CompTIA CAS-004 CompTIA Advanced Security Practitioner (CASP+) Exam Online Training
CompTIA CAS-004 Online Training
The questions for CAS-004 were last updated at Jan 28,2025.
- Exam Code: CAS-004
- Exam Name: CompTIA Advanced Security Practitioner (CASP+) Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
A security analyst is reviewing the following output:
Which of the following would BEST mitigate this type of attack?
- A . Installing a network firewall
- B . Placing a WAF inline
- C . Implementing an IDS
- D . Deploying a honeypot
Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?
- A . Key sharing
- B . Key distribution
- C . Key recovery
- D . Key escrow
An organization is implementing a new identity and access management architecture with the following objectives:
Supporting MFA against on-premises infrastructure
Improving the user experience by integrating with SaaS applications
Applying risk-based policies based on location
Performing just-in-time provisioning
Which of the following authentication protocols should the organization implement to support these requirements?
- A . Kerberos and TACACS
- B . SAML and RADIUS
- C . OAuth and OpenID
- D . OTP and 802.1X
Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext?
- A . Lattice-based cryptography
- B . Quantum computing
- C . Asymmetric cryptography
- D . Homomorphic encryption
A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company’s services to ensure false positives do not drop legitimate traffic.
Which of the following would satisfy the requirement?
- A . NIDS
- B . NIPS
- C . WAF
- D . Reverse proxy
A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services.
Which of the following should be modified to prevent the issue from reoccurring?
- A . Recovery point objective
- B . Recovery time objective
- C . Mission-essential functions
- D . Recovery service level
A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.
The technician will define this threat as:
- A . a decrypting RSA using obsolete and weakened encryption attack.
- B . a zero-day attack.
- C . an advanced persistent threat.
- D . an on-path attack.
A security engineer thinks the development team has been hard-coding sensitive environment variables in its code.
Which of the following would BEST secure the company’s CI/CD pipeline?
- A . Utilizing a trusted secrets manager
- B . Performing DAST on a weekly basis
- C . Introducing the use of container orchestration
- D . Deploying instance tagging
A small company recently developed prototype technology for a military program. The company’s security engineer is concerned about potential theft of the newly developed, proprietary information.
Which of the following should the security engineer do to BEST manage the threats proactively?
- A . Join an information-sharing community that is relevant to the company.
- B . Leverage the MITRE ATT&CK framework to map the TTR.
- C . Use OSINT techniques to evaluate and analyze the threats.
- D . Update security awareness training to address new threats, such as best practices for data security.
A security engineer has been asked to close all non-secure connections from the corporate network. The engineer is attempting to understand why the corporate UTM will not allow users to download email via IMAPS. The engineer formulates a theory and begins testing by creating the firewall ID 58, and users are able to download emails correctly by using IMAP instead.
The network comprises three VLANs:
The security engineer looks at the UTM firewall rules and finds the following:
Which of the following should the security engineer do to ensure IMAPS functions properly on the corporate user network?
- A . Contact the email service provider and ask if the company IP is blocked.
- B . Confirm the email server certificate is installed on the corporate computers.
- C . Make sure the UTM certificate is imported on the corporate computers.
- D . Create an IMAPS firewall rule to ensure email is allowed.