New CAS-004 dumps contain 325 exam questions and answers and are the best material for preparing for the CompTIA CASP+ certification exam.
Using CAS-004 dumps: https://www.leads4pass.com/cas-004.html Select the latest updated CAS-004 dumps PDF, CAS-004 dumps VCE or “PDF + VCE”, Help candidates pass the CompTIA CASP+ certification exam with ease.
Download Free Share CAS-004 Dumps PDF: https://drive.google.com/file/d/1HTuRmBFIxx6IdcHgWxydtzAE7QEHNsVX/
Read the latest free CAS-004 Dumps exam questions and answers online:
Number of exam questions | Exam name | From | Release time | Last updated |
15 | CompTIA Advanced Security Practitioner (CASP+) | Lead4Pass | Oct 16, 2022 | CAS-004 dumps |
New Question 1:
An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items. Which of the following phases establishes the identification and prioritization of critical systems and functions?
A. Review a recent gap analysis.
B. Perform a cost-benefit analysis.
C. Conduct a business impact analysis.
D. Develop an exposure factor matrix.
Correct Answer: C
Reference: https://itsm.ucsf.edu/business-impact-analysis-bia-0
New Question 2:
An organization is preparing to migrate its production environment systems from an on-premises environment to a cloud service. The lead security architect is concerned that the organization\’s current methods for addressing risk may not be possible in the cloud environment.
Which of the following BEST describes the reason why traditional methods of addressing risk may not be possible in the cloud?
A. Migrating operations assume the acceptance of all risks.
B. Cloud providers are unable to avoid risk.
C. Specific risks cannot be transferred to the cloud provider.
D. Risks to data in the cloud cannot be mitigated.
Correct Answer: D
Reference: https://arxiv.org/ftp/arxiv/papers/1303/1303.4814.pdf
New Question 3:
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.)
A. Conduct input sanitization.
B. Deploy a SIEM.
C. Use containers.
D. Patch the OS
E. Deploy a WAF.
F. Deploy a reverse proxy
G. Deploy an IDS.
Correct Answer: AE
A WAF protects your web apps by filtering, monitoring, and blocking any malicious HTTP/S traffic traveling to the web application, and prevents any unauthorized data from leaving the app. It does this by adhering to a set of policies that help determine what traffic is malicious and what traffic is safe.
New Question 4:
During a remodel, a company\’s computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The company wants to be able to identify any unauthorized individuals who enter the storage room by following an authorized employee.
Which of the following processes would BEST satisfy this requirement?
A. Monitor camera footage corresponding to a valid access request.
B. Require both security and management to open the door.
C. Require department managers to review denied-access requests.
D. Issue new entry badges on a weekly basis.
Correct Answer: B
Reference: https://www.getkisi.com/access-control
New Question 5:
A company is preparing to deploy a global service.
Which of the following must the company do to ensure GDPR compliance? (Choose two.)
A. Inform users regarding what data is stored.
B. Provide opt-in/out for marketing messages.
C. Provide data deletion capabilities.
D. Provide optional data encryption.
E. Grant data access to third parties.
F. Provide alternative authentication techniques.
Correct Answer: AC
The main rights for individuals under the GDPR are to:
1.
allow subject access
2.
have inaccuracies corrected
3.
have information erased
4.
prevent direct marketing
5.
prevent automated decision-making and profiling
6.
allow data portability (as per the paragraph above) https://www.clouddirect.net/11-things-you-must-do-now-for-gdpr-compliance/
New Question 6:
A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application. Which of the following is the MOST likely cause?
A. The user agent client is not compatible with the WAF.
B. A certificate on the WAF is expired.
C. HTTP traffic is not forwarding to HTTPS to decrypt.
D. Old, vulnerable cipher suites are still being used.
Correct Answer: D
Reference: https://aws.amazon.com/premiumsupport/knowledge-center/waf-block-http-requests-no-user-agent/
New Question 7:
A security analyst is reviewing the following output:
Which of the following would BEST mitigate this type of attack?
A. Installing a network firewall
B. Placing a WAF inline
C. Implementing an IDS
D. Deploying a honeypot
Correct Answer: B
New Question 8:
Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?
A. Key sharing
B. Key distribution
C. Key recovery
D. Key escrow
Correct Answer: D
Reference: https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48322andsection=1.3
New Question 9:
An organization is implementing a new identity and access management architecture with the following objectives:
1.
Supporting MFA against on-premises infrastructure
2.
Improving the user experience by integrating with SaaS applications
3.
Applying risk-based policies based on location
4.
Performing just-in-time provisioning
Which of the following authentication protocols should the organization implement to support these requirements?
A. Kerberos and TACACS
B. SAML and RADIUS
C. OAuth and OpenID
D. OTP and 802.1X
Correct Answer: C
New Question 10:
Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext?
A. Lattice-based cryptography
B. Quantum computing
C. Asymmetric cryptography
D. Homomorphic encryption
Correct Answer: D
Reference: https://searchsecurity.techtarget.com/definition/cryptanalysis
New Question 11:
A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company\’s services to ensure false positives do not drop legitimate traffic. Which of the following would satisfy the requirement?
A. NIDS
B. NIPS
C. WAF
D. Reverse proxy
Correct Answer: A
New Question 12:
A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of the restoration of critical services. Which of the following should be modified to prevent the issue from reoccurring?
A. Recovery point objective
B. Recovery time objective
C. Mission-essential functions
D. Recovery service level
Correct Answer: D
Reference: https://www.nakivo.com/blog/disaster-recovery-in-cloud-computing/
New Question 13:
A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.
The technician will define this threat as:
A. a decrypting RSA using obsolete and weakened encryption attack.
B. a zero-day attack.
C. an advanced persistent threat.
D. an on-path attack.
Correct Answer: C
Reference: https://www.internetsociety.org/deploy360/tls/basics/
New Question 14:
A security engineer thinks the development team has been hard-coding sensitive environment variables in its code. Which of the following would BEST secure the company\’s CI/CD pipeline?
A. Utilizing a trusted secrets manager
B. Performing DAST on a weekly basis
C. Introducing the use of container orchestration
D. Deploying instance tagging
Correct Answer: A
Reference: https://about.gitlab.com/blog/2021/04/09/demystifying-ci-cd-variables/
New Question 15:
A small company recently developed prototype technology for a military program. The company\’s security engineer is concerned about the potential theft of the newly developed, proprietary information. Which of the following should the security engineer do to BEST manage the threats proactively?
A. Join an information-sharing community that is relevant to the company.
B. Leverage the MITRE ATTandCK framework to map the TTR.
C. Use OSINT techniques to evaluate and analyze the threats.
D. Update security awareness training to address new threats, such as best practices for data security.
Correct Answer: C
…
Lead4Pass CAS-004 dumps have been updated to the latest version. It has been verified by the actual test room and is real and effective. It is the best exam material for the CompTIA CASP+ certification exam. Download CAS-004 dumps with PDF and VCE:https://www.leads4pass.com/cas-004.html (325 Q&As)
Help candidates pass 100% of CompTIA CASP+ certification exams.
BTW, share part of CAS-004 Dumps PDF online download for free:
https://drive.google.com/file/d/1cUO2SOU1tH5fidaQSGQssHOIW3la0dfW/
https://drive.google.com/file/d/1IbvnTbTz7x2VbxDQ1GHCSEII5xMN55Pn/
https://drive.google.com/file/d/1gPzIc5NxyzqTe5jbFzvmofpUGr5d4CUr/