Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CASP+ 2023 Questions and answer - Part 35

Mary Smith

Fri, 17 Apr 2026

ComptiA CASP+ 2023 Questions and answer - Part 35

1. ABC Corporation uses to protect multiple security zones to systems and data, and all of the VM hosts are part of a consolidated VM infrastructure. Each zone has different VM administrators. Which of the following restricted zone other administrators have direct access to the console of a VM host to another area?

A) Ensure hypervisor layer firewalling between all VM hosts, regardless of the security zone.
B) Require multi-factor authentication when accessing the console on the physical VM host.
C) None
D) Ensure hypervisor layer firewalling between all VM hosts, regardless of the security zone.
E) Organize VM hosts in containers on the basis of security zone, and the access with the aid of an ACL limiting.


2. Wireless users report problems with the company's videoconferencing and VoIP systems. The security administrator observes internal DoS attacks from infected computers on the network so that the VoIP system to make calls fall. The security manager also notes that the SIP servers are unavailable during these attacks. Which of the following security will most likely VoIP DoS attacks reduce the network? (Choose two).(Select 2answers)

A) Configure the 802.11e network
B) 802.1q configure the network
C) Update the corporate firewall to block attacks addresses
D) Install a HIPS in the SIP servers
E) 802.1X configuration on the network


3. A storage as a service company implements both encryption at rest, in transit and encryption of customer data. The security administrator is responsible for the overall security of the stored encrypted customer information through the company's servers and development team wants to implement a solution that will enhance the customer encryption key. Which of the following, if implemented, will most increase the time it would take an offline password attack data to the customers?

A) password = + sha password (password + salt) + AES256 (password + salt)
B) key = NULL; for (int i = 0; i <5000; i ++) {key = SHA (item + password)}
C) key = AES128 (sha256 (password), password))
D) None
E) password = NULL; for (int i = 0; i <10 000; i ++) {password = SHA256 (key)}


4. After the installation process, a software application conducted an online activation process. After a few months, the system experienced a hardware failure. A backup image of the system was restored to a newer revision of the same make and model device. After recovery, no longer works the specialized application. Which of the following is the most likely cause of the problem?

A) The restored image backup is encrypted with the wrong key.
B) The binary files used by the application have been changed by malware.
C) None
D) The application may not carry external fixation due to blocked ports.
E) The summary hash key hardware and installed software no longer match.


5. ABC Corporation has introduced token authentication system due to the risk of password compromise. The tokens have a set of counter-HMAC-based codes are valid until they are used. Which of the following types of authentication mechanisms does describe this statement?

A) DUDE
B) TOTP
C) HOTP
D) None
E) DAD


1. Right Answer: E
Explanation:

2. Right Answer: A,D
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: E
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment