Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CAS-003 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is CAS-004

CAS-003 Exam Dumps - CompTIA Advanced Security Practitioner (CASP) Exam

Go to page:
Question # 4

While attending a meeting with the human resources department, an organization’s information security officer sees an employee using a username and password written on a memo pad to log into a specific service. When the information security officer inquires further as to why passwords are being written down, the response is that there are too many passwords to remember for all the different services the human resources department is required to use.

Additionally, each password has specific complexity requirements and different expiration time frames. Which of the following would be the BEST solution for the information security officer to recommend?

A.

Utilizing MFA

B.

Implementing SSO

C.

Deploying 802.1X

D.

Pushing SAML adoption

E.

Implementing TACACS

Full Access
Question # 5

An architect was recently hired by a power utility to increase the security posture of the company’s power generation and distribution sites. Upon review, the architect identifies legacy hardware with highly vulnerable and unsupported software driving critical operations. These systems must exchange data with each other, be highly synchronized, and pull from the Internet time sources. Which of the following architectural decisions would BEST reduce the likelihood of a successful attack without harming operational capability? (Choose two.)

A.

Isolate the systems on their own network

B.

Install a firewall and IDS between systems and the LAN

C.

Employ own stratum-0 and stratum-1 NTP servers

D.

Upgrade the software on critical systems

E.

Configure the systems to use government-hosted NTP servers

Full Access
Question # 6

After several industry comnpetitors suffered data loss as a result of cyebrattacks, the Chief Operating Officer (COO) of a company reached out to the information security manager to review the organization’s security stance. As a result of the discussion, the COO wants the organization to meet the following criteria:

  • Blocking of suspicious websites
  • Prevention of attacks based on threat intelligence
  • Reduction in spam
  • Identity-based reporting to meet regulatory compliance
  • Prevention of viruses based on signature
  • Protect applications from web-based threats

Which of the following would be the BEST recommendation the information security manager could make?

A.

Reconfigure existing IPS resources

B.

Implement a WAF

C.

Deploy a SIEM solution

D.

Deploy a UTM solution

E.

Implement an EDR platform

Full Access
Question # 7

Within the past six months, a company has experienced a series of attacks directed at various collaboration tools. Additionally, sensitive information was compromised during a recent security breach of a remote access session from an unsecure site. As a result, the company is requiring all collaboration tools to comply with the following:

  • Secure messaging between internal users using digital signatures
  • Secure sites for video-conferencing sessions
  • Presence information for all office employees
  • Restriction of certain types of messages to be allowed into the network.

Which of the following applications must be configured to meet the new requirements? (Select TWO.)

A.

Remote desktop

B.

VoIP

C.

Remote assistance

D.

Email

E.

Instant messaging

F.

Social media websites

Full Access
Question # 8

A security consultant is considering authentication options for a financial institution. The following authentication options are available. Drag and drop the security mechanism to the appropriate use case. Options may be used once.

Full Access
Go to page: