CAS-004 Exam Questions & Answers

Exam Code: CAS-004

Exam Name: CompTIA Advanced Security Practitioner (CASP+)

Updated: Apr 20, 2024

Q&As: 587

At Passcerty.com, we pride ourselves on the comprehensive nature of our CAS-004 exam dumps, designed meticulously to encompass all key topics and nuances you might encounter during the real examination. Regular updates are a cornerstone of our service, ensuring that our dedicated users always have their hands on the most recent and relevant Q&A dumps. Behind every meticulously curated question and answer lies the hard work of our seasoned team of experts, who bring years of experience and knowledge into crafting these premium materials. And while we are invested in offering top-notch content, we also believe in empowering our community. As a token of our commitment to your success, we're delighted to offer a substantial portion of our resources for free practice. We invite you to make the most of the following content, and wish you every success in your endeavors.


Download Free CompTIA CAS-004 Demo

Experience Passcerty.com exam material in PDF version.
Simply submit your e-mail address below to get started with our PDF real exam demo of your CompTIA CAS-004 exam.

Instant download
Latest update demo according to real exam

*Email Address

* Our demo shows only a few questions from your selected exam for evaluating purposes

Free CompTIA CAS-004 Dumps

Practice These Free Questions and Answers to Pass the CompTIA Advanced Security Practitioner Exam

Questions 1

Device event logs sources from MDM software as follows:

Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?

A. Malicious installation of an application; change the MDM configuration to remove application ID 1220.

B. Resource leak; recover the device for analysis and clean up the local storage.

C. Impossible travel; disable the device's account and access while investigating.

D. Falsified status reporting; remotely wipe the device.

Show Answer
Questions 2

An engineering team has deployed a new VPN service that requires client certificates to be used in order to successfully connect. On iOS devices, however, the following error occurs after importing the .p12 certificate file:

mbedTLS: ca certificate is undefined

Which of the following is the root cause of this issue?

A. iOS devices have an empty root certificate chain by default.

B. OpenSSL is not configured to support PKCS#12 certificate files.

C. The VPN client configuration is missing the CA private key.

D. The iOS keychain imported only the client public and private keys.

Show Answer
Questions 3

A company recently deployed a SIEM and began importing logs from a firewall, a file server, a domain controller, a web server, and a laptop. A security analyst receives a series of SIEM alerts and prepares to respond. The following is the alert information: Which of the following should the security analyst do FIRST?

A. Disable Administrator on abc-usa-fs1; the local account is compromised.

B. Shut down the abc-usa-fs1 server; a plaintext credential is being used.

C. Disable the jdoe account; it is likely compromised.

D. Shut down abc-usa-fw01; the remote access VPN vulnerability is exploited.

Show Answer
Questions 4

Over the last 90 days, many private storage services have been exposed in the cloud services environments, and the security team does not have the ability to see who is creating these instances. Shadow IT is creating data services and instances faster than the email security team can keep up with them. The Chief Information Security Officer (CISO) has asked the security lead architect to recommend solutions to this problem.

Which of the following BEST addresses the problem with the least amount of administrative effort?

A. Compile a list of firewall requests and compare them against interesting cloud services

B. Implement a CASB solution and track cloud service use cases for greater visibility

C. Implement a user-behavior analytics system to associate user events with cloud service creation events

D. Capture all logs and feed them to a SIEM. and then analyze for cloud service events.

Show Answer
Questions 5

A healthcare company wants to increase the value of the data it collects on its patients by making the data available to third-party researchers for a fee. Which of the following BEST mitigates the risk to the company?

A. Log all access to the data and correlate with the researcher.

B. Anonymize identifiable information using keyed strings

C. Ensure all data is encrypted in transit to the researcher.

D. Ensure all researchers sign and abide by non-disclosure agreements.

E. Sanitize date and time stamp information in the records.

Show Answer

Viewing Page 1 of 3 pages. Download PDF or Software version with 587 questions