CompTIA CAS-004 CompTIA Advanced Security Practitioner (CASP+) Exam Online Training
CompTIA CAS-004 Online Training
The questions for CAS-004 were last updated at Jan 28,2025.
- Exam Code: CAS-004
- Exam Name: CompTIA Advanced Security Practitioner (CASP+) Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
A company processes data subject to NDAs with partners that define the processing and storage constraints for the covered data. The agreements currently do not permit moving the covered data to the cloud, and the company would like to renegotiate the terms of the agreements.
Which of the following would MOST likely help the company gain consensus to move the data to the cloud?
- A . Designing data protection schemes to mitigate the risk of loss due to multitenancy
- B . Implementing redundant stores and services across diverse CSPs for high availability
- C . Emulating OS and hardware architectures to blur operations from CSP view
- D . Purchasing managed FIM services to alert on detected modifications to covered data
Ransomware encrypted the entire human resources fileshare for a large financial institution. Security operations personnel were unaware of the activity until it was too late to stop it. The restoration will take approximately four hours, and the last backup occurred 48 hours ago. The management team has indicated that the RPO for a disaster recovery event for this data classification is 24 hours.
Based on RPO requirements, which of the following recommendations should the management team make?
- A . Leave the current backup schedule intact and pay the ransom to decrypt the data.
- B . Leave the current backup schedule intact and make the human resources fileshare read-only.
- C . Increase the frequency of backups and create SIEM alerts for IOCs.
- D . Decrease the frequency of backups and pay the ransom to decrypt the data.
A company undergoing digital transformation is reviewing the resiliency of a CSP and is concerned about meeting SLA requirements in the event of a CSP incident.
Which of the following would be BEST to proceed with the transformation?
- A . An on-premises solution as a backup
- B . A load balancer with a round-robin configuration
- C . A multicloud provider solution
- D . An active-active solution within the same tenant
A company has hired a security architect to address several service outages on the endpoints due to new malware. The Chief Executive Officer’s laptop was impacted while working from home. The goal is to prevent further endpoint disruption. The edge network is protected by a web proxy.
Which of the following solutions should the security architect recommend?
- A . Replace the current antivirus with an EDR solution.
- B . Remove the web proxy and install a UTM appliance.
- C . Implement a deny list feature on the endpoints.
- D . Add a firewall module on the current antivirus solution.
All staff at a company have started working remotely due to a global pandemic. To transition to remote work, the company has migrated to SaaS collaboration tools.
The human resources department wants to use these tools to process sensitive information but is concerned the data could be:
Leaked to the media via printing of the documents
Sent to a personal email address
Accessed and viewed by systems administrators
Uploaded to a file storage site
Which of the following would mitigate the department’s concerns?
- A . Data loss detection, reverse proxy, EDR, and PGP
- B . VDI, proxy, CASB, and DRM
- C . Watermarking, forward proxy, DLP, and MFA
- D . Proxy, secure VPN, endpoint encryption, and AV
A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:
Unauthorized insertions into application development environments Authorized insiders making unauthorized changes to environment configurations
Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)
- A . Perform static code analysis of committed code and generate summary reports.
- B . Implement an XML gateway and monitor for policy violations.
- C . Monitor dependency management tools and report on susceptible third-party libraries.
- D . Install an IDS on the development subnet and passively monitor for vulnerable services.
- E . Model user behavior and monitor for deviations from normal.
- F . Continuously monitor code commits to repositories and generate summary logs.
An enterprise is deploying APIs that utilize a private key and a public key to ensure the connection string is protected. To connect to the API, customers must use the private key.
Which of the following would BEST secure the REST API connection to the database while preventing the use of a hard-coded string in the request string?
- A . Implement a VPN for all APIs.
- B . Sign the key with DSA.
- C . Deploy MFA for the service accounts.
- D . Utilize HMAC for the keys.
An application server was recently upgraded to prefer TLS 1.3, and now users are unable to connect their clients to the server.
Attempts to reproduce the error are confirmed, and clients are reporting the following: ERR_SSL_VERSION_OR_CIPHER_MISMATCH
Which of the following is MOST likely the root cause?
- A . The client application is testing PFS.
- B . The client application is configured to use ECDHE.
- C . The client application is configured to use RC4.
- D . The client application is configured to use AES-256 in GCM.
An organization is designing a network architecture that must meet the following requirements:
Users will only be able to access predefined services.
Each user will have a unique allow list defined for access.
The system will construct one-to-one subject/object access paths dynamically.
Which of the following architectural designs should the organization use to meet these requirements?
- A . Peer-to-peer secure communications enabled by mobile applications
- B . Proxied application data connections enabled by API gateways
- C . Microsegmentation enabled by software-defined networking
- D . VLANs enabled by network infrastructure devices
A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.
- A . Impalement application whitelisting and add only the email client to the whitelist for laptop in the claims processing department.
- B . Required all laptops to connect to the VPN before accessing email.
- C . Implement cloud-based content filtering with sandboxing capabilities.
- D . Install a mail gateway to scan incoming messages and strip attachments before they reach the mailbox.