CompTIA CAS-004 CompTIA Advanced Security Practitioner (CASP+) Exam Online Training
CompTIA CAS-004 Online Training
The questions for CAS-004 were last updated at Jan 28,2025.
- Exam Code: CAS-004
- Exam Name: CompTIA Advanced Security Practitioner (CASP+) Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
A security engineer estimates the company’s popular web application experiences 100 attempted breaches per day. In the past four years, the company’s data has been breached two times.
Which of the following should the engineer report as the ARO for successful breaches?
- A . 0.5
- B . 8
- C . 50
- D . 36,500
A security engineer estimates the company’s popular web application experiences 100 attempted breaches per day. In the past four years, the company’s data has been breached two times.
Which of the following should the engineer report as the ARO for successful breaches?
- A . 0.5
- B . 8
- C . 50
- D . 36,500
A security engineer estimates the company’s popular web application experiences 100 attempted breaches per day. In the past four years, the company’s data has been breached two times.
Which of the following should the engineer report as the ARO for successful breaches?
- A . 0.5
- B . 8
- C . 50
- D . 36,500
A security engineer estimates the company’s popular web application experiences 100 attempted breaches per day. In the past four years, the company’s data has been breached two times.
Which of the following should the engineer report as the ARO for successful breaches?
- A . 0.5
- B . 8
- C . 50
- D . 36,500
Documents downloaded from websites must be scanned for malware.
Which of the following solutions should the network architect implement to meet the requirements?
- A . Reverse proxy, stateful firewalls, and VPNs at the local sites
- B . IDSs, WAFs, and forward proxy IDS
- C . DoS protection at the hub site, mutual certificate authentication, and cloud proxy
- D . IPSs at the hub, Layer 4 firewalls, and DLP
A security engineer needs to implement a solution to increase the security posture of user endpoints by providing more visibility and control over local administrator accounts. The endpoint security team is overwhelmed with alerts and wants a solution that has minimal operational burdens. Additionally, the solution must maintain a positive user experience after implementation.
Which of the following is the BEST solution to meet these objectives?
- A . Implement Privileged Access Management (PAM), keep users in the local administrators group, and enable local administrator account monitoring.
- B . Implement PAM, remove users from the local administrators group, and prompt users for explicit approval when elevated privileges are required.
- C . Implement EDR, remove users from the local administrators group, and enable privilege escalation monitoring.
- D . Implement EDR, keep users in the local administrators group, and enable user behavior analytics.
An organization’s hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.
Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?
- A . Deploy a SOAR tool.
- B . Modify user password history and length requirements.
- C . Apply new isolation and segmentation schemes.
- D . Implement decoy files on adjacent hosts.
A junior developer is informed about the impact of new malware on an Advanced RISC Machine (ARM) CPU, and the code must be fixed accordingly. Based on the debug, the malware is able to insert itself in another process memory location.
Which of the following technologies can the developer enable on the ARM architecture to prevent this type of malware?
- A . Execute never
- B . No-execute
- C . Total memory encryption
- D . Virtual memory encryption
A company is implementing SSL inspection. During the next six months, multiple web applications that will be separated out with subdomains will be deployed.
Which of the following will allow the inspection of the data without multiple certificate deployments?
- A . Include all available cipher suites.
- B . Create a wildcard certificate.
- C . Use a third-party CA.
- D . Implement certificate pinning.
A small business requires a low-cost approach to theft detection for the audio recordings it produces and sells.
Which of the following techniques will MOST likely meet the business’s needs?
- A . Performing deep-packet inspection of all digital audio files
- B . Adding identifying filesystem metadata to the digital audio files
- C . Implementing steganography
- D . Purchasing and installing a DRM suite