Free CAS-004 Exam Braindumps

Pass your CompTIA Advanced Security Practitioner (CASP+) Exam exam with these free Questions and Answers

Page 10 of 69
QUESTION 41

A security analyst is researching containerization concepts for an organization. The analyst is concerned about potential resource exhaustion scenarios on the Docker host due to a single application that is overconsuming available resources.
Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?

  1. A. Union filesystem overlay
  2. B. Cgroups
  3. C. Linux namespaces
  4. D. Device mapper

Correct Answer: C

QUESTION 42

A local government that is investigating a data exfiltration claim was asked to review the fingerprint of the malicious user's actions. An investigator took a forensic image of the VM an downloaded the image to a secured USB drive to share with the government. Which of the following should be taken into consideration during the process of releasing the drive to the government?

  1. A. Encryption in transit
  2. B. Legal issues
  3. C. Chain of custody
  4. D. Order of volatility
  5. E. Key exchange

Correct Answer: C

QUESTION 43

A company is implementing SSL inspection. During the next six months, multiple web applications that will be separated out with subdomains will be deployed.
Which of the following will allow the inspection of the data without multiple certificate deployments?

  1. A. Include all available cipher suites.
  2. B. Create a wildcard certificate.
  3. C. Use a third-party CA.
  4. D. Implement certificate pinning.

Correct Answer: B

QUESTION 44

A security analyst is trying to identify the source of a recent data loss incident. The analyst has reviewed all the for the time surrounding the identified all the assets on the network at the time of the data loss. The analyst suspects the key to finding the source was obfuscated in an application. Which of the following tools should the analyst use NEXT?

  1. A. Software Decomplier
  2. B. Network enurrerator
  3. C. Log reduction and analysis tool
  4. D. Static code analysis

Correct Answer: D

QUESTION 45

A company's finance department acquired a new payment system that exports data to an unencrypted file on the system. The company implemented controls on the file so only appropriate personnel are allowed access. Which of the following risk techniques did the department use in this situation?

  1. A. Accept
  2. B. Avoid
  3. C. Transfer
  4. D. Mitigate

Correct Answer: D

Page 10 of 69

Post your Comments and Discuss CompTIA CAS-004 exam with other Community members: