Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CAS-003 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is CAS-004

CAS-003 Exam Dumps - CompTIA Advanced Security Practitioner (CASP) Exam

Go to page:
Question # 33

A security engineer is working to secure an organization’s VMs. While reviewing the workflow for creating VMs on demand, the engineer raises a concern about the integrity of the secure boot process of the VM guest.

Which of the following would BEST address this concern?

A.

Configure file integrity monitoring of the guest OS.

B.

Enable the vTPM on a Type 2 hypervisor.

C.

Only deploy servers that are based on a hardened image.

D.

Protect the memory allocation of a Type 1 hypervisor.

Full Access
Question # 34

A security engineer wants to introduce key stretching techniques to the account database to make password guessing attacks more difficult Which of the following should be considered to achieve this? (Select TWO)

A.

Digital signature

B.

bcrypt

C.

Perfect forward secrecy

D.

SHA-256

E.

P-384

F.

PBKDF2

G.

Record-level encryption

Full Access
Question # 35

Following a recent and very large corporate merger, the number of log files an SOC needs to review has approximately tripled. The Chief Information Security Officer (CISO) has not been allowed to hire any more staff for the SOC, but is looking for other ways to automate the log review process so the SOC receives less noise. Which of the following would BEST reduce log noise for the SOC?

A.

SIEM filtering

B.

Machine learning

C.

Outsourcing

D.

Centralized IPS

Full Access
Question # 36

An internal application has been developed to increase the efficiency of an operational process of a global manufacturer. New code was implemented to fix a security bug, but it has caused operations to halt. The executive team has decided fixing the security bug is less important than continuing operations.

Which of the following would BEST support immediate rollback of the failed fix? (Choose two.)

A.

Version control

B.

Agile development

C.

Waterfall development

D.

Change management

E.

Continuous integration

Full Access
Question # 37

A cybersecurity analyst is hired to review the security the posture of a company. The cybersecurity analyst notice a very high network bandwidth consumption due to SYN floods from a small number of IP addresses. Which of the following would be the BEST action to take to support incident response?

A.

Increase the company's bandwidth.

B.

Apply ingress filters at the routers.

C.

Install a packet capturing tool.

D.

Block all SYN packets.

Full Access
Question # 38

A manufacturing company recently recovered from an attack on its ICS devices. It has since reduced the attack surface by isolating the affected components. The company now wants to implement detection capabilities. It is considering a system that is based on machine learning. Which of the following features would BEST describe the driver to adopt such nascent technology over mainstream commercial IDSs?

A.

Trains on normal behavior and identifies deviations therefrom

B.

Identifies and triggers upon known bad signatures and behaviors

C.

Classifies traffic based on logical protocols and messaging formats

D.

Automatically reconfigures ICS devices based on observed behavior

Full Access
Question # 39

A security administrator is reviewing the following output from an offline password audit:

Which of the following should the systems administrator implement to BEST address this audit finding? (Choose two.)

A.

Cryptoprocessor

B.

Bcrypt

C.

SHA-256

D.

PBKDF2

E.

Message authentication

Full Access
Question # 40

As part of an organization’s compliance program, administrators must complete a hardening checklist and note any potential improvements. The process of noting improvements in the checklist is MOST likely driven by:

A.

the collection of data as part of the continuous monitoring program.

B.

adherence to policies associated with incident response.

C.

the organization’s software development life cycle.

D.

changes in operating systems or industry trends.

Full Access
Go to page: