New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Passed Exam Today CAS-003

Page: 6 / 26
Total 683 questions

CompTIA Advanced Security Practitioner (CASP) Exam Questions and Answers

Question 21

A company's Chief Information Security Officer (CISO) is reviewing KPls from me security operations team These KPls indicate the following trends

• The mean time to close security events that have been escalated to a Tier 2 analyst has not changed

• The average tenure for Tier 1 security analysts has fallen from 12 months to 9 months

• The percentage of events escalated from a Tier 1 analyst to a Tier 2 analyst has increased from 50 to 75.

• The mean time to pick up and respond to a security event has not changed

• Resource and event volumes have not changed

• The overall mean time to close security events has increased from 8 hours to 12 hours

Which of the following actions is MOST likely to result in a sustainable improvement in these KPls?

Options:

A.

Increase the investment in training for Tier 1 analysts

B.

Promote the strongest Tier 1 analyst to Tier 2

C.

Move one or more security analysts from Tier 2 to Tier 1

D.

Increase the investment in training for Tier 2 analysts

Question 22

An online shopping site restricts the quantity of an item each customer can order. The site generates the following code when the customer clicks the submit button.

However, customers are still able to order more man three of the item. Which of the following would a security analyst MOST likely use to investigate the issue?

Options:

A.

HTTP interceptor

B.

Vulnerability scanner

C.

Fuzzer

D.

Exploit framework

Question 23

A factory-floor system uses critical legacy, and unsupported application software to enable factory operations A latent vulnerability was recently exposed, which permitted attackers to send a specific string of characters followed by arbitrary code for execution Patches are unavailable, as the manufacturer is no longer m business Which of the following would be the BEST approach the company should take to mitigate the risk of this vulnerability and other latent vulnerability exploits'' (Select TWO)

Options:

A.

Configure a host-based firewall on the application server and restrict access to necessary ports and services

B.

Create a factory-floor enclave segregated from direct LANWAN reachability

C.

implement a proxy that will sanitize input provided to the application

D.

install server-side X 509 certificates and enable TLS 1.0 or later for client access

E.

Install network and host-based IDS feeding logs to SIEM and alerts to SOC operators

F.

Create a hunt team focused on the factory-floor operations

Question 24

A Chief Information Security Officer (CISO) wants to set up a SOC to respond to security threats and events more quickly. The SOC must have the following capacities:

• Real-time response

• Visualization

• Threat intelligence integration

• Cross-referencing from multiple sources

• Deduplication

Which of the following technologies would BEST meet these requirements?

Options:

A.

SIEM

B.

EDR

C.

OSINT

D.

UTM

Page: 6 / 26
Total 683 questions