New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CAS-004 Exam Dumps - CompTIA Advanced Security Practitioner (CASP+) Exam

Go to page:
Question # 73

The management team at a company with a large, aging server environment is conducting a server risk assessment in order to create a replacement strategy. The replacement strategy will be based upon the likelihood a server will fail, regardless of the criticality of the application running on a particular server. Which of the following should be used to prioritize the server replacements?

A.

SLE

B.

MTTR

C.

TCO

D.

MTBF

E.

MSA

Full Access
Question # 74

A security analyst is investigating a possible buffer overflow attack. The following output was found on a user’s workstation:

graphic.linux_randomization.prg

Which of the following technologies would mitigate the manipulation of memory segments?

A.

NX bit

B.

ASLR

C.

DEP

D.

HSM

Full Access
Question # 75

A security engineer has learned that terminated employees' accounts are not being disabled. The termination dates are updated automatically in the human resources information system software by the appropriate human resources staff. Which of the following would best reduce risks to the organization?

A.

Exporting reports from the system on a weekly basis to disable terminated employees' accounts

B.

Granting permission to human resources staff to mark terminated employees' accounts as disabled

C.

Configuring allowed login times for all staff to only work during business hours

D.

Automating a process to disable the accounts by integrating Active Directory and human resources information systems

Full Access
Question # 76

An IT director is working on a solution to meet the challenge of remotely managing laptop devices and securely locking them down. The solution must meet the following requirements:

• Cut down on patch management.

• Make use of standard configurations.

• Allow for custom resource configurations.

• Provide access to the enterprise system from multiple types of devices.

Which of the following would meet these requirements?

A.

MDM

B.

Emulator

C.

Hosted hypervisor

D.

VDI

Full Access
Question # 77

During a remodel, a company’s computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The company wants to be able to identify any unauthorized individuals who enter the storage room by following an authorized employee.

Which of the following processes would BEST satisfy this requirement?

A.

Monitor camera footage corresponding to a valid access request.

B.

Require both security and management to open the door.

C.

Require department managers to review denied-access requests.

D.

Issue new entry badges on a weekly basis.

Full Access
Question # 78

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.

Which of the following would be BEST for the developer to perform? (Choose two.)

A.

Utilize code signing by a trusted third party.

B.

Implement certificate-based authentication.

C.

Verify MD5 hashes.

D.

Compress the program with a password.

E.

Encrypt with 3DES.

F.

Make the DACL read-only.

Full Access
Question # 79

Which of the following is the reason why security engineers often cannot upgrade the security of embedded facility automation systems?

A.

They are constrained by available compute.

B.

They lack X86-64 processors.

C.

They lack EEPROM.

D.

They are not logic-bearing devices.

Full Access
Question # 80

A security engineer receives reports through the organization's bug bounty program about remote code execution in a specific component in a custom application. Management wants to properly secure the component and proactively avoid similar issues. Which of the following is the best approach to uncover additional vulnerable paths in the application?

A.

Implement fuzz testing focused on the component and inputs uncovered by the bug bounty program.

B.

Leverage a software composition analysis tool to find all known vulnerabilities in dependencies.

C.

Use a vulnerability scanner to perform multiple types of network scans to look for vulnerabilities.

D.

Utilize a network traffic analyzer to find malicious packet combinations that lead to remote code execution.

E.

Run an exploit framework with all payloads against the application to see if it is able to gain access.

Full Access
Go to page: