Exam Details

  • Exam Code
    :CAS-004
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :743 Q&As
  • Last Updated
    :Mar 30, 2025

CompTIA CompTIA Certifications CAS-004 Questions & Answers

  • Question 621:

    An organization's hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.

    Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?

    A. Deploy a SOAR tool.

    B. Modify user password history and length requirements.

    C. Apply new isolation and segmentation schemes.

    D. Implement decoy files on adjacent hosts.

  • Question 622:

    A security engineer needs to implement a solution to increase the security posture of user endpoints by providing more visibility and control over local administrator accounts. The endpoint security team is overwhelmed with alerts and wants a solution that has minimal operational burdens. Additionally, the solution must maintain a positive user experience after implementation.

    Which of the following is the BEST solution to meet these objectives?

    A. Implement Privileged Access Management (PAM), keep users in the local administrators group, and enable local administrator account monitoring.

    B. Implement PAM, remove users from the local administrators group, and prompt users for explicit approval when elevated privileges are required.

    C. Implement EDR, remove users from the local administrators group, and enable privilege escalation monitoring.

    D. Implement EDR, keep users in the local administrators group, and enable user behavior analytics.

  • Question 623:

    A security engineer needs to recommend a solution that will meet the following requirements:

    1.

    Identify sensitive data in the provider's network

    2.

    Maintain compliance with company and regulatory guidelines

    3.

    Detect and respond to insider threats, privileged user threats, and compromised accounts

    4.

    Enforce datacentric security, such as encryption, tokenization, and access control

    Which of the following solutions should the security engineer recommend to address these requirements?

    A. WAF

    B. CASB

    C. SWG

    D. DLP

  • Question 624:

    A security engineer estimates the company's popular web application experiences 100 attempted breaches per day. In the past four years, the company's data has been breached two times. Which of the following should the engineer report as the ARO for successful breaches?

    A. 0.5

    B. 8

    C. 50

    D. 36,500

  • Question 625:

    A network architect is designing a new SD-WAN architecture to connect all local sites to a central hub site. The hub is then responsible for redirecting traffic to public cloud and datacenter applications. The SD-WAN routers are managed through a SaaS, and the same security policy is applied to staff whether working in the office or at a remote location. The main requirements are the following:

    1.

    The network supports core applications that have 99.99% uptime.

    2.

    Configuration updates to the SD-WAN routers can only be initiated from the management service.

    3.

    Documents downloaded from websites must be scanned for malware.

    Which of the following solutions should the network architect implement to meet the requirements?

    A. Reverse proxy, stateful firewalls, and VPNs at the local sites

    B. IDSs, WAFs, and forward proxy IDS

    C. DoS protection at the hub site, mutual certificate authentication, and cloud proxy

    D. IPSs at the hub, Layer 4 firewalls, and DLP

  • Question 626:

    A company is migrating from company-owned phones to a BYOD strategy for mobile devices. The pilot program will start with the executive management team and be rolled out to the rest of the staff in phases. The company's Chief Financial Officer loses a phone multiple times a year.

    Which of the following will MOST likely secure the data on the lost device?

    A. Require a VPN to be active to access company data.

    B. Set up different profiles based on the person's risk.

    C. Remotely wipe the device.

    D. Require MFA to access company applications.

  • Question 627:

    A security architect works for a manufacturing organization that has many different branch offices. The architect is looking for a way to reduce traffic and ensure the branch offices receive the latest copy of revoked certificates issued by the CA at the organization's headquarters location. The solution must also have the lowest power requirement on the CA.

    Which of the following is the BEST solution?

    A. Deploy an RA on each branch office.

    B. Use Delta CRLs at the branches.

    C. Configure clients to use OCSP.

    D. Send the new CRLs by using GPO.

  • Question 628:

    After a security incident, a network security engineer discovers that a portion of the company's sensitive external traffic has been redirected through a secondary ISP that is not normally used. Which of the following would BEST secure the routes while allowing the network to function in the event of a single provider failure?

    A. Disable BGP and implement a single static route for each internal network.

    B. Implement a BGP route reflector.

    C. Implement an inbound BGP prefix list.

    D. Disable BGP and implement OSPF.

  • Question 629:

    A company's SOC has received threat intelligence about an active campaign utilizing a specific vulnerability. The company would like to determine whether it is vulnerable to this active campaign. Which of the following should the company use to make this determination?

    A. Threat hunting

    B. A system penetration test

    C. Log analysis within the SIEM tool

    D. The Cyber Kill Chain

  • Question 630:

    A business stores personal client data of individuals residing in the EU in order to process requests for mortgage loan approvals. Which of the following does the business's IT manager need to consider?

    A. The availability of personal data

    B. The right to personal data erasure

    C. The company's annual revenue

    D. The language of the web application

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-004 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.