Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CASP+ 2023 Questions and answer - Part 30

Mary Smith

Fri, 17 Apr 2026

ComptiA CASP+ 2023 Questions and answer - Part 30

1. A company needs to comply with regulations is looking for a laptop encryption product to use for 40,000 endpoints. The product must comply with regulations, but also be flexible enough to minimize overhead and support regarding resetting passwords and exclusion. Which of these implementations would best meet the needs?

A) None
B) A partition-based software encryption product with a low-level boat security and authentication
C) A full disk hardware based encryption product with a low-level boat security and authentication
D) A container-based encryption product that enables end users to choose which files to encrypt
E) A file-based encryption product with the aid of profiles to target areas in the file system to encrypt


2. VPN users can not access the active FTP server via the router, but can access any server in the data center. Additional network information: DMZ network 192.168.5.0/24 (FTP server 192.168.5.11) VPN network 192.168.1.0/24 192.168.2.0/24 Datacenter user network - HR network 192.168.3.0/24 192.168.4.0/24 traffic shaper configuration VLAN Bandwidth Limit (Mbps) VPN50User175 HR250 Finance250 Guest0 router ACL: Action Source Destination Permit192.168.1.0 / 24192.168.2.0 / 24 Permit192.168.1.0 / 24192.168.3.0 / 24 Permit192.168.1.0 / 24192.168.5.0 / 24 Permit192 .168.2.0 / 24192.168.1.0 / 24 Permit192.168.3.0 / 24192.168.1.0 / 24 Permit192.168.5.1 / 32192.168.1.0 / 24 Deny192.168.4.0 / 24192.168.1.0 / 24 Deny192.168.1.0 / 24192 , 168 .4.0 / 24 Denyanyany which of the following would allow the users to access the active FTP server?

A) Add a license statement to 192.168.5.1 to traffic from the VPN network
B) IPS is blocking traffic, and must be configured
C) Increase the bandwidth limit on the VPN network
D) Configure the traffic shaper to limit traffic DMZ
E) Add to grant a license statement 192.168.5.0/24 traffic to the VPN network


3. A newly hired security administrator advises developers on the safe integration of legacy in-house application with a new cloud-based processing system. The systems need large amounts of fixed format data such as names, addresses and telephone numbers, as well as occasional pieces of data in unpredictable formats to be exchanged. The developers want to build a new data format and custom tools to parse and process the data. The security administrator suggests instead that the developers:

A) Only document the data format in the application parsing code.
B) Use well-formed XML standard compliant and strict schedules.
C) None
D) Implementing a de facto corporate standard for all the analyzed data.
E) Create a custom standard to define the data.


4. A security manager looked at several logs while investigating a recent security breach in the data center from an external source. under every log was collected composed of various safety devices on the basis of a report by the companyà ¬ YS security information and event management server. Logs: Log 1: February 5, 23: 55: 37.743:% SEC-6-IPACCESSLOGS: List of 10 denied 10.2.5.81 3 packets Log 2: HTTP://www.company.com/index.php?user=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa AAAAAAAA aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa log 3: Security error attention ID50: the RDP protocol X.224 an error in the protocol stream and has the client's log 4 decoupled encoder oe = new Oracle encoder (); String query = à ¬ Å?Select user_id FROM user_data where username = à ¬ ž à ¬ oe.encode (req.getParameter (à ¬ Å?userIDà ¬)) + à ¬ Å? à ¬ Z and user_password = à ¬ ž à ¬ Å? oe .encode (req.getParameter (à ¬ Å?pwdà ¬)) + à ¬ ž à ¬ à ¬ Å?; VulnerabilitiesBuffer overflow SQL injection ACL XSS Which of the following logs and vulnerabilities would most likely be related to the security breach? (Choose two).(Select 2answers)

A) log 2
B) Log 1
C) buffer overflow
D) ACL
E) Log 3


5. A software developer and IT administrator focus on implementation of security in the organization OSI layer 7. Which of the following security would best protect their demands? (Choose two).(Select 2answers)

A) NIDS
B) HSM
C) NIPS
D) HIPS
E) WAF


1. Right Answer: E
Explanation:

2. Right Answer: E
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: A,C
Explanation:

5. Right Answer: D,E
Explanation:

0 Comments

Leave a comment