|Exam Name||:||CompTIA Advanced Security Practitioner (CASP)|
|Questions and Answers||:||427 Q & A|
|Updated On||:||Click to Check Update|
|PDF Download Mirror||:||CAS-003 Brain Dump|
|Get Full Version||:||Pass4sure CAS-003 Full Version|
A Chief Information Security Officer (CISO) is running a test to evaluate the security of the corporate network and attached devices. Which of the following components should be executed by an outside vendor?
While an employee is on vacation, suspicion arises that the employee has been involved in malicious activity on the network. The security engineer is concerned the investigation may need to continue after the employee returns to work. Given this concern, which of the following should the security engineer recommend to maintain the integrity of the investigation?
Create archival copies of all documents and communications related to the employee
Create a forensic image of network infrastructure devices
Create an image file of the employee ג€™s network drives and store it with hashes
Install a keylogger to capture the employee ג€™s communications and contacts
A company wants to secure a newly developed application that is used to access sensitive information and data from corporate resources. The application was developed by a third-party organization, and it is now being used heavily, despite lacking the following controls:
Certificate pinning Tokenization
The company has already implemented the following controls: Full device encryption
Screen lock Device password Remote wipe
The company wants to defend against interception of data attacks. Which of the following compensating controls should the company implement NEXT?
Enforce the use of a VPN when using the newly developed application
Implement a geofencing solution that disables the application according to company requirements
Implement an out-of-band second factor to authenticate authorized users
Install the application in a secure container requiring additional authentication controls
A product owner is reviewing the output of a web-application penetration test and has identified an application that is presenting sensitive information in cleartext on a page. Which of the following code snippets would be BEST to use to remediate the vulnerability?
B. <asp:TextBox ID=ג€txtACCTג€ TabIndex=ג€6ג€ runat=ג€server ג€ Width=€206גpxג€ MaxLength=ג€11ג€ TextMode=ג€Passwordג€></asp:TextBox> C.
Query hqlQuery = session.createQuery(ג€select transaction from Accounts as orders where acct.id =? ג€); List results = hqlQuery.setString(0,€122ג-ACC-988-QTWYTFDLג€).list();
A company is concerned about disgruntled employees transferring its intellectual property data through covert channels. Which of the following tools would allow employees to write data into ICMP echo response packets?
Jack the Ripper
A company contracts a security consultant to perform a remote white-box penetration test. The company wants the consultant to focus on Internet-facing services without negatively impacting production services. Which of the following is the consultant MOST likely to use to identify the companyג€™s attack surface? (Choose two.)
Company ג€™s firewall ACL
Internal routing tables
Directory service queries
A company has completed the implementation of technical and management controls as required by its adopted security policies and standards. The implementation took two years and consumed all the budget approved to security projects. The board has denied any further requests for additional budget.
Which of the following should the company do to address the residual risk?
Transfer the risk
Baseline the risk
Accept the risk
Remove the risk
A company is the victim of a phishing and spear-phishing campaign. Users are clicking on website links that look like common bank sites and entering their credentials accidentally. A security engineer decides to use a layered defense to prevent the phishing or lessen its impact. Which of the following should the security engineer implement? (Choose two.)
Host intrusion prevention
Data loss prevention
A creative services firm has a limited security budget and staff. Due to its business model, the company sends and receives a high volume of files every day through the preferred method defined by its customers. These include email, secure file transfers, and various cloud service providers. Which of the following would BEST reduce the risk of malware infection while meeting the companyג€™s resource requirements and maintaining its current workflow?
Configure a network-based intrusion prevention system
Contract a cloud-based sandbox security service
Enable customers to send and receive files via SFTP
Implement appropriate DLP systems with strict policies
A government entity is developing requirements for an RFP to acquire a biometric authentication system. When developing these requirements, which of the following considerations is MOST critical to the verification and validation of the SRTM?
Local and national laws and regulations
Secure software development requirements
Environmental constraint requirements
Testability of requirements
An electric car company hires an IT consulting company to improve the cybersecurity of its vehicles. Which of the following should achieve the BEST long- term result for the company?
Designing and developing add-on security components for fielded vehicles
Reviewing proposed designs and prototypes for cybersecurity vulnerabilities
Performing a cyber risk assessment on production vehicles
Reviewing and influencing requirements for an early development vehicle
A security manager is determining the best DLP solution for an enterprise. A list of requirements was created to use during the source selection. The security manager wants to confirm a solution exists for the requirements that have been defined. Which of the following should the security manager use?