Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Complete CAS-003 CompTIA Materials

Page: 17 / 26
Total 683 questions

CompTIA Advanced Security Practitioner (CASP) Exam Questions and Answers

Question 65

A company is transitioning to a new VDI environment, and a system engineer is responsible for developing a sustainable security strategy for the VDIs.

Which of the following is the MOST appropriate order of steps to be taken?

Options:

A.

Firmware update, OS patching, HIDS, antivirus, baseline, monitoring agent

B.

OS patching, baseline, HIDS, antivirus, monitoring agent, firmware update

C.

Firmware update, OS patching, HIDS, antivirus, monitoring agent, baseline

D.

Baseline, antivirus, OS patching, monitoring agent, HIDS, firmware update

Question 66

A security engineer is performing an assessment again for a company. The security engineer examines the following output from the review:

Which of the following tools is the engineer utilizing to perform this assessment?

Options:

A.

Vulnerability scanner

B.

SCAP scanner

C.

Port scanner

D.

Interception proxy

Question 67

A security engineer must establish a method to assess compliance with company security policies as they apply to the unique configuration of individual endpoints, as well as to the shared configuration policies of common devices.

Which of the following tools is the security engineer using to produce the above output?

Options:

A.

Vulnerability scanner

B.

SIEM

C.

Port scanner

D.

SCAP scanner

Question 68

Ann, a member of the finance department at a large corporation, has submitted a suspicious email she received to the information security team. The team was not expecting an email from Ann, and it contains a PDF file inside a ZIP compressed archive. The information security learn is not sure which files were opened. A security team member uses an air-gapped PC to open the ZIP and PDF, and it appears to be a social engineering attempt to deliver an exploit.

Which of the following would provide greater insight on the potential impact of this attempted attack?

Options:

A.

Run an antivirus scan on the finance PC.

B.

Use a protocol analyzer on the air-gapped PC.

C.

Perform reverse engineering on the document.

D.

Analyze network logs for unusual traffic.

E.

Run a baseline analyzer against the user’s computer.

Page: 17 / 26
Total 683 questions