CompTIA CAS-003 CompTIA Advanced Security Practitioner (CASP) Online Training
CompTIA CAS-003 Online Training
The questions for CAS-003 were last updated at Apr 06,2025.
- Exam Code: CAS-003
- Exam Name: CompTIA Advanced Security Practitioner (CASP)
- Certification Provider: CompTIA
- Latest update: Apr 06,2025
An information security officer is responsible for one secure network and one office network. Recent intelligence suggests there is an opportunity for attackers to gain access to the secure network due to similar login credentials across networks.
To determine the users who should change their information, the information security officer uses a tool to scan a file with hashed values on both networks and receives the following data:
Which of the following tools was used to gather this information from the hashed values in the file?
- A . Vulnerability scanner
- B . Fuzzer
- C . MD5 generator
- D . Password cracker
- E . Protocol analyzer
A security engineer has implemented an internal user access review tool so service teams can baseline user accounts and group memberships. The tool is functional and popular among its initial set of onboarded teams. However, the tool has not been built to cater to a broader set of internal teams yet.
The engineer has sought feedback from internal stakeholders, and a list of summarized requirements is as follows:
✑ The tool needs to be responsive so service teams can query it, and then perform an automated response action.
✑ The tool needs to be resilient to outages so service teams can perform the user access review at any point in time and meet their own SLAs.
✑ The tool will become the system-of-record for approval, reapproval, and removal life cycles of group memberships and must allow for data retrieval after failure.
Which of the following need specific attention to meet the requirements listed above? (Choose three.)
- A . Scalability
- B . Latency
- C . Availability
- D . Usability
- E . Recoverability
- F . Maintainability
An SQL database is no longer accessible online due to a recent security breach. An investigation reveals that unauthorized access to the database was possible due to an SQL injection vulnerability.
To prevent this type of breach in the future, which of the following security controls should be put in place before bringing the database back online? (Choose two.)
- A . Secure storage policies
- B . Browser security updates
- C . Input validation
- D . Web application firewall
- E . Secure coding standards
- F . Database activity monitoring
A forensics analyst suspects that a breach has occurred. Security logs show the company’s OS patch system may be compromised, and it is serving patches that contain a zero-day exploit and backdoor. The analyst extracts an executable file from a packet capture of communication between a client computer and the patch server.
Which of the following should the analyst use to confirm this suspicion?
- A . File size
- B . Digital signature
- C . Checksums
- D . Anti-malware software
- E . Sandboxing
When reviewing KRIs of the email security appliance with the Chief Information Security Officer (CISO) of an insurance company, the security engineer notices the following:
Which of the following measures should the security engineer take to ensure PII is not
intercepted in transit while also preventing interruption to business?
- A . Quarantine emails sent to external domains containing PII and release after inspection.
- B . Prevent PII from being sent to domains that allow users to sign up for free webmail.
- C . Enable transport layer security on all outbound email communications and attachments.
- D . Provide security awareness training regarding transmission of PII.
Given the following code snippet:
Of which of the following is this snippet an example?
- A . Data execution prevention
- B . Buffer overflow
- C . Failure to use standard libraries
- D . Improper filed usage
- E . Input validation
The Chief Executive Officers (CEOs) from two different companies are discussing the highly sensitive prospect of merging their respective companies together.
Both have invited their Chief Information Officers (CIOs) to discern how they can securely and digitally communicate, and the following criteria are collectively determined:
✑ Must be encrypted on the email servers and clients
✑ Must be OK to transmit over unsecure Internet connections
Which of the following communication methods would be BEST to recommend?
- A . Force TLS between domains.
- B . Enable STARTTLS on both domains.
- C . Use PGP-encrypted emails.
- D . Switch both domains to utilize DNSSEC.
A security analyst is reviewing the corporate MDM settings and notices some disabled settings, which consequently permit users to download programs from untrusted developers and manually install them. After some conversations, it is confirmed that these settings were disabled to support the internal development of mobile applications. The security analyst is now recommending that developers and testers have a separate device profile allowing this, and that the rest of the organization’s users do not have the ability to manually download and install untrusted applications .
Which of the following settings should be toggled to achieve the goal? (Choose two.)
- A . OTA updates
- B . Remote wiping
- C . Side loading
- D . Sandboxing
- E . Containerization
- F . Signed applications
A security engineer is working with a software development team. The engineer is tasked with ensuring all security requirements are adhered to by the developers .
Which of the following BEST describes the contents of the supporting document the engineer is creating?
- A . A series of ad-hoc tests that each verify security control functionality of the entire system at once.
- B . A series of discrete tasks that, when viewed in total, can be used to verify and document each individual constraint from the SRTM.
- C . A set of formal methods that apply to one or more of the programing languages used on the development project.
- D . A methodology to verify each security control in each unit of developed code prior to committing the code.
A consultant is hired to perform a passive vulnerability assessment of a company to determine what information might be collected about the company and its employees. The assessment will be considered successful if the consultant can discover the name of one of the IT administrators .
Which of the following is MOST likely to produce the needed information?
- A . Whois
- B . DNS enumeration
- C . Vulnerability scanner
- D . Fingerprinting
ddd
nnn