CompTIA CAS-004 Exam (page: 14)
CompTIA Advanced Security Practitioner (CASP+) CAS-004
Updated on: 12-Jan-2026

Viewing Page 14 of 112

A company has decided to purchase a license for software that is used to operate a mission-critical process. The third-party developer is new to the industry but is delivering what the company needs at this time.
Which of the following BEST describes the reason why utilizing a source code escrow will reduce the operational risk to the company if the third party stops supporting the application?

  1. The company will have access to the latest version to continue development.
  2. The company will be able to force the third-party developer to continue support.
  3. The company will be able to manage the third-party developer's development process.
  4. The company will be paid by the third-party developer to hire a new development team.

Answer(s): A



A security analyst is researching containerization concepts for an organization. The analyst is concerned about potential resource exhaustion scenarios on the
Docker host due to a single application that is overconsuming available resources.
Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?

  1. Union filesystem overlay
  2. Cgroups
  3. Linux namespaces
  4. Device mapper

Answer(s): B


Reference:

https://www.ibm.com/support/pages/deep-dive-yarn-cgroups-hadoop-dev



A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Which of the following would be BEST for the developer to perform? (Choose two.)

  1. Utilize code signing by a trusted third party.
  2. Implement certificate-based authentication.
  3. Verify MD5 hashes.
  4. Compress the program with a password.
  5. Encrypt with 3DES.
  6. Make the DACL read-only.

Answer(s): A,C



A company is moving most of its customer-facing production systems to the cloud-facing production systems to the cloud. IaaS is the service model being used.
The Chief Executive Officer is concerned about the type of encryption available and requires the solution must have the highest level of security.
Which of the following encryption methods should the cloud security engineer select during the implementation phase?

  1. Instance-based
  2. Storage-based
  3. Proxy-based
  4. Array controller-based

Answer(s): A



A vulnerability analyst identified a zero-day vulnerability in a company's internally developed software. Since the current vulnerability management system does not have any checks for this vulnerability, an engineer has been asked to create one.
Which of the following would be BEST suited to meet these requirements?

  1. ARF
  2. ISACs
  3. Node.js
  4. OVAL

Answer(s): D



Viewing Page 14 of 112



Share your comments for CompTIA CAS-004 exam with other users:

9eagles 4/7/2023 10:04:00 AM

on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous