11.11 Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Changed CAS-004 Exam Questions

Page: 9 / 38
Total 506 questions

CompTIA Advanced Security Practitioner (CASP+) Exam Questions and Answers

Question 33

A security architect is working with a new customer to find a vulnerability assessment solution that meets the following requirements:

• Fast scanning

• The least false positives possible

• Signature-based

• A low impact on servers when performing a scan

In addition, the customer has several screened subnets, VLANs, and branch offices. Which of the following will best meet the customer's needs?

Options:

A.

Authenticated scanning

B.

Passive scanning

C.

Unauthenticated scanning

D.

Agent-based scanning

Question 34

A company has been the target of LDAP injections, as well as brute-force, whaling, and spear-phishing attacks. The company is concerned about ensuring continued system access. The company has already implemented a SSO system with strong passwords. Which of the following additional controls should the company deploy?

Options:

A.

Two-factor authentication

B.

Identity proofing

C.

Challenge questions

D.

Live identity verification

Question 35

A security engineer needs to implement a cost-effective authentication scheme for a new web-based application that requires:

•Rapid authentication

•Flexible authorization

•Ease of deployment

•Low cost but high functionality

Which of the following approaches best meets these objectives?

Options:

A.

Kerberos

B.

EAP

C.

SAML

D.

OAuth

E.

TACACS+

Question 36

A software developer has been tasked with creating a unique threat detection mechanism that is based on machine learning. The information system for which the tool is being developed is on a rapid CI/CD pipeline, and the tool developer is considered a supplier to the process. Which of the following presents the most risk to the development life cycle and lo the ability to deliver the security tool on time?

Options:

A.

Deep learning language barriers

B.

Big Data processing required for maturity

C.

Secure, multiparty computation requirements

D.

Computing capabilities available to the developer

Page: 9 / 38
Total 506 questions