CASP+ Practice Exam CAS-004

CompTIA SecurityX Practice Exam 8

CompTIA SecurityX CAS-005

1 / 10

A Chief Information Security Officer is presenting a residual risk assessment to the board. Which concept BEST describes the risk that remains after all implemented security controls have been applied and risk mitigation strategies executed?

2 / 10

An organization is considering a BYOD policy. Which data security technique is MOST effective for preventing sensitive corporate data from being stored on unmanaged personal devices while still allowing access to necessary resources?

3 / 10

A security architect is designing a solution for secure communication between microservices within a cloud-native application. The solution needs to ensure mutual authentication and encryption for every service-to-service call. Which technology is MOST appropriate for this?

4 / 10

An organization wants to analyze vast amounts of network flow data and security logs to detect subtle, long-term attack patterns and anomalous behavior that might indicate an advanced persistent threat. Which type of security platform is BEST suited for this task?

5 / 10

A CASP+ candidate is evaluating a new authentication system that utilizes FIDO2 security keys. Which cryptographic principle is a key benefit derived from the use of such hardware tokens for authentication?

6 / 10

An organization is adopting a DevSecOps approach. Which security activity should be integrated early in the software development lifecycle to identify design flaws and architectural weaknesses before code is written?

7 / 10

During a penetration test, a tester successfully gained initial access through a vulnerable web application. The next step is to establish persistence on the compromised server without relying on the initial exploit. Which post-exploitation technique would be a high-level strategic choice for achieving this?

8 / 10

A senior security engineer is tasked with designing a secure network architecture for a new segment that will host sensitive research data. The design mandates strict one-way communication, preventing any outbound connections from this segment to the internet. Which network design principle is being primarily applied?

9 / 10

An organization is integrating a new third-party cloud service. The CASP+ candidate needs to assess the risk associated with this integration. Which document outlines the shared responsibilities between the organization and the cloud service provider regarding security controls?

10 / 10

A security architect is designing a high-availability solution for a critical web application. The design includes geographically dispersed data centers with active-active load balancing. Which security concept is MOST directly addressed by this design choice?

Your score is

The average score is 0%

0%