CompTIA CAS-004 Exam (page: 13)
CompTIA Advanced Security Practitioner (CASP+) CAS-004
Updated on: 12-Jan-2026

Viewing Page 13 of 112

An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented.
Which of the following processes can be used to identify potential prevention recommendations?

  1. Detection
  2. Remediation
  3. Preparation
  4. Recovery

Answer(s): C



Some end users of an e-commerce website are reporting a delay when browsing pages. The website uses TLS 1.2. A security architect for the website troubleshoots by connecting from home to the website and capturing traffic via Wireshark. The security architect finds that the issue is the time required to validate the certificate.
Which of the following solutions should the security architect recommend?

  1. Adding more nodes to the web server clusters
  2. Changing the cipher algorithm used on the web server
  3. Implementing OCSP stapling on the server
  4. Upgrading to TLS 1.3

Answer(s): C



A security engineer was auditing an organization's current software development practice and discovered that multiple open-source libraries were Integrated into the organization's software. The organization currently performs SAST and DAST on the software it develops.
Which of the following should the organization incorporate into the SDLC to ensure the security of the open-source libraries?

  1. Perform additional SAST/DAST on the open-source libraries.
  2. Implement the SDLC security guidelines.
  3. Track the library versions and monitor the CVE website for related vulnerabilities.
  4. Perform unit testing of the open-source libraries.

Answer(s): C


Reference:

https://www.whitesourcesoftware.com/resources/blog/application-security-best-practices/



A security analyst is investigating a possible buffer overflow attack. The following output was found on a user's workstation: graphic.linux_randomization.prg
Which of the following technologies would mitigate the manipulation of memory segments?

  1. NX bit
  2. ASLR
  3. DEP
  4. HSM

Answer(s): B


Reference:

http://webpages.eng.wayne.edu/~fy8421/19sp-csc5290/labs/lab2-instruction.pdf
(3)



An e-commerce company is running a web server on premises, and the resource utilization is usually less than 30%. During the last two holiday seasons, the server experienced performance issues because of too many connections, and several customers were not able to finalize purchase orders. The company is looking to change the server configuration to avoid this kind of performance issue.
Which of the following is the MOST cost-effective solution?

  1. Move the server to a cloud provider.
  2. Change the operating system.
  3. Buy a new server and create an active-active cluster.
  4. Upgrade the server with a new one.

Answer(s): A



Viewing Page 13 of 112



Share your comments for CompTIA CAS-004 exam with other users:

9eagles 4/7/2023 10:04:00 AM

on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous