CompTIA CAS-003 CompTIA Advanced Security Practitioner (CASP) Online Training
CompTIA CAS-003 Online Training
The questions for CAS-003 were last updated at Jun 18,2025.
- Exam Code: CAS-003
- Exam Name: CompTIA Advanced Security Practitioner (CASP)
- Certification Provider: CompTIA
- Latest update: Jun 18,2025
An agency has implemented a data retention policy that requires tagging data according to type before storing it in the data repository. The policy requires all business emails be automatically deleted after two years. During an open records investigation, information was found on an employee’s work computer concerning a conversation that occurred three years prior and proved damaging to the agency’s reputation .
Which of the following MOST likely caused the data leak?
- A . The employee manually changed the email client retention settings to prevent deletion
of emails - B . The file that contained the damaging information was mistagged and retained on the server for longer than it should have been
- C . The email was encrypted and an exception was put in place via the data classification application
- D . The employee saved a file on the computer’s hard drive that contained archives of emails, which were more than two years old
A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via rootkit. Post-incident analysis is ongoing, and the incident responders and systems administrators are working to determine a strategy to reduce the risk of recurrence. The firm’s systems are running modern operating systems and feature UEFI and TPMs .
Which of the following technical options would provide the MOST preventive value?
- A . Update and deploy GPOs
- B . Configure and use measured boot
- C . Strengthen the password complexity requirements
- D . Update the antivirus software and definitions
The Chief Executive Officer (CEO) of a small company decides to use cloud computing to host critical corporate data for protection from natural disasters. The recommended solution is to adopt the public cloud for its cost savings If the CEO insists on adopting the public cloud model, which of the following would be the BEST advice?
- A . Ensure the cloud provider supports a secure virtual desktop infrastructure
- B . Ensure the colocation facility implements a robust DRP to help with business continuity planning.
- C . Ensure the on-premises datacenter employs fault tolerance and load balancing capabilities.
- D . Ensure the ISP is using a standard help-desk ticketing system to respond to any system outages
At a meeting, the systems administrator states the security controls a company wishes to implement seem excessive, since all of the information on the company’s web servers can be obtained publicly and is not proprietary in any way. The next day the company’s website is defaced as part of an SQL injection attack, and the company receives press inquiries about the message the attackers displayed on the website.
Which of the following is the FIRST action the company should take?
- A . Refer to and follow procedures from the company’s incident response plan.
- B . Call a press conference to explain that the company has been hacked.
- C . Establish chain of custody for all systems to which the systems administrator has access.
- D . Conduct a detailed forensic analysis of the compromised system.
- E . Inform the communications and marketing department of the attack details.
A newly hired security analyst has joined an established SOC team. Not long after going through corporate orientation, a new attack method on web-based applications was publicly revealed. The security analyst immediately brings this new information to the team lead, but the team lead is not concerned about it.
Which of the following is the MOST likely reason for the team lead’s position?
- A . The organization has accepted the risks associated with web-based threats.
- B . The attack type does not meet the organization’s threat model.
- C . Web-based applications are on isolated network segments.
- D . Corporate policy states that NIPS signatures must be updated every hour.
A security analyst, who is working in a Windows environment, has noticed a significant amount of IPv6 traffic originating from a client, even though IPv6 is not currently in use. The client is a stand-alone device, not connected to the AD that manages a series of SCADA devices used for manufacturing .
Which of the following is the appropriate command to disable the client’s IPv6 stack?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
ddd
nnn