tenancy model for the data storage tier, enable data deduplication for storage cost efficiencies, and encrypt data at rest
F. The most secure design approach would be to give customers on-premises appliances, install agents on endpoints, and then remotely manage the service via a VPN
View answer
Correct Answer: D
Question #14
A developer has implemented a piece of client-side JavaScript code to sanitize a user’s provided input to a web page login screen. The code ensures that only the upper case and lower case letters are entered in the username field, and that only a 6-digit PIN is entered in the password field. A security administrator is concerned with the following web server log: 10.235.62.11 – - [02/Mar/2014:06:13:04] “GET /site/script.php?user=admin&pass=pass%20or%201=1 HTTP/1.1” 200 5724 Given this log, which of the foll
A. The security administrator is concerned with nonprintable characters being used to gain administrative access, and the developer should strip all nonprintable characters
B. The security administrator is concerned with XSS, and the developer should normalize Unicode characters on the browser side
C. The security administrator is concerned with SQL injection, and the developer should implement server side input validation
D. The security administrator is concerned that someone may log on as the administrator, and the developer should ensure strong passwords are enforced
View answer
Correct Answer: D
Question #15
A security analyst is reviewing logs and discovers that a company-owned computer issued to an employee is generating many alerts and analyst continues to review the log events and discovers that a non-company-owned device from a different, unknown IP address is general same events. The analyst informs the manager of these finding, and the manager explains that these activities are already known and . . . ongoing simulation. Given this scenario, which of the following roles are the analyst, the employee, and
A. The analyst is red team The employee is blue team The manager is white team
B. The analyst is white team The employee is red team The manager is blue team
C. The analyst is red team The employee is white team The manager is blue team
D. The analyst is blue team The employee is red team The manager is white team
View answer
Correct Answer: C
Question #16
A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important?
A. Insecure direct object references, CSRF, Smurf
B. Privilege escalation, Application DoS, Buffer overflow
C. SQL injection, Resource exhaustion, Privilege escalation
D. CSRF, Fault injection, Memory leaks
View answer
Correct Answer: AC

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: