CAS-004 Practice Online

Quickly grab our CAS-004 product now and kickstart your exam preparation today!

Name: CompTIA Advanced Security Practitioner (CASP+)
Exam Code: CAS-004
Certification: CompTIA Advanced Security Practitioner
Vendor: CompTIA
Total Questions: 981
Last Updated: Apr 23, 2024
Page:    1 / 197      
Total 981 Questions | Updated On: Apr 23, 2024
Question 1

Dion Training is analyzing their student practice exam experience. During the analysis, the staff measured the current resiliency of the system by calculating the MTTR and MTBF for the system. The MTTR was measured at 9.1 hours and the MTBF was measured at 3.2 years. Susan, the Chief Operations Officer, stated that the MTTR should be at most 4 hours and the MTBF should be at least 4 years. The team at Dion Training will use all of these measurements and goals to create a technical implementation plan to reach Susan’s requirements. Based on the measurements and goals provided, which of the following types of analysis has the team at Dion Training just performed?


Answer: A

Question 2

Sarah has reason to believe that systems on her network have been compromised by an APT. She has noticed many file transfers outbound to a remote site via TLS-protected HTTPS sessions from unknown systems. Which of the following techniques would most likely detect the APT?


Answer: D

Question 3

The Chief Security Officer at Dion Training is concerned with the threat of data remnants being exposed as their cloud-based servers elastically scale to meet rising and falling user demands. Which of the following cryptographic techniques would BEST be used to mitigate the risk of data remnants being read by a malicious attacker?


Answer: D

Question 4

An outside organization has completed a penetration test for a company. One of the report items states that an attacker may have the ability to read TLS traffic from the webserver due to a software bug. What is the MOST likely mitigation for this reported item?


Answer: C

Question 5

A digital forensics expert has obtained an ARM binary suspected of including malicious behavior. The expert would like to trace and analyze the ARM binary’s execution. Which of the following tools would BEST support this effort? 


Answer: B

Page:    1 / 197      
Total 981 Questions | Updated On: Apr 23, 2024