CompTIA CAS-003 CompTIA Advanced Security Practitioner (CASP) Online Training
CompTIA CAS-003 Online Training
The questions for CAS-003 were last updated at Mar 31,2025.
- Exam Code: CAS-003
- Exam Name: CompTIA Advanced Security Practitioner (CASP)
- Certification Provider: CompTIA
- Latest update: Mar 31,2025
A security architect has been assigned to a new digital transformation program. The objectives are to provide better capabilities to customers and reduce costs.
The program has highlighted the following requirements:
✑ Long-lived sessions are required, as users do not log in very often.
✑ The solution has multiple SPs, which include mobile and web applications.
✑ A centralized IdP is utilized for all customer digital channels.
✑ The applications provide different functionality types such as forums and customer portals.
✑ The user experience needs to be the same across both mobile and web-based applications.
Which of the following would BEST improve security while meeting these requirements?
- A . Social login to IdP, securely store the session cookies, and implement one-time passwords sent to the mobile device
- B . Create-based authentication to IdP, securely store access tokens, and implement secure push notifications.
- C . Username and password authentication to IdP, securely store refresh tokens, and implement context-aware authentication.
- D . Username and password authentication to SP, securely store Java web tokens, and implement SMS OTPs.
A company has adopted and established a continuous-monitoring capability, which has proven to be effective in vulnerability management, diagnostics, and mitigation. The company wants to increase the likelihood that it is able to discover and therefore respond to emerging threats earlier in the life cycle.
Which of the following methodologies would BEST help the company to meet this objective? (Choose two.)
- A . Install and configure an IPS.
- B . Enforce routine GPO reviews.
- C . Form and deploy a hunt team.
- D . Institute heuristic anomaly detection.
- E . Use a protocol analyzer with appropriate connectors.
After multiple service interruptions caused by an older datacenter design, a company decided to migrate away from its datacenter. The company has successfully completed the migration of all datacenter servers and services to a cloud provider.
The migration project includes the following phases:
✑ Selection of a cloud provider
✑ Architectural design
✑ Microservice segmentation
✑ Virtual private cloud
✑ Geographic service redundancy
✑ Service migration
The Chief Information Security Officer (CISO) is still concerned with the availability requirements of critical company applications.
Which of the following should the company implement NEXT?
- A . Multicloud solution
- B . Single-tenancy private cloud
- C . Hybrid cloud solution
- D . Cloud access security broker
An engineer is assisting with the design of a new virtualized environment that will house critical company services and reduce the datacenter’s physical footprint. The company has expressed concern about the integrity of operating systems and wants to ensure a vulnerability exploited in one datacenter segment would not lead to the compromise of all others.
Which of the following design objectives should the engineer complete to BEST mitigate the company’s concerns? (Choose two.)
- A . Deploy virtual desktop infrastructure with an OOB management network
- B . Employ the use of vT PM with boot attestation
- C . Leverage separate physical hardware for sensitive services and data
- D . Use a community CSP with independently managed security services
- E . Deploy to a private cloud with hosted hypervisors on each physical machine
An organization is implementing a virtualized thin-client solution for normal user computing and access. During a review of the architecture, concerns were raised that an attacker could gain access to multiple user environments by simply gaining a foothold on a single one with malware .
Which of the following reasons BEST explains this?
- A . Malware on one virtual environment could enable pivoting to others by leveraging vulnerabilities in the hypervisor.
- B . A worm on one virtual environment could spread to others by taking advantage of guest OS networking services vulnerabilities.
- C . One virtual environment may have one or more application-layer vulnerabilities, which could allow an attacker to escape that environment.
- D . Malware on one virtual user environment could be copied to all others by the attached network storage controller.
To meet a SLA, which of the following documents should be drafted, defining the company’s internal interdependent unit responsibilities and delivery timelines.
- A . BPA
- B . OLA
- C . MSA
- D . MOU
During the decommissioning phase of a hardware project, a security administrator is tasked with ensuring no sensitive data is released inadvertently. All paper records are scheduled to be shredded in a crosscut shredded, and the waste will be burned. The system drives and removable media have been removed prior to e-cycling the hardware.
Which of the following would ensure no data is recovered from the system droves once they are disposed of?
- A . Overwriting all HDD blocks with an alternating series of data.
- B . Physically disabling the HDDs by removing the dive head.
- C . Demagnetizing the hard drive using a degausser.
- D . Deleting the UEFI boot loaders from each HDD.
A consulting firm was hired to conduct assessment for a company.
During the first stage, a penetration tester used a tool that provided the following output:
TCP 80 open
TCP 443 open
TCP 1434 filtered
The penetration tester then used a different tool to make the following requests:
GET / script/login.php?token=45$MHT000MND876
GET / script/login.php?token=@#984DCSPQ%091DF
Which of the following tools did the penetration tester use?
- A . Protocol analyzer
- B . Port scanner
- C . Fuzzer
- D . Brute forcer
- E . Log analyzer
- F . HTTP interceptor
A systems administrator at a medical imaging company discovers protected health information (PHI) on a general purpose file server .
Which of the following steps should the administrator take NEXT?
- A . Isolate all of the PHI on its own VLAN and keep it segregated at Layer 2
- B . Immediately encrypt all PHI with AES 256
- C . Delete all PHI from the network until the legal department is consulted
- D . Consult the legal department to determine legal requirements
A systems administrator receives an advisory email that a recently discovered exploit is being used in another country and the financial institutions have ceased operations while they find a way to respond to the attack .
Which of the following BEST describes where the administrator should look to find information on the attack to determine if a response must be prepared for the systems? (Choose two.)
- A . Bug bounty websites
- B . Hacker forums
- C . Antivirus vendor websites
- D . Trade industry association websites
- E . CVE database
- F . Company’s legal department
ddd
nnn