CompTIA CAS-004 CompTIA Advanced Security Practitioner (CASP+) Exam Online Training
CompTIA CAS-004 Online Training
The questions for CAS-004 were last updated at Jan 28,2025.
- Exam Code: CAS-004
- Exam Name: CompTIA Advanced Security Practitioner (CASP+) Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
A company plans to build an entirely remote workforce that utilizes a cloud-based infrastructure.
The Chief Information Security Officer asks the security engineer to design connectivity to meet the following requirements:
Only users with corporate-owned devices can directly access servers hosted by the cloud provider.
The company can control what SaaS applications each individual user can access.
User browser activity can be monitored.
Which of the following solutions would BEST meet these requirements?
- A . IAM gateway, MDM, and reverse proxy
- B . VPN, CASB, and secure web gateway
- C . SSL tunnel, DLP, and host-based firewall
- D . API gateway, UEM, and forward proxy
During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels.
Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?
- A . Spawn a shell using sudo and an escape string such as sudo vim -c ‘!sh’.
- B . Perform ASIC password cracking on the host.
- C . Read the /etc/passwd file to extract the usernames.
- D . Initiate unquoted service path exploits.
- E . Use the UNION operator to extract the database schema.
A systems administrator is in the process of hardening the host systems before connecting to the network. The administrator wants to add protection to the boot loader to ensure the hosts are secure before the OS fully boots.
Which of the following would provide the BEST boot loader protection?
- A . TPM
- B . HSM
- C . PKI
- D . UEFI/BIOS
A developer is creating a new mobile application for a company. The application uses REST API and TLS 1.2 to communicate securely with the external back-end server. Due to this configuration, the
company is concerned about HTTPS interception attacks.
Which of the following would be the BEST solution against this type of attack?
- A . Cookies
- B . Wildcard certificates
- C . HSTS
- D . Certificate pinning
DRAG DROP
An organization is planning for disaster recovery and continuity of operations.
INSTRUCTIONS
Review the following scenarios and instructions. Match each relevant finding to the affected host. After associating scenario 3 with the appropriate host(s), click the host to select the appropriate corrective action for that finding.
Each finding may be used more than once.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A threat hunting team receives a report about possible APT activity in the network.
Which of the following threat management frameworks should the team implement?
- A . NIST SP 800-53
- B . MITRE ATT&CK
- C . The Cyber Kill Chain
- D . The Diamond Model of Intrusion Analysis
Device event logs sources from MDM software as follows:
Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?
- A . Malicious installation of an application; change the MDM configuration to remove application ID 1220.
- B . Resource leak; recover the device for analysis and clean up the local storage.
- C . Impossible travel; disable the device’s account and access while investigating.
- D . Falsified status reporting; remotely wipe the device.
An energy company is required to report the average pressure of natural gas used over the past quarter. A PLC sends data to a historian server that creates the required reports.
Which of the following historian server locations will allow the business to get the required reports in an ОТ and IT environment?
- A . In the ОТ environment, use a VPN from the IT environment into the ОТ environment.
- B . In the ОТ environment, allow IT traffic into the ОТ environment.
- C . In the IT environment, allow PLCs to send data from the ОТ environment to the IT environment.
- D . Use a screened subnet between the ОТ and IT environments.
Which of the following is a benefit of using steganalysis techniques in forensic response?
- A . Breaking a symmetric cipher used in secure voice communications
- B . Determining the frequency of unique attacks against DRM-protected media
- C . Maintaining chain of custody for acquired evidence
- D . Identifying least significant bit encoding of data in a .wav file
A new web server must comply with new secure-by-design principles and PCI DSS. This includes mitigating the risk of an on-path attack.
A security analyst is reviewing the following web server configuration:
Which of the following ciphers should the security analyst remove to support the business requirements?
- A . TLS_AES_128_CCM_8_SHA256
- B . TLS_DHE_DSS_WITH_RC4_128_SHA
- C . TLS_CHACHA20_POLY1305_SHA256
- D . TLS_AES_128_GCM_SHA256