Download CompTIA Advanced Security Practitioner (CASP).DumpsArena.CAS-003.2021-05-24.1e.350q.vcex

Download Exam

File Info

Exam CompTIA Advanced Security Practitioner (CASP)
Number CAS-003
File Name CompTIA Advanced Security Practitioner (CASP).DumpsArena.CAS-003.2021-05-24.1e.350q.vcex
Size 9.73 Mb
Posted May 24, 2021
Downloads 48

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%


Demo Questions

Question 1
The Chief Information Officer (CIO) wants to increase security and accessibility among the organization’s cloud SaaS applications. The applications are configured to use passwords, and two-factor authentication is not provided natively.  
Which of the following would BEST address the CIO’s concerns?

  • A: Procure a password manager for the employees to use with the cloud applications.
  • B: Create a VPN tunnel between the on-premises environment and the cloud providers.
  • C: Deploy applications internally and migrate away from SaaS applications.
  • D: Implement an IdP that supports SAML and time-based, one-time passwords.

Question 2
The marketing department has developed a new marketing campaign involving significant social media outreach. The campaign includes allowing employees and customers to submit blog posts and pictures of their day-to-day experiences at the company. The information security manager has been asked to provide an informative letter to all participants regarding the security risks and how to avoid privacy and operational security issues.  
Which of the following is the MOST important information to reference in the letter?

  • A: After-action reports from prior incidents.
  • B: Social engineering techniques
  • C: Company policies and employee NDAs
  • D: Data classification processes 

Question 3
Click on the exhibit buttons to view the four messages.  





A security architect is working with a project team to deliver an important service that stores and processes customer banking details. The project, internally known as ProjectX, is due to launch its first set of features publicly within a week, but the team has not been able to implement encryption-atrest of the customer records. The security architect is drafting an escalation email to senior leadership.  
Which of the following BEST conveys the business impact for senior leadership?

  • A: Message 1
  • B: Message 2 
  • C: Message 3
  • D: Message 4

Question 4
The finance department has started to use a new payment system that requires strict PII security restrictions on various network devices. The company decides to enforce the restrictions and configure all devices appropriately. Which of the following risk response strategies is being used?

  • A: Avoid
  • B: Mitigate
  • C: Transfer
  • D: Accept

Question 5
Following a recent network intrusion, a company wants to determine the current security awareness of all of its employees.  
Which of the following is the BEST way to test awareness?

  • A: Conduct a series of security training events with comprehensive tests at the end
  • B: Hire an external company to provide an independent audit of the network security posture
  • C: Review the social media of all employees to see how much proprietary information is shared
  • D: Send an email from a corporate account, requesting users to log onto a website with their enterprise account 

Question 6
A technician is reviewing the following log:


Which of the following tools should the organization implement to reduce the highest risk identified in this log?

  • A: NIPS
  • B: DLP
  • C: NGFW
  • D: SIEM

Question 7
Given the following information about a company’s internal network: 
User IP space:
Server IP space:
A security engineer has been told that there are rogue websites hosted outside of the proper server space, and those websites need to be identified.  
Which of the following should the engineer do?

  • A: Use a protocol analyzer on
  • B: Use a port scanner on
  • C: Use an HTTP interceptor on 
  • D: Use a port scanner on
  • E: Use a protocol analyzer on
  • F: Use an HTTP interceptor on

Question 8
An organization just merged with an organization in another legal jurisdiction and must improve its network security posture in ways that do not require additional resources to implement data isolation. One recommendation is to block communication between endpoint PCs. 
Which of the following would be the BEST solution?

  • A: Installing HIDS
  • B: Configuring a host-based firewall
  • C: Configuring EDR
  • D: Implementing network segmentation

Question 9
A deployment manager is working with a software development group to assess the security of a new version of the organization’s internally developed ERP tool. The organization prefers to not perform assessment activities following deployment, instead focusing on assessing security throughout the life cycle. 
Which of the following methods would BEST assess the security of the product?

  • A: Static code analysis in the IDE environment
  • B: Penetration testing of the UAT environment
  • C: Vulnerability scanning of the production environment
  • D: Penetration testing of the production environment
  • E: Peer review prior to unit testing

Question 10
A security administrator is advocating for enforcement of a new policy that would require employers with privileged access accounts to undergo periodic inspections and review of certain job performance data. To which of the following policies is the security administrator MOST likely referring?

  • A: Background investigation
  • B: Mandatory vacation
  • C: Least privilege
  • D: Separation of duties



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files