CompTIA CAS-004 CompTIA Advanced Security Practitioner (CASP+) Exam Online Training
CompTIA CAS-004 Online Training
The questions for CAS-004 were last updated at Nov 19,2024.
- Exam Code: CAS-004
- Exam Name: CompTIA Advanced Security Practitioner (CASP+) Exam
- Certification Provider: CompTIA
- Latest update: Nov 19,2024
An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items.
Which of the following phases establishes the identification and prioritization of critical systems and functions?
- A . Review a recent gap analysis.
- B . Perform a cost-benefit analysis.
- C . Conduct a business impact analysis.
- D . Develop an exposure factor matrix.
An organization is preparing to migrate its production environment systems from an on-premises environment to a cloud service. The lead security architect is concerned that the organization’s current methods for addressing risk may not be possible in the cloud environment.
Which of the following BEST describes the reason why traditional methods of addressing risk may not be possible in the cloud?
- A . Migrating operations assumes the acceptance of all risk.
- B . Cloud providers are unable to avoid risk.
- C . Specific risks cannot be transferred to the cloud provider.
- D . Risks to data in the cloud cannot be mitigated.
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization.
Which of the following actions would BEST resolve the issue? (Choose two.)
- A . Conduct input sanitization.
- B . Deploy a SIEM.
- C . Use containers.
- D . Patch the OS
- E . Deploy a WAF.
- F . Deploy a reverse proxy
- G . Deploy an IDS.
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization.
Which of the following actions would BEST resolve the issue? (Choose two.)
- A . Conduct input sanitization.
- B . Deploy a SIEM.
- C . Use containers.
- D . Patch the OS
- E . Deploy a WAF.
- F . Deploy a reverse proxy
- G . Deploy an IDS.
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization.
Which of the following actions would BEST resolve the issue? (Choose two.)
- A . Conduct input sanitization.
- B . Deploy a SIEM.
- C . Use containers.
- D . Patch the OS
- E . Deploy a WAF.
- F . Deploy a reverse proxy
- G . Deploy an IDS.
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization.
Which of the following actions would BEST resolve the issue? (Choose two.)
- A . Conduct input sanitization.
- B . Deploy a SIEM.
- C . Use containers.
- D . Patch the OS
- E . Deploy a WAF.
- F . Deploy a reverse proxy
- G . Deploy an IDS.
Despite the fact that ten new API servers were added, the load across servers was heavy at peak times.
Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?
- A . Serve static content via distributed CDNs, create a read replica of the central database and pull reports from there, and auto-scale API servers based on performance.
- B . Increase the bandwidth for the server that delivers images, use a CDN, change the database to a non-relational database, and split the ten API servers across two load balancers.
- C . Serve images from an object storage bucket with infrequent read times, replicate the database across different regions, and dynamically create API servers based on load.
- D . Serve static-content object storage across different regions, increase the instance size on the managed relational database, and distribute the ten API servers across multiple regions.
During a remodel, a company’s computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The company wants to be able to identify any unauthorized individuals who enter the storage room by following an authorized employee.
Which of the following processes would BEST satisfy this requirement?
- A . Monitor camera footage corresponding to a valid access request.
- B . Require both security and management to open the door.
- C . Require department managers to review denied-access requests.
- D . Issue new entry badges on a weekly basis.
A company is preparing to deploy a global service.
Which of the following must the company do to ensure GDPR compliance? (Choose two.)
- A . Inform users regarding what data is stored.
- B . Provide opt-in/out for marketing messages.
- C . Provide data deletion capabilities.
- D . Provide optional data encryption.
- E . Grant data access to third parties.
- F . Provide alternative authentication techniques.
A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application.
Which of the following is the MOST likely cause?
- A . The user agent client is not compatible with the WAF.
- B . A certificate on the WAF is expired.
- C . HTTP traffic is not forwarding to HTTPS to decrypt.
- D . Old, vulnerable cipher suites are still being used.