Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CompTIA CASP CAS-003 Exam Questions and Answers PDF

Page: 19 / 26
Total 683 questions

CompTIA Advanced Security Practitioner (CASP) Exam Questions and Answers

Question 73

An administrator is working with management to develop policies related to the use of the cloud-based resources that contain corporate data. Management plans to require some control over organizational data stored on personal devices, such as tablets. Which of the following controls would BEST support management’s policy?

Options:

A.

MDM

B.

Sandboxing

C.

Mobile tokenization

D.

FDE

E.

MFA

Question 74

A large, public university has recently been experiencing an increase in ransomware attacks against computers connected to its network. Security engineers have discovered various staff members receiving seemingly innocuous files in their email that are being run. Which of the following would BEST mitigate this attack method?

Options:

A.

Improving organizations email filtering

B.

Conducting user awareness training

C.

Upgrading endpoint anti-malware software

D.

Enabling application whitelisting

Question 75

A breach was caused by an insider threat in which customer PII was compromised. Following the breach, a lead security analyst is asked to determine which vulnerabilities the attacker used to access company resources. Which of the following should the analyst use to remediate the vulnerabilities?

Options:

A.

Protocol analyzer

B.

Root cause analysis

C.

Behavioral analytics

D.

Data leak prevention

Question 76

A company’s chief cybersecurity architect wants to configure mutual authentication to access an internal payroll website. The architect has asked the administration team to determine the configuration that would provide the best defense against MITM attacks. Which of the following implementation approaches would BEST support the architect’s goals?

Options:

A.

Utilize a challenge-response prompt as required input at username/password entry.

B.

Implement TLS and require the client to use its own certificate during handshake.

C.

Configure a web application proxy and institute monitoring of HTTPS transactions.

D.

Install a reverse proxy in the corporate DMZ configured to decrypt TLS sessions.

Page: 19 / 26
Total 683 questions