How To Pass CompTIA CASP CAS-003 Certification Exam

Get the CompTIA CASP CAS-003 Certification Exam. “CompTIA Advanced Security Practitioner (CASP)”: https://www.pass4itsure.com/cas-003.html (Q&As: 324). Free CompTIA CASP CAS-003 exam practice test. Improve your skills and exam experience!

Get the latest CompTIA CASP CAS-003 pdf

[PDF] Free CompTIA CAS-003 pdf dumps download from Google Drive: https://drive.google.com/open?id=1CN79DlX23HdpDRpgKIzKApNCNyz_f81p

Valid information provided by CompTIA officials

(CASP+) Advanced Security Practitioner Certification | CompTIA IT Certifications: https://certification.comptia.org/certifications/comptia-advanced-security-practitioner

Why is it different?

CASP+ is the only hands-on, performance-based certification for practitioners – not managers – at the advanced skill level of cybersecurity. While cybersecurity managers help identify what cybersecurity policies and frameworks could be implemented, CASP+ certified professionals figure out how to implement solutions within those policies and frameworks.

About the exam

The CASP+ certification validates advanced-level competency in risk management; enterprise security operations and architecture; research and collaboration; and integration of enterprise security. Successful candidates will have the knowledge required to:

  • Enterprise Security domain expanded to include operations and architecture concepts, techniques, and requirements
  • More emphasis on analyzing risk through interpreting trend data and anticipating cyber-defense needs to meet business goals
  • Expanding security control topics to include Mobile and small form factor devices, as well as software vulnerability
  • Broader coverage of integrating cloud and virtualization technologies into a secure enterprise architecture
  • Inclusion of implementing cryptographic techniques, such as Blockchain- Cryptocurrency and Mobile device encryption

The latest CompTIA CASP CAS-003 exam practice questions test your strength

QUESTION 1
The Chief Executive Officer (CEO) has asked a security project manager to provide recommendations on the breakout
of tasks for the development of a new product. The CEO thinks that by assigning areas of work appropriately the overall
security of the product will be increased, because staff will focus on their areas of expertise. Given the below groups
and tasks select the BEST list of assignments.
Groups: Networks, Development, Project Management, Security, Systems Engineering, Testing Tasks: Decomposing
requirements, Secure coding standards, Code stability, Functional validation, Stakeholder engagement, Secure
transport
A. Systems Engineering. Decomposing requirements Development: Secure coding standards Testing. Code stability
Project Management: Stakeholder engagement Security: Secure transport Networks: Functional validation
B. Systems Engineering. Decomposing requirements Development: Code stability Testing. Functional validation Project
Management: Stakeholder engagement Security: Secure coding standards Networks: Secure transport
C. Systems Engineering. Functional validation Development: Stakeholder engagement Testing. Code stability Project
Management: Decomposing requirements Security: Secure coding standards Networks: Secure transport
D. Systems Engineering. Decomposing requirements Development: Stakeholder engagement Testing. Code stability
Project Management: Functional validation Security: Secure coding standards Networks: Secure transport
Correct Answer: B

 

QUESTION 2
A penetration tester has been contracted to conduct a physical assessment of a site. Which of the following is the
MOST plausible method of social engineering to be conducted during this engagement?
A. Randomly calling customer employees and posing as a help desk technician requiring user password to resolve
issues
B. Posing as a copier service technician and indicating the equipment had “phoned home” to alert the technician for a
service call
C. Simulating an illness while at a client location for a sales call and then recovering once listening devices are installed
D. Obtaining fake government credentials and impersonating law enforcement to gain access to a company facility
Correct Answer: A

 

QUESTION 3
A systems administrator establishes a CIFS share on a UNIX device to share data to Windows systems. The security
authentication on the Windows domain is set to the highest level. Windows users are stating that they cannot
authenticate to the UNIX share. Which of the following settings on the UNIX server would correct this problem?
A. Refuse LM and only accept NTLMv2
B. Accept only LM
C. Refuse NTLMv2 and accept LM
D. Accept only NTLM
Correct Answer: A
In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication,
integrity, and confidentiality to users. NTLM is the successor to the authentication protocol in Microsoft LAN Manager
(LANMAN or LM), an older Microsoft product, and attempts to provide backwards compatibility with LANMAN. NTLM
version 2 (NTLMv2), which was introduced in Windows NT 4.0 SP4 (and natively supported in Windows 2000),
enhances NTLM security by hardening the protocol against many spoofing attacks, and adding the ability for a server to
authenticate to the client. This question states that the security authentication on the Windows domain is set to the
highest level. This will be NTLMv2. Therefore, the answer to the question is to allow NTLMv2 which will enable the
Windows users to connect to the UNIX server. To improve security, we should disable the old and insecure LM protocol
as it is not used by the Windows computers.

 

QUESTION 4
A company has decided to relocate and the security manager has been tasked to perform a site survey of the new
location to help in the design of the physical infrastructure. The current location has video surveillance throughout the
building and entryways.
The following requirements must be met:
Able to log entry of all employees in and out of specific areas
Access control into and out of all sensitive areas
Tailgating prevention
Which of the following would MOST likely be implemented to meet the above requirements and provide a secure
solution? (Select TWO).
A. Discretionary Access control
B. Man trap
C. Visitor logs
D. Proximity readers
E. Motion detection sensors
Correct Answer: BD

 

QUESTION 5
After embracing a BYOD policy, a company is faced with new security challenges from unmanaged mobile devices and
laptops. The company\\’s IT department has seen a large number of the following incidents: Duplicate IP addresses
Rogue network devices Infected systems probing the company\\’s network Which of the following should be
implemented to remediate the above issues? (Choose two.)
A. Port security
B. Route protection
C. NAC
D. HIPS
E. NIDS
Correct Answer: BC

 

QUESTION 6
While attending a meeting with the human resources department, an organization\\’s information security officer sees an
employee using a username and password written on a memo pad to log into a specific service. When the information
security officer inquires further as to why passwords are being written down, the response is that there are too many
passwords to remember for all the different services the human resources department is required to use.
Additionally, each password has specific complexity requirements and different expiration time frames. Which of the
following would be the BEST solution for the information security officer to recommend?
A. Utilizing MFA
B. Implementing SSO
C. Deploying 802.1X
D. Pushing SAML adoption
E. Implementing TACACS
Correct Answer: B

 

QUESTION 7
A software development manager is running a project using agile development methods. The company cybersecurity
engineer has noticed a high number of vulnerabilities have been making it into production code on the project. Which of
the following methods could be used in addition to an integrated development environment to reduce the severity of the
issue?
A. Conduct a penetration test on each function as it is developed
B. Develop a set of basic checks for common coding errors
C. Adopt a waterfall method of software development
D. Implement unit tests that incorporate static code analyzers
Correct Answer: D

 

QUESTION 8
The security team for Company XYZ has determined that someone from outside the organization has obtained sensitive
information about the internal organization by querying the external DNS server of the company. The security manager
is tasked with making sure this problem does not occur in the future. How would the security manager address this
problem?
A. Implement a split DNS, only allowing the external DNS server to contain information about domains that only the
outside world should be aware, and an internal DNS server to maintain authoritative records for internal systems.
B. Implement a split DNS, only allowing the external DNS server to contain information about internal domain resources
that the outside world would be interested in, and an internal DNS server to maintain authoritative records for internal
systems.
C. Implement a split DNS, only allowing the external DNS server to contain information about domains that only the
outside world should be aware, and an internal DNS server to maintain non-authoritative records for external systems.
D. Implement a split DNS, only allowing the internal DNS server to contain information about domains the outside world
should be aware of, and an external DNS server to maintain authoritative records for internal systems.
Correct Answer: A

 

QUESTION 9
A security manager is looking into the following vendor proposal for a cloud-based SIEM solution. The intention is that
the cost of the SIEM solution will be justified by having reduced the number of incidents and therefore saving on the
amount spent investigating incidents.
Proposal:
External cloud-based software as a service subscription costing $5,000 per month. Expected to reduce the number of
current incidents per annum by 50%.
The company currently has ten security incidents per annum at an average cost of $10,000 per incident. Which of the
following is the ROI for this proposal after three years?
A. -$30,000
B. $120,000
C. $150,000
D. $180,000
Correct Answer: A
Return on investment = Net profit / Investment
where:Net profit = gross profit expenses.
or
Return on investment = (gain from investment ?cost of investment) / cost of investment
Subscriptions = 5,000 x 12 = 60,000 per annum
10 incidents @ 10,000 = 100.000 per annumreduce by 50% = 50,000 per annum
Thus the rate of Return is -10,000 per annum and that makes for -$30,000 after three years.
References:
http://www.financeformulas.net/Return_on_Investment.html

 

QUESTION 10
Virtual hosts with different security requirements should be:
A. encrypted with a one-time password.
B. stored on separate physical hosts.
C. moved to the cloud.
D. scanned for vulnerabilities regularly.
Correct Answer: B

 

QUESTION 11
A company has hired an external security consultant to conduct a thorough review of all aspects of corporate security.
The company is particularly concerned about unauthorized access to its physical offices resulting in network
compromises. Which of the following should the consultant recommend be performed to evaluate potential risks?
A. The consultant should attempt to gain access to physical offices through social engineering and then attempt data
exfiltration
B. The consultant should be granted access to all physical access control systems to review logs and evaluate the
likelihood of the threat
C. The company should conduct internal audits of access logs and employee social media feeds to identify potential
insider threats
D. The company should install a temporary CCTV system to detect unauthorized access to physical offices
Correct Answer: A

 

QUESTION 12
Which of the following authentication types is used primarily to authenticate users through the use of tickets?
A. LDAP
B. RADIUS
C. TACACS+
D. Kerberos
Correct Answer: D

 

QUESTION 13
An investigation showed a worm was introduced from an engineer\\’s laptop. It was determined the company does not
provide engineers with company-owned laptops, which would be subject to a company policy and technical controls.
Which of the following would be the MOST secure control implement?
A. Deploy HIDS on all engineer-provided laptops, and put a new router in the management network.
B. Implement role-based group policies on the management network for client access.
C. Utilize a jump box that is only allowed to connect to client from the management network.
D. Deploy a company-wide approved engineering workstation for management access.
Correct Answer: A

Follow Pass4itsure free sharing of YouTube channels

We offer more ways to make it easier for everyone to learn, and YouTube is the best tool in the video. Follow channels: https://www.youtube.com/channel/UCTP5RClZrtMxtRkSvIag0DQ/videos get more useful exam content.

Share Pass4itsure coupons for free

pass4itsure coupon

Reasons to choose Pass4itsure

Pass4itsure offers the latest exam practice questions and answers free of charge! Update all exam questions throughout the year,
with a number of professional exam experts! To make sure it works! Maximum pass rate, best value for money! Helps you pass the exam easily on your first attempt.

why pass4itsure

This maybe you’re interested

Summarize:

The latest CompTIA CASP CAS-003 dumps, online CAS-003 practice test questions, pass CAS-003 exam: https://www.pass4itsure.com/cas-003.html (Q&As: 135). Boost exam skills Share CAS-003 pdf and CAS-003 Youtube videos for free