Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CASP+ 2023 Questions and answer - Part 20

Mary Smith

Sat, 18 Apr 2026

ComptiA CASP+ 2023 Questions and answer - Part 20

1. A system needs to achieve the maximum amount of security goals for a new DNS infrastructure. The administrator implements DNSSEC extensions of the domain and infrastructure. Which of the following security goals does this meet? (Choose two)(Select 2answers)

A) authentication
B) availabilty
C) Integrity
D) Confidentialit
E) Encryption


2. Ann, a software developer, will publish its newly developed software for an online store. Ann wants to ensure that the software will not be changed is installed by a third party or end users for mobile devices. Which of the following would implement Ann to stop running customized copies of its software on mobile devices?

A) identity propagation
B) Secure code review
C) single sign
D) Remote attestation
E) None


3. A security company is to develop a new cloud-based log analytics platform. The goal is to allow: customers to upload to integrate big data platform customers to carry out remote log search customers their log files in the platform through an API so that third-party business intelligence tools can be used for the purpose of trending, views, and / or discovery Which of the following best security considerations are disclosed to protect data from one customer to other customers? (Choose three.)(Select 3answers)

A) Secure protocols for the transfer of logs and search results
B) Safe storage and transfer of API keys
C) Multi-tenancy with RBAC support
D) Purification filters uploading sensitive log contents to prevent files
E) Keep at least two years of log files in the case of e-discovery requests


4. A web developer is responsible for a simple web application that book holiday. The front-facing web server provides an HTML form, which asks for a userà ¬ Ys age. This input is placed in a signed integer variable and then checked to ensure that the user in adulthood. Users have reported that the website is not functioning properly. The web developer has inspected logs and see that a large number were filed (in the billions), just before the problem started occurring. Which of the following is the most likely situation that occurred?

A) The age variable stored the number and filled space in which the application from continuing to stop the function. Improper error handling to prevent the application of the recovery.
B) The age variable has had an integer overflow and a very small negative number that is assigned to unpredictable application behavior. Improper error handling to prevent the application of the recovery.
C) None
D) Computers are able to numbers well over billions in store size. Therefore the website are matters not related to the large number of orphans input.
E) The application has crashed, because a very large number of zero, has led to a separation. Improper error handling to prevent the application of the recovery.


5. Two universities make their 802.11n wireless networks available to the other university students. The infrastructure will pass the credentials of the student back to the home school for authentication over the Internet. The requirements are: Mutual authentication client and authentication server design should not limit connection speeds Authentication should be delegated to the home school no passwords to be sent unencrypted The following design was made: WPA2 Enterprise will be used by EAP-PEAP MSCHAPv2 wireless security RADIUS proxy servers will be used to forward authentication requests to the home school the RADIUS server certificates from a common public CA using a strong shared secret for RADIUS server authentication Which of the following security considerations to the need have added design?

A) The transport layer between the RADIUS servers must be protected
B) WPA Enterprise should be used to reduce network overhead
C) None
D) Students should be given certificates to use for authentication on the network
E) The RADIUS servers to the local accounts for the visiting students


1. Right Answer: A,C
Explanation:

2. Right Answer: D
Explanation:

3. Right Answer: A,B,C
Explanation:

4. Right Answer: B
Explanation:

5. Right Answer: A
Explanation:

0 Comments

Leave a comment