Advanced Security Practitioner (CASP+)

Here you have the best CompTIA CAS-004 practice exam questions

  • You have 495 total questions to study from
  • Each page has 5 questions, making a total of 99 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 16, 2024
Question 1 of 495

An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items.

Which of the following phases establishes the identification and prioritization of critical systems and functions?

    Correct Answer: C

    A

    Reference:

    https://itsm.ucsf.edu/business-impact-analysis-bia-0

Question 2 of 495

An organization is preparing to migrate its production environment systems from an on-premises environment to a cloud service. The lead security architect is concerned that the organization's current methods for addressing risk may not be possible in the cloud environment.

Which of the following BEST describes the reason why traditional methods of addressing risk may not be possible in the cloud?

    Correct Answer: C

    Traditional methods of addressing risk may not be possible in the cloud because specific risks cannot always be transferred to the cloud provider. In a cloud environment, there is a shared responsibility model where the cloud service provider handles certain aspects like the security of the infrastructure, while the organization remains responsible for securing its own data, applications, and access controls. Therefore, specific risks related to the organization's data and operations cannot be fully transferred to the cloud provider and remain the responsibility of the organization.

Question 3 of 495

A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization.

Which of the following actions would BEST resolve the issue? (Choose two.)

    Correct Answer: A, E

    To resolve an LDAP injection vulnerability, the best actions are Conducting input sanitization and Deploying a Web Application Firewall (WAF). Conducting input sanitization ensures that user inputs are validated and cleaned to remove any characters that could be used to manipulate LDAP queries maliciously. This process helps prevent the injection of malicious code. Deploying a WAF provides a protective layer that monitors, filters, and blocks harmful HTTP/S traffic, including malicious inputs that may attempt LDAP injection attacks. Together, these measures offer a robust defense against such vulnerabilities.

Question 4 of 495

In preparation for the holiday season, a company redesigned the system that manages retail sales and moved it to a cloud service provider. The new infrastructure did not meet the company's availability requirements. During a postmortem analysis, the following issues were highlighted:

1. International users reported latency when images on the web page were initially loading.

2. During times of report processing, users reported issues with inventory when attempting to place orders.

3. Despite the fact that ten new API servers were added, the load across servers was heavy at peak times.

Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?

    Correct Answer: A

    To address the company's issues, the best solution involves three main actions: Serving static content via distributed CDNs reduces latency by providing local access to content for international users. Creating a read replica of the central database and pulling reports from it minimizes the load on the central database during report processing, thus preventing inventory issues when placing orders. Auto-scaling API servers based on performance ensures that additional servers are automatically added during peak times to distribute the load evenly across all servers, preventing overloads.

Question 5 of 495

During a remodel, a company's computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The company wants to be able to identify any unauthorized individuals who enter the storage room by following an authorized employee.

Which of the following processes would BEST satisfy this requirement?

    Correct Answer: A

    To identify any unauthorized individuals who enter the storage room by following an authorized employee, it is best to monitor camera footage corresponding to a valid access request. This allows the company to review the video footage whenever someone enters the storage room using their card reader, enabling the identification of any unauthorized individuals who may have entered in close proximity to an authorized employee. This method is targeted and efficient in identifying potential security breaches without additional manual processes or inconveniencing authorized personnel.