Exam Details

  • Exam Code
    :CAS-004
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP+)
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :743 Q&As
  • Last Updated
    :Mar 30, 2025

CompTIA CompTIA Certifications CAS-004 Questions & Answers

  • Question 631:

    A company publishes several APIs for customers and is required to use keys to segregate customer data sets. Which of the following would be BEST to use to store customer keys?

    A. A trusted platform module

    B. A hardware security module

    C. A localized key store

    D. A public key infrastructure

  • Question 632:

    An organization wants to perform a scan of all its systems against best practice security configurations.

    Which of the following SCAP standards, when combined, will enable the organization to view each of the configuration checks in a machine-readable checklist format for fill automation? (Choose two.)

    A. ARF

    B. XCCDF

    C. CPE

    D. CVE

    E. CVSS

    F. OVAL

  • Question 633:

    A security analyst notices a number of SIEM events that show the following activity:

    Which of the following response actions should the analyst take FIRST?

    A. Disable powershell.exe on all Microsoft Windows endpoints.

    B. Restart Microsoft Windows Defender.

    C. Configure the forward proxy to block 40.90.23.154.

    D. Disable local administrator privileges on the endpoints.

  • Question 634:

    A company hired a third party to develop software as part of its strategy to be quicker to market. The company's policy outlines the following requirements:

    The credentials used to publish production software to the container registry should be stored in a secure location.

    Access should be restricted to the pipeline service account, without the ability for the third-party developer to read the credentials directly.

    Which of the following would be the BEST recommendation for storing and monitoring access to these shared credentials?

    A. TPM

    B. Local secure password file

    C. MFA

    D. Key vault

  • Question 635:

    An energy company is required to report the average pressure of natural gas used over the past quarter. A PLC sends data to a historian server that creates the required reports.

    Which of the following historian server locations will allow the business to get the required reports in an and IT environment?

    A. In the environment, use a VPN from the IT environment into the environment.

    B. In the environment, allow IT traffic into the environment.

    C. In the IT environment, allow PLCs to send data from the environment to the IT environment.

    D. Use a screened subnet between the and IT environments.

  • Question 636:

    Which of the following is a benefit of using steganalysis techniques in forensic response?

    A. Breaking a symmetric cipher used in secure voice communications

    B. Determining the frequency of unique attacks against DRM-protected media

    C. Maintaining chain of custody for acquired evidence

    D. Identifying least significant bit encoding of data in a .wav file

  • Question 637:

    A new web server must comply with new secure-by-design principles and PCI DSS. This includes mitigating the risk of an on-path attack. A security analyst is reviewing the following web server configuration:

    Which of the following ciphers should the security analyst remove to support the business requirements?

    A. TLS_AES_128_CCM_8_SHA256

    B. TLS_DHE_DSS_WITH_RC4_128_SHA

    C. TLS_CHACHA20_POLY1305_SHA256

    D. TLS_AES_128_GCM_SHA256

  • Question 638:

    Device event logs sources from MDM software as follows:

    Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?

    A. Malicious installation of an application; change the MDM configuration to remove application ID 1220.

    B. Resource leak; recover the device for analysis and clean up the local storage.

    C. Impossible travel; disable the device's account and access while investigating.

    D. Falsified status reporting; remotely wipe the device.

  • Question 639:

    A developer is creating a new mobile application for a company. The application uses REST API and TLS 1.2 to communicate securely with the external back-end server. Due to this configuration, the company is concerned about HTTPS interception attacks.

    Which of the following would be the BEST solution against this type of attack?

    A. Cookies

    B. Wildcard certificates

    C. HSTS

    D. Certificate pinning

  • Question 640:

    A threat hunting team receives a report about possible APT activity in the network. Which of the following threat management frameworks should the team implement?

    A. NIST SP 800-53

    B. MITRE ATTandCK

    C. The Cyber Kill Chain

    D. The Diamond Model of Intrusion Analysis

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAS-004 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.