Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Ace Your CAS-003 CompTIA CASP Exam

Page: 2 / 26
Total 683 questions

CompTIA Advanced Security Practitioner (CASP) Exam Questions and Answers

Question 5

An incident response analyst is investigating a compromise on a application server within an organization. The analyst identifies an anomalous process that is executing and maintaining a persistent TCP connection to an external IP Which of the following actions should the analyst take NEXT?

Options:

A.

Capture running memory

B.

Create a BitCopy of the hard disk

C.

Use no to conduct banner grabbing on the remote IP

D.

Review /var/log/* for anomalous entries

Question 6

A company s design team is increasingly concerned about intellectual property theft Members of the team often travel to suppliers' offices where they collaborate and share access to their sensitive data. Which of the following should be implemented?

Options:

A.

Apply MOM and enforce full disk encryption on all design team laptops

B.

Allow access to sensitive data only through a multifactor-authenticated VDI environment

C.

Require all sensitive files be saved only on company fileshares accessible only through multifactor-authenticated VPN

D.

Store all sensitive data on geographically/ restricted, public-facing SFTP servers authenticated using TOTP

Question 7

An analyst is testing the security of a server and attempting to infiltrate the network. The analyst is able to obtain the following output after running some tools on the server.

Which of the following will the analyst most likely do NEXT?

Options:

A.

Use John the Ripper to attempt password recovery

B.

Log in with either of the administrator passwords shown

C.

Log in with the guest account since it has a blank password

D.

Use Medusa to perform an online attack of the HELPOESK account

Question 8

An organization's email filler is an ineffective control and as a result employees have been constantly receiving phishing emails. As part of a security incident investigation a security analyst identifies the following:

1 An employee was working remotely when the security alert was triggered

2 An employee visited a number of uncategorized internet sites

3 A doc file was downloaded

4 A number of files were uploaded to an unknown collaboration site

Which of the following controls would provide the security analyst with more data to identify the root cause of the issue and protect the organization's information during future incidents?

Options:

A.

EDR and DLP

B.

DAM and MFA

C.

HIPS and application whitelisting

D.

FIM and antivirus

Page: 2 / 26
Total 683 questions