Sale!

CAS-003 CompTIA Advanced Security Practitioner (CASP)

$25.00 $19.95

  • Passing Score: 800
  • Time Limit: 120 min
  • File Version: 17.0
  • Q&A: 317
  • Updated July 2020
Purchase this product now and earn 20 Points!
Recommend this page

Description

Start your future with a Data Analysis Certificate.

Exam Demo

CAS-003 CompTIA Advanced Security Practitioner (CASP)

QUESTION 1
DRAG DROP
Drag and drop the cloud deployment model to the associated use-case scenario. Options may be used only once or not at all.
Select and Place:

CAS-003-1

Correct Answer:

CAS-003-2

QUESTION 2
DRAG DROP
A security consultant is considering authentication options for a financial institution. The following authentication options are available. Drag and drop the
security mechanism to the appropriate use case. Options may be used once.

Select and Place:

CAS-003-3

Correct Answer:

CAS-003-4

QUESTION 3
A company’s Chief Operating Officer (COO) is concerned about the potential for competitors to infer proprietary information gathered from employees’
social media accounts.
Which of the following methods should the company use to gauge its social media threat level without targeting individual employees?
A. Utilize insider threat consultants to provide expertise.
B. Require that employees divulge social media accounts.
C. Leverage Big Data analytical algorithms.
D. Perform social engineering tests to evaluate employee awareness.

Correct Answer: A

QUESTION 4
DRAG DROP
A security administrator must configure the database server shown below to comply with the four requirements listed. Drag and drop the appropriate
ACL that should be configured on the database server to its corresponding requirement. Answer options may be used once or not at all.

CAS-003-5

Select and Place:

CAS-003-6

Correct Answer:

CAS-003-7

QUESTION 5
A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following security
requirements:
The data is for internal consumption only and shall not be distributed to outside individuals
The systems administrator should not have access to the data processed by the server
The integrity of the kernel image is maintained
Which of the following host-based security controls BEST enforce the data owner’s requirements? (Choose three.)
A. SELinux
B. DLP
C. HIDS
D. Host-based firewall
E. Measured boot
F. Data encryption
G.Watermarking

Correct Answer: CEF


Jump start your career with best machine learning introduction course

0/5 (0 Reviews)