Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CAS-003 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is CAS-004

CAS-003 Exam Dumps - CompTIA Advanced Security Practitioner (CASP) Exam

Go to page:
Question # 9

An organization is facing budget constraints The Chief Technology Officer (CTO) wants to add a new marketing platform but the organization does not have the resources to obtain separate servers to run the new platform. The CTO recommends running the new marketing platform on a virtualized video-conferencing server because video conferencing is rarely used The Chief Information Security Officer (CISO) denies this request Which of the following BEST explains the reason why the CISO has not approved the request?

A.

Privilege escalation attacks

B.

Performance and availability

C.

Weak DAR encryption

D.

Disparate security requirements

Full Access
Question # 10

An engineer is evaluating the control profile to assign to a system containing PII, financial, and proprietary data.

Based on the data classification table above, which of the following BEST describes the overall classification?

A.

High confidentiality, high availability

B.

High confidentiality, medium availability

C.

Low availability, low confidentiality

D.

High integrity, low availability

Full Access
Question # 11

A company has entered into a business agreement with a business partner for managed human resources services. The Chief Information Security Officer (CISO) has been asked to provide documentation that is required to set up a business-to-business VPN between the two organizations.

Which of the following is required in this scenario?

A.

ISA

B.

BIA

C.

SLA

D.

RA

Full Access
Question # 12

Engineers at a company believe a certain type of data should be protected from competitors, but the data owner insists the information is not sensitive. An information security engineer is implementing controls to secure the corporate SAN. The controls require dividing data into four groups: non-sensitive, sensitive but accessible, sensitive but export-controlled, and extremely sensitive. Which of the following actions should the engineer take regarding the data?

A.

Label the data as extremely sensitive.

B.

Label the data as sensitive but accessible.

C.

Label the data as non-sensitive.

D.

Label the data as sensitive but export-controlled.

Full Access
Question # 13

A company wants to perform analysis of a tool that is suspected to contain a malicious payload. A forensic analyst is given the following snippet:

^32^[34fda19(fd^43gfd/home/user/lib/module.so.343jk^rfw(342fds43g

Which of the following did the analyst use to determine the location of the malicious payload?

A.

Code deduplicators

B.

Binary reverse-engineering

C.

Fuzz testing

D.

Security containers

Full Access
Question # 14

Providers at a healthcare system with many geographically dispersed clinics have been fined five times this year after an auditor received notice of the following SMS messages:

Which of the following represents the BEST solution for preventing future fines?

A.

Implement a secure text-messaging application for mobile devices and workstations.

B.

Write a policy requiring this information to be given over the phone only.

C.

Provide a courier service to deliver sealed documents containing public health informatics.

D.

Implement FTP services between clinics to transmit text documents with the information.

E.

Implement a system that will tokenize patient numbers.

Full Access
Question # 15

A network engineer is attempting to design-in resiliency characteristics for an enterprise network’s VPN services.

If the engineer wants to help ensure some resilience against zero-day vulnerabilities exploited against the VPN implementation, which of the following decisions would BEST support this objective?

A.

Implement a reverse proxy for VPN traffic that is defended and monitored by the organization’s SOC with near-real-time alerting to administrators.

B.

Subscribe to a managed service provider capable of supporting the mitigation of advanced DDoS attacks on the enterprise’s pool of VPN concentrators.

C.

Distribute the VPN concentrators across multiple systems at different physical sites to ensure some backup services are available in the event of primary site loss.

D.

Employ a second VPN layer concurrently where the other layer’s cryptographic implementation is sourced from a different vendor.

Full Access
Question # 16

An administrator is working with management to develop policies related to the use of the cloud-based resources that contain corporate data. Management plans to require some control over organizational data stored on personal devices, such as tablets. Which of the following controls would BEST support management’s policy?

A.

MDM

B.

Sandboxing

C.

Mobile tokenization

D.

FDE

E.

MFA

Full Access
Go to page: