CompTIA Advanced Security Practitioner (CASP+) CAS-004 Exam Practice Test

Page: 1 / 14
Total 611 questions
Question 1

A software development company wants to ensure that users can confirm the software is legitimate when installing it. Which of the following is the best way for the company to achieve this security objective?



Answer : A

Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed. This provides users with the assurance that the software is legitimate and safe to install.


Question 2

An organization is researching the automation capabilities for systems within an OT network. A security analyst wants to assist with creating secure coding practices and would like to learn about theprogramming languages used on the PLCs. Which of the following programming languages is the MOST relevant for PLCs?



Answer : A


Question 3

To bring digital evidence in a court of law the evidence must be:



Answer : A

In the context of legal proceedings, 'material' evidence refers to evidence that is relevant and has a significant impact on the case at hand. For digital evidence to be admissible in court, it must be material, meaning it must relate directly to the case and contribute to proving or disproving a key aspect of the case. Material evidence helps establish the facts and is crucial for the court's decision-making process.


Question 4

SIMULATION

You are an information security analyst tasked to provide feedback and remediation

guidance to an organization that is working to comply with a prescriptive framework.

The framework includes the following controls related to network design:

. Network hosts must be segmented into security domains.

. A screened subnet must be used for all externally available assets.

. A shared services zone must be present for internal servers and should not contain workstations.

INSTRUCTIONS

Based on the stated requirements, place each resource in the appropriate network location. All resources must be used, and all network zones will be filled.



Answer : A

LAN:

Workstation

Workstation

Shared Services Zone:

File server

Authentication server

Database server

Screened Subnet (DMZ):

Web server

Email proxy

VPN concentrator

Let's Map Them by Zone

LAN (Top Right, 2 boxes) -- Workstations only

Workstation

Workstation

Shared Services Zone (Middle Row) -- Internal-use servers

File server

Authentication server

Database server

Screened Subnet / DMZ (Bottom Row) -- Public-facing services

Web server

Email proxy

VPN concentrator

Remaining Workstations:

Go in theLAN(you'll have two more slots)

Final Assignment:

LAN (Top Right)

Workstation

Workstation

Shared Services Zone (Middle Row)

File server

Authentication server

Shared Services Zone (Middle Row)

Database server

WorkstationThis is not allowed!(Needs to go elsewhere)

So we must placeall 4 workstationsinto theLAN, and all 3 internal servers into themiddlerow.

Corrected Mapping:

LAN (Top Right - 2 slots)

Workstation

Workstation

Middle Row (Shared Services Zone - 2 boxes)

File server

Authentication server

Bottom Row (Shared Services or DMZ - 3 boxes)

Database server

Web server

Email proxy / VPN concentrator


Question 5

An organization is rolling out a robust vulnerability management system to monitor SCADA devices on the network. Which of the following scan types should be used to monitor these system types?



Answer : C

Passive scanning is the safest approach for SCADA systems to avoid disrupting their operations. It detects vulnerabilities by analyzing network traffic without directly interacting with the systems, aligning with CASP+ objective 4.2, which focuses on securing critical systems and reducing risks during vulnerability management.

Passive scanningcollects network and device information without sending intrusive probes, which is critical forSCADA (Supervisory Control and Data Acquisition)systems as they are highly sensitive to disruptions.

Web application scanningfocuses on website vulnerabilities and is irrelevant to SCADA systems.

Agent-based scanninginvolves installing software agents, which may not be feasible for SCADA.

Authenticated scanningrequires credentials, which can still disrupt SCADA devices.


CompTIA CASP+ Exam Objective 4.1: Conduct vulnerability scans to evaluate the state of system security.

CASP+ Study Guide, 5th Edition, Chapter 7, Specialized Vulnerability Scanning.

________________________________________

Question 6

A help desk technician is troubleshooting an issue with an employee's laptop that will not boot into its operating system. The employee reported the laptop had been stolen but then found it one day later. The employee has asked the technician for help recovering important dat

a. The technician has identified the following:

* The laptop operating system was not configured with BitLocker.

* The hard drive has no hardware failures.

* Data is present and readable on the hard drive, although it appears to be illegible.

Which of the following is the most likely reason the technician is unable to retrieve legible data from the hard drive?



Answer : C


Question 7

Several unlabeled documents in a cloud document repository contain cardholder information. Which of the following configuration changes should be made to the DLP system to correctly label these documents in the future?



Answer : C


Page:    1 / 14   
Total 611 questions