Certification Practice Test Sample Questions For
(CAS-003) CompTIA: Advanced Security Practitioner (CASP)

QuickStart is now offering sample questions for CompTIA: Advanced Security Practitioner (CASP) (CAS-003). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice test to better aid in certification. 100% of the questions are real test questions; from a recent version of the CompTIA: Advanced Security Practitioner (CASP) (CAS-003) exam.


Arrow

CompTIA Advanced Security Practitioner (CASP)

Enroll now today and get 30% off using discount code PRACTICE30 at checkout.

 
proceed to the next question. Correct answers will be displayed when you complete exam.

(CAS-003) CompTIA: Advanced Security Practitioner (CASP) Sample Exam Questions

1

Security is the most fundamental issue to be discussed by an organization. Mitch demands security, built into the application. So, why should this be an issue?

2

At an organization, David is the security administrator. He tries to prevent any unauthorized access by people lolling around the office, to the corporate wireless network. Mention the wireless network threat that David is trying to avoid?

A. Man-in-the-middle
Incorrect.
B. Dictionary attack
Incorrect.
C. War driving
Correct!
D. DNS spoofing
Incorrect.
3

If you enter information in the record/database and it is changed as well as reflected in the record/database. What have you done?

A. Integrity Check
Incorrect.
B. Rollback
Incorrect.
C. Commit
Correct!
D. Savepoint
Incorrect.
4

Name the organization that regularly issues statements related to ethics, regarding internet use?

5

Which of the ensuing statements concerning the MD5 algorithm is FALSE?

6

Name the software type that is installed on a person’s computer but without their adequate knowledge?

A. Adware
Incorrect.
B. Spyware
Incorrect.
C. Neither A nor B
Incorrect.
D. Both A and B
Correct!
7

In the followings, which item is not related to Session Initiation Protocol (SIP)?

A. User Agent Server
Incorrect.
B. User Agent Client
Incorrect.
C. User Agent Database
Correct!
D. Signaling Protocol
Incorrect.
8

Which of the ensuing is associated with Asymmetric cryptography?

9

What provides for higher performance and fault tolerance in case databases are clustered?

10

Name the malicious agent that has the potential to distribute itself without using the host file?

A. Trojan
Incorrect.
B. Logic Bomb
Incorrect.
C. Stealth Virus
Incorrect.
D. Worm
Correct!
11

There are different kinds of topologies in terms of networks. Which topology comprises a single cable and runs the entire length of a network?

A. Ring Topology
Incorrect.
B. Bus Topology
Correct!
C. Network Topology
Incorrect.
D. Mesh Topology
Incorrect.
12

Which of the term is used to describe software bots or robots collection which runs automatically and autonomously and can harm the computer?

A. Rootkit
Incorrect.
B. Botnet
Correct!
C. Softbots
Incorrect.
D. Automizer
Incorrect.
13

Name the technology that establishes identity by using the physical characteristic of a person?

A. CHAP
Incorrect.
B. Smart card
Incorrect.
C. PAP
Incorrect.
D. Biometrics
Correct!
14

Jim’s company hires Chris’s company in order to develop software. However, a 3rd party has a source code copy. What should be in place by Jim’s company for protection?

A. Financial Escrow
Incorrect.
B. Software Escrow
Correct!
C. Technical Escrow
Incorrect.
D. Application Escrow
Incorrect.
15

The methods of software development provide vendor and software developers guidelines for the creation of the program. Name the method (software development) that is usually implemented in situations demanding fast adaptations to varying client requirements?

16

When secondary storage and RAM are combined, what is created?

A. Combined Mode
Incorrect.
B. Virtual Memory
Correct!
C. Protection Rings
Incorrect.
D. Salvaged Memory
Incorrect.
17

Which situation will incline you to utilize a vulnerability scanner?

18

What will dictate the level of association between methods of access, elements, an organization of data elements and processing alternatives?

A. Cohesion
Incorrect.
B. Attributions
Incorrect.
C. Coupling
Incorrect.
D. Data Structure
Correct!

Practice Exam - CompTIA: Advanced Security Practitioner (CASP)

$99.00

More Information:

  • Learning Style: On Demand
  • Learning Style: Practice Exam
  • Difficulty: Beginner
  • Course Duration: 1 Hour
  • Course Info: Download PDF
  • Certificate: See Sample

Need Training for 5 or More People?

Customized to your team's need:

  • Annual Subscriptions
  • Private Training
  • Flexible Pricing
  • Enterprise LMS
  • Dedicated Customer Success Manager

Outline

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Hit button to validate captcha