DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Pass Your CompTIA CAS-003 Certification Questions & Practice Tests, CompTIA CASP+ Certification | SPOTO

Achieve success in your CompTIA CAS-003 Certification with our meticulously crafted practice tests and study materials. Our platform offers a comprehensive array of resources, including free tests, exam questions and answers, sample questions, and mock exams, designed to enhance your exam preparation journey. Developed by industry experts, our practice tests delve into key topics such as risk management, enterprise security operations, architecture, research, collaboration, and integration of enterprise security, ensuring thorough preparation. Whether you seek online exam questions or an exam simulator, our platform provides the tools necessary for effective exam practice. Elevate your confidence and proficiency with our curated exam materials. Start your preparation today and pave your way to passing the CASP+ certification exam with ease.
Take other online exams

Question #1
A company’s chief cybersecurity architect wants to configure mutual authentication to access an internal payroll website. The architect has asked the administration team to determine the configuration that would provide the best defense against MITM attacks. Which of the following implementation approaches would BEST support the architect’s goals?
A. Utilize a challenge-response prompt as required input at username/password entry
B. Implement TLS and require the client to use its own certificate during handshake
C. Configure a web application proxy and institute monitoring of HTTPS transactions
D. Install a reverse proxy in the corporate DMZ configured to decrypt TLS sessions
View answer
Correct Answer: C

View The Updated CAS-003 Exam Questions

SPOTO Provides 100% Real CAS-003 Exam Questions for You to Pass Your CAS-003 Exam!

Question #2
An organization has recently deployed an EDR solution across its laptops, desktops, and server infrastructure. The organization’s server infrastructure is deployed in an IaaS environment. A database within the non-production environment has been misconfigured with a routable IP and is communicating with a command and control server. Which of the following procedures should the security responder apply to the situation? (Choose two.)
A. Contain the server
B. Initiate a legal hold
C. Perform a risk assessment
D. Determine the data handling standard
E. Disclose the breach to customers
F. Perform an IOC sweep to determine the impact
View answer
Correct Answer: AF
Question #3
A security technician receives a copy of a report that was originally sent to the board of directors by the Chief Information Security Officer (CISO). The report outlines the following KPI/KRI data for the last 12 months: Which of the following BEST describes what could be interpreted from the above data?
A. 1
B. 1
C. 1
D. 1
View answer
Correct Answer: A
Question #4
Which of the following describes a contract that is used to define the various levels of maintenance to be provided by an external business vendor in secure environment?
A. NDA
B. MOU
C. BIA
D. SLA
View answer
Correct Answer: D
Question #5
A company has adopted and established a continuous-monitoring capability, which has proven to be effective in vulnerability management, diagnostics, and mitigation. The company wants to increase the likelihood that it is able to discover and therefore respond to emerging threats earlier in the life cycle. Which of the following methodologies would BEST help the company to meet this objective? (Choose two.)
A. Install and configure an IPS
B. Enforce routine GPO reviews
C. Form and deploy a hunt team
D. Institute heuristic anomaly detection
E. Use a protocol analyzer with appropriate connectors
View answer
Correct Answer: AD
Question #6
A consulting firm was hired to conduct assessment for a company. During the first stage, a penetration tester used a tool that provided the following output: TCP 80 open TCP 443 open TCP 1434 filtered The penetration tester then used a different tool to make the following requests: GET / script/login.php?token=45$MHT000MND876 GET / script/login.php?token=@#984DCSPQ%091DF Which of the following tools did the penetration tester use?
A. Protocol analyzer
B. Port scanner
C. Fuzzer
D. Brute forcer
E. Log analyzer
F. HTTP interceptor
View answer
Correct Answer: C
Question #7
A company is not familiar with the risks associated with IPv6. The systems administrator wants to isolate IPv4 from IPv6 traffic between two different network segments. Which of the following should the company implement? (Select TWO)
A. Use an internal firewall to block UDP port 3544
B. Disable network discovery protocol on all company routers
C. Block IP protocol 41 using Layer 3 switches
D. Disable the DHCPv6 service from all routers
E. Drop traffic for ::/0 at the edge firewall
F. Implement a 6in4 proxy server
View answer
Correct Answer: DE
Question #8
A security analyst has been asked to create a list of external IT security concerns, which are applicable to the organization. The intent is to show the different types of external actors, their attack vectors, and the types of vulnerabilities that would cause business impact. The Chief Information Security Officer (CISO) will then present this list to the board to request funding for controls in areas that have insufficient coverage. Which of the following exercise types should the analyst perform?
A. Summarize the most recently disclosed vulnerabilities
B. Research industry best practices and the latest RFCs
C. Undertake an external vulnerability scan and penetration test
D. Conduct a threat modeling exercise
View answer
Correct Answer: D
Question #9
After several industry competitors suffered data loss as a result of cyberattacks, the Chief Operating Officer (COO) of a company reached out to the information security manager to review the organization’s security stance. As a result of the discussion, the COO wants the organization to meet the following criteria: Blocking of suspicious websites Prevention of attacks based on threat intelligence Reduction in spam Identity-based reporting to meet regulatory compliance Prevention of viruses based on signatu
A. Reconfigure existing IPS resources
B. Implement a WAF
C. Deploy a SIEM solution
D. Deploy a UTM solution
E. Implement an EDR platform
View answer
Correct Answer: D
Question #10
A managed service provider is designing a log aggregation service for customers who no longer want to manage an internal SIEM infrastructure. The provider expects that customers will send all types of logs to them, and that log files could contain very sensitive entries. Customers have indicated they want on-premises and cloud-based infrastructure logs to be stored in this new service. An engineer, who is designing the new service, is deciding how to segment customers. Which of the following is the BEST sta
A. Single-tenancy is often more expensive and has less efficient resource utilization
B. The managed service provider should outsource security of the platform to an existing cloud company
C. Due to the likelihood of large log volumes, the service provider should use a multi-tenancy model for the data storage tier, enable data deduplication for storage cost efficiencies, and encrypt data at rest
D. The most secure design approach would be to give customers on-premises appliances, install agents on endpoints, and then remotely manage the service via a VPN
View answer
Correct Answer: C
Question #11
At a meeting, the systems administrator states the security controls a company wishes to implement seem excessive, since all of the information on the company’s web servers can be obtained publicly and is not proprietary in any way. The next day the company’s website is defaced as part of an SQL injection attack, and the company receives press inquiries about the message the attackers displayed on the website. Which of the following is the FIRST action the company should take?
A. Refer to and follow procedures from the company’s incident response plan
B. Call a press conference to explain that the company has been hacked
C. Establish chain of custody for all systems to which the systems administrator has access
D. Conduct a detailed forensic analysis of the compromised system
E. Inform the communications and marketing department of the attack details
View answer
Correct Answer: A
Question #12
An engineer needs to provide access to company resources for several offshore contractors. The contractors require: Access to a number of applications, including internal websites Access to database data and the ability to manipulate it The ability to log into Linux and Windows servers remotely Which of the following remote access technologies are the BEST choices to provide all of this access securely? (Choose two.)
A. VTC
B. VRRP
C. VLAN
D. VDI
E. VPN
F. Telnet
View answer
Correct Answer: DE
Question #13
A company wants to confirm sufficient executable space protection is in place for scenarios in which malware may be attempting buffer overflow attacks. Which of the following should the security engineer check?
A. NX/XN
B. ASLR
C. strcpy
D. ECC
View answer
Correct Answer: B
Question #14
An administrator has noticed mobile devices from an adjacent company on the corporate wireless network. Malicious activity is being reported from those devices. To add another layer of security in an enterprise environment, an administrator wants to add contextual authentication to allow users to access enterprise resources only while present in corporate buildings. Which of the following technologies would accomplish this?
A. Port security
B. Rogue device detection
C. Bluetooth
D. GPS
View answer
Correct Answer: D
Question #15
A bank is initiating the process of acquiring another smaller bank. Before negotiations happen between the organizations, which of the following business documents would be used as the FIRST step in the process?
A. MOU
B. OLA
C. BPA
D. NDA
View answer
Correct Answer: D
Question #16
An internal staff member logs into an ERP platform and clicks on a record. The browser URL changes to: URL: http://192.168.0.100/ERP/accountId=5&action=SELECT Which of the following is the MOST likely vulnerability in this ERP platform?
A. Brute forcing of account credentials
B. Plan-text credentials transmitted over the Internet
C. Insecure direct object reference
D. SQL injection of ERP back end
View answer
Correct Answer: C
Question #17
Providers at a healthcare system with many geographically dispersed clinics have been fined five times this year after an auditor received notice of the following SMS messages: Which of the following represents the BEST solution for preventing future fines?
A. Implement a secure text-messaging application for mobile devices and workstations
B. Write a policy requiring this information to be given over the phone only
C. Provide a courier service to deliver sealed documents containing public health informatics
D. Implement FTP services between clinics to transmit text documents with the information
E. Implement a system that will tokenize patient numbers
View answer
Correct Answer: A
Question #18
Given the following code snippet: Of which of the following is this snippet an example?
A. Data execution prevention
B. Buffer overflow
C. Failure to use standard libraries
D. Improper filed usage
E. Input validation
View answer
Correct Answer: E
Question #19
Developers are working on a new feature to add to a social media platform. The new feature involves users uploading pictures of what they are currently doing. The data privacy officer (DPO) is concerned about various types of abuse that might occur due to this new feature. The DPO state the new feature cannot be released without addressing the physical safety concerns of the platform’s users. Which of the following controls would BEST address the DPO’s concerns?
A. Increasing blocking options available to the uploader
B. Adding a one-hour delay of all uploaded photos
C. Removing all metadata in the uploaded photo file
D. Not displaying to the public who uploaded the photo
E. Forcing TLS for all connections on the platform
View answer
Correct Answer: C
Question #20
As a result of an acquisition, a new development team is being integrated into the company. The development team has BYOD laptops with IDEs installed, build servers, and code repositories that utilize SaaS. To have the team up and running effectively, a separate Internet connection has been procured. A stand up has identified the following additional requirements: 1. Reuse of the existing network infrastructure 2. Acceptable use policies to be enforced 3. Protection of sensitive files 4. Access to the corpo
A. IPSec VPN
B. HIDS
C. Wireless controller
D. Rights management
E. SSL VPN
F. NAC
G. WAF
H. Load balancer
View answer
Correct Answer: DEF
Question #21
The Chief Executive Officers (CEOs) from two different companies are discussing the highly sensitive prospect of merging their respective companies together. Both have invited their Chief Information Officers (CIOs) to discern how they can securely and digitally communicate, and the following criteria are collectively determined: Must be encrypted on the email servers and clients Must be OK to transmit over unsecure Internet connections Which of the following communication methods would be BEST to recommend
A. Force TLS between domains
B. Enable STARTTLS on both domains
C. Use PGP-encrypted emails
D. Switch both domains to utilize DNSSEC
View answer
Correct Answer: C
Question #22
The government is concerned with remote military missions being negatively being impacted by the use of technology that may fail to protect operational security. To remediate this concern, a number of solutions have been implemented, including the following: End-to-end encryption of all inbound and outbound communication, including personal email and chat sessions that allow soldiers to securely communicate with families. Layer 7 inspection and TCP/UDP port restriction, including firewall rules to only allo
A. Malicious actors intercepting inbound and outbound communication to determine the scope of the mission
B. Family members posting geotagged images on social media that were received via email from soldiers
C. The effect of communication latency that may negatively impact real-time communication with mission control
D. The use of centrally managed military network and computers by soldiers when communicating with external parties
View answer
Correct Answer: B
Question #23
A user asks a security practitioner for recommendations on securing a home network. The user recently purchased a connected home assistant and multiple IoT devices in an effort to automate the home. Some of the IoT devices are wearables, and other are installed in the user’s automobiles. The current home network is configured as a single flat network behind an ISP-supplied router. The router has a single IP address, and the router performs NAT on incoming traffic to route it to individual devices. Which of
A. Ensure all IoT devices are configured in a geofencing mode so the devices do not work when removed from the home network
B. Install a firewall capable of cryptographically separating network traffic, require strong authentication to access all IoT devices, and restrict network access for the home assistant based on time-of-day restrictions
C. Segment the home network to separate network traffic from users and the IoT devices, ensure security settings on the home assistant support no or limited recording capability, and install firewall rules on the router to restrict traffic to the home assistant as much as possible
D. Change all default passwords on the IoT devices, disable Internet access for the IoT devices and the home assistant, obtain routable IP addresses for all devices, and implement IPv6 and IPSec protections on all network traffic
View answer
Correct Answer: C
Question #24
During the deployment of a new system, the implementation team determines that APIs used to integrate the new system with a legacy system are not functioning properly. Further investigation shows there is a misconfigured encryption algorithm used to secure data transfers between systems. Which of the following should the project manager use to determine the source of the defined algorithm in use?
A. Code repositories
B. Security requirements traceability matrix
C. Software development lifecycle
D. Data design diagram
E. Roles matrix
F. Implementation guide
View answer
Correct Answer: F

View The Updated CompTIA Exam Questions

SPOTO Provides 100% Real CompTIA Exam Questions for You to Pass Your CompTIA Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: