Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CASP+ 2023 Questions and answer - Part 27

Mary Smith

Fri, 17 Apr 2026

ComptiA CASP+ 2023 Questions and answer - Part 27

1. Which of the following BEST is to protect the base of VMs from attacks by other VMs hosted on the same physical platform?

A) Unique Network Interface Card (NIC) commission per guest OS.
B) None
C) Antivirus solutions between the host and guest operating systems
D) Aggressive patch management on the host and guest operating systems
E) Host-based IDS sensors on all guest operating systems


2. An extensible proprietary software system was upgraded to the next minor release version patch a security issue. After the upgrade detects an unauthorized intrusion into the system. The software is turned to the issue and reports that are well updated all key components to solve. Which of the following overlooked in securing the system? (Choose two).(Select 2answers)

A) The software patch is not signed cryptographically.
B) The patch caused the system revert http.
C) The company's custom code is not patched.
D) Third-party plug-ins are not patched.
E) The company IDS signatures are not updated.


3. The help desk department will roll out a remote support application for internal use on all company computers. This instrument should remote desktop sharing, system log collection, chat, hardware logging, inventory management, and remote access registration. The risk management team is asked to evaluate vendor responses to the RFQ. Which of the following questions is the most important?

A) What encryption standards are used to detect database?
B) None
C) What snapshot or undo features present in its application?
D) What are the protection against MITM?
E) What accountability is built into the remote support application?


4. A security administrator performs VDI traffic data on a virtual server that migrates from one host. When checking the data collected by the protocol analyzer, the security administrator observes that sensitive data in the packet capture. Which of the following would be the security administrator recommended to the confidentiality of sensitive information during live VM migration to ensure, while minimizing latency issues?

A) Sensitive data should be stored on a SAN backend using an isolated Fiber Channel network.
B) Full disk encryption should be enabled across the enterprise to ensure the confidentiality of sensitive data.
C) None
D) Report data encryption should be used when storing sensitive information on virtual servers.
E) A separate physical interface placed in a private VLAN must be configured for live host operations.


5. A port has failed in a Fiber Channel switch, causing a costly downtime on the primary website of the company. Which of the following is the most likely cause of the downtime?

A) SAN replication to the backup site failed.
B) The web server iSCSI initiator was down.
C) None
D) SAN snapshots were not up to date.
E) The web server is not multipathed.


1. Right Answer: D
Explanation:

2. Right Answer: C,D
Explanation:

3. Right Answer: E
Explanation:

4. Right Answer: E
Explanation:

5. Right Answer: E
Explanation:

0 Comments

Leave a comment