CompTIA.CAS-003.v2019-02-22.q103

Exam Code:CAS-003
Exam Name:CompTIA Advanced Security Practitioner (CASP)
Certification Provider:CompTIA
Free Question Number:103
Version:v2019-02-22
Rating:
# of views:185
# of Questions views:2779
Start Practice Test

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Other Version
393 viewsCompTIA.CAS-003.v2018-10-24.q92
659 viewsCompTIA.cas-003.v2018-05-17.q40
Exam Question List
Question 1: Given the code snippet below: (Exhibit) Which of the followi...
Question 2: An engineer is evaluating the control profile to assign to a...
Question 3: A software development team has spent the last 18 months dev...
Question 4: A security analyst is troubleshooting a scenario in which an...
Question 5: During a security event investigation, a junior analyst fail...
Question 6: A security controls assessor intends to perform a holistic c...
Question 7: A security engineer is attempting to convey the importance o...
Question 8: Company.org has requested a black-box security assessment be...
Question 9: A deployment manager is working with a software development ...
Question 10: A hospital's security team recently determined its network w...
Question 11: Two competing companies experienced similar attacks on their...
Question 12: A security analyst is inspecting pseudocode of the following...
Question 13: Due to a recent breach, the Chief Executive Officer (CEO) ha...
Question 14: A security technician is incorporating the following require...
Question 15: A company wants to perform analysis of a tool that is suspec...
Question 16: An engineer maintains a corporate-owned mobility infrastruct...
Question 17: A newly hired systems administrator is trying to connect a n...
Question 18: A security consultant is attempting to discover if the compa...
Question 19: During the deployment of a new system, the implementation te...
Question 20: A security administrator is hardening a TrustedSolaris serve...
Question 21: An agency has implemented a data retention policy that requi...
Question 22: A new cluster of virtual servers has been set up in a lab en...
Question 23: Users have been reporting unusual automated phone calls, inc...
Question 24: Given the following output from a security tool in Kali: (Ex...
Question 25: A company is acquiring incident response and forensic assist...
Question 26: A forensic analyst suspects that a buffer overflow exists in...
Question 27: After a large organization has completed the acquisition of ...
Question 28: A company has decided to lower costs by conducting an intern...
Question 29: An advanced threat emulation engineer is conducting testing ...
Question 30: A forensics analyst suspects that a breach has occurred. Sec...
Question 31: An internal penetration tester was assessing a recruiting pa...
Question 32: A security analyst has requested network engineers integrate...
Question 33: A server (10.0.0.2) on the corporate network is experiencing...
Question 34: A security engineer is performing an assessment again for a ...
Question 35: A user workstation was infected with a new malware variant a...
Question 36: To meet a SLA, which of the following document should be dra...
Question 37: A web developer has implemented HTML5 optimizations into a l...
Question 38: One of the objectives of a bank is to instill a security awa...
Question 39: A software development manager is running a project using ag...
Question 40: Following a security assessment, the Chief Information Secur...
Question 41: Given the following code snippet: (Exhibit) Of which of the ...
Question 42: Ann, a member of the finance department at a large corporati...
Question 43: An SQL database is no longer accessible online due to a rece...
Question 44: A company has adopted and established a continuous-monitorin...
Question 45: An organization enables BYOD but wants to allow users to acc...
Question 46: After multiple service interruptions caused by an older data...
Question 47: Engineers at a company believe a certain type of data should...
Question 48: An organization is in the process of integrating its operati...
Question 49: A project manager is working with a team that is tasked to d...
Question 50: A security incident responder discovers an attacker has gain...
Question 51: A systems security engineer is assisting an organization's m...
Question 52: Given the following code snippet: (Exhibit) Which of the fol...
Question 53: A large enterprise with thousands of users is experiencing a...
Question 54: A security engineer is designing a system in which offshore,...
Question 55: A network engineer is attempting to design-in resiliency cha...
Question 56: A threat advisory alert was just emailed to the IT security ...
Question 57: A software development team is conducting functional and use...
Question 58: A security administrator was informed that a server unexpect...
Question 59: Which of the following is an external pressure that causes c...
Question 60: A company is developing requirements for a customized OS bui...
Question 61: A security analyst is reviewing the corporate MDM settings a...
Question 62: An administrator has noticed mobile devices from an adjacent...
Question 63: A consulting firm was hired to conduct assessment for a comp...
Question 64: After investigating virus outbreaks that have cost the compa...
Question 65: A security engineer is working with a software development t...
Question 66: As a result of an acquisition, a new development team is bei...
Question 67: An organization's network engineering team recently deployed...
Question 68: An engineer is assisting with the design of a new virtualize...
Question 69: A company has gone through a round of phishing attacks. More...
Question 70: An enterprise with global sites processes and exchanges high...
Question 71: An information security officer is responsible for one secur...
Question 72: Which of the following BEST represents a risk associated wit...
Question 73: An engineer needs to provide access to company resources for...
Question 74: An infrastructure team is at the end of a procurement proces...
Question 75: A systems administrator has installed a disk wiping utility ...
Question 76: A financial consulting firm recently recovered from some dam...
Question 77: A security researches is gathering information about a recen...
Question 78: A company has hired an external security consultant to condu...
Question 79: A company has created a policy to allow employees to use the...
Question 80: Which of the following is the GREATEST security concern with...
Question 81: Management is reviewing the results of a recent risk assessm...
Question 82: A penetration tester noticed special characters in a databas...
Question 83: An internal staff member logs into an ERP platform and click...
Question 84: A security architect is determining the best solution for a ...
Question 85: A penetration tester has been contracted to conduct a physic...
Question 86: An organization is currently working with a client to migrat...
Question 87: A security consultant is improving the physical security of ...
Question 88: An organization has employed the services of an auditing fir...
Question 89: A government organization operates and maintains several ICS...
Question 90: An information security manager is concerned that connectivi...
Question 91: A medical device company is implementing a new COTS antiviru...
Question 92: A SaaS-based email service provider often receives reports f...
Question 93: To prepare for an upcoming audit, the Chief Information Secu...
Question 94: A security engineer is attempting to increase the randomness...
Question 95: A business is growing and starting to branch out into other ...
Question 96: The risk subcommittee of a corporate board typically maintai...
Question 97: During a security assessment, activities were divided into t...
Question 98: In the past, the risk committee at Company A has shown an av...
Question 99: A Chief Information Security Officer (CISO is reviewing and ...
Question 100: During a security assessment, an organization is advised of ...
Question 101: An insurance company has two million customers and is resear...
Question 102: An organization is considering the use of a thin client arch...
Question 103: A security engineer has implemented an internal user access ...