Download CompTIA Advanced Security Practitioner-CASP-CAS-004.CAS-004.PassLeader.2025-03-31.167q.vcex

Vendor: CompTIA
Exam Code: CAS-004
Exam Name: CompTIA Advanced Security Practitioner-CASP-CAS-004
Date: Mar 31, 2025
File Size: 420 KB
Downloads: 1

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
A small bank is evaluating different methods to address and resolve the following requirements: 
  • Must be able to store credit card data using the smallest amount of data possible. 
  • Must be compliant with PCI DSS. 
  • Must maintain confidentiality if one piece of the layer is compromised. 
Which of the following is the BEST solution for the bank? 
  1. Scrubbing. 
  2. Tokenization. 
  3. Masking. 
  4. Homomorphic encryption.  
Correct answer: B
Question 2
When implementing serverless computing, an organization must still account for ____. 
  1. the underlying computing network infrastructure 
  2. hardware compatibility 
  3. the security of its data 
  4. patching the service  
Correct answer: C
Question 3
A systems administrator at a web-hosting provider has been tasked with renewing the public certificates of all customer sites. Which of the following would BEST support multiple domain names while minimizing the amount of certificates needed? 
 
  1. OCSP 
  2. CRL 
  3. SAN 
  4. CA  
Correct answer: C
Question 4
An IT department is currently working to implement an enterprise DLP solution. Due diligence and best practices must be followed in regard to mitigating risk. Which of the following ensures that authorized modifications are well planned and executed? 
 
  1. Risk management. 
  2. Network management. 
  3. Configuration management. 
  4. Change management.  
Correct answer: D
Question 5
A company's Chief Information Security Officer wants to prevent the company from being the target of ransomware. The company's IT assets need to be protected. Which of the following are the MOST secure options to address these concerns? (Choose three.) 
 
  1. Antivirus. 
  2. EDR. 
  3. Sandboxing. 
  4. Application control. 
  5. Host-based firewall. 
  6. IDS. 
  7. NGFW. 
  8. Strong authentication.  
Correct answer: CDG
Question 6
A security analyst has been tasked with assessing a new API. The analyst needs to be able to test for a variety of different inputs, both malicious and benign, in order to close any vulnerabilities. 
Which of the following should the analyst use to achieve this goal? 
 
  1. Static analysis. 
  2. Input validation. 
  3. Fuzz testing. 
  4. Post-exploitation.  
Correct answer: C
Question 7
An online video shows a company's Chief Executive Officer (CEO) making a company announcement. The CEO, however, did not make the announcement. Which of the following BEST describes this attack? 
 
  1. Identity theft. 
  2. Deepfake. 
  3. Website defacement. 
  4. Social engineering.  
Correct answer: B
Question 8
A security engineer needs to implement a cost-effective authentication scheme for a new web-based application that requires: 
  • Rapid authentication. 
  • Flexible authorization. 
  • Ease of deployment. 
  • Low cost but high functionality. 
Which of the following approaches best meets these objectives? 
 
  1. Kerberos 
  2. EAP 
  3. SAML 
  4. OAuth 
  5. TACACS+  
Correct answer: D
Question 9
Which of the following technologies would benefit the most from the use of biometric readers, proximity badge entry systems, and the use of hardware security tokens to access various environments and data entry systems? 
 
  1. Deep learning. 
  2. Machine learning. 
  3. Nanotechnology. 
  4. Passwordless authentication. 
  5. Biometric impersonation.  
Correct answer: D
Question 10
A hospital has fallen behind with patching known vulnerabilities due to concerns that patches may cause disruptions in the availability of data and impact patient care. The hospital does not have a tracking solution in place to audit whether systems have been updated or to track the length of time between notification of the weakness and patch completion. Since tracking is not in place, the hospital lacks accountability with regard to who is responsible for these activities and the timeline of patching efforts. Which of the following should the hospital do first to mitigate this risk? 
  1. Complete a vulnerability analysis. 
  2. Obtain guidance from the health ISAC. 
  3. Purchase a ticketing system for auditing efforts. 
  4. Ensure CVEs are current. 
  5. Train administrators on why patching is important.  
Correct answer: C
Question 11
The Chief Executive Officer of an online retailer notices a sudden drop in sales. A security analyst at the retailer detects a redirection of unsecure web traffic to a competitor's site. Which of the following would best prevent this type of attack? 
  1. Enabling HSTS. 
  2. Configuring certificate pinning. 
  3. Enforcing DNSSEC. 
  4. Deploying certificate stapling.  
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!