Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CASP+ 2023 Questions and answer - Part 41

Mary Smith

Sat, 18 Apr 2026

ComptiA CASP+ 2023 Questions and answer - Part 41

1. A researcher first wants the most volatile data collection in an incident at the data to maintain the highest risk to lose. After the memory, which of the following BEST remaining order of volatility that the researcher must follow represent?

A) File system information, exchange files, network, system processes and raw disk blocks.
B) Raw disk blocks, network, system processes, data exchange and file.
C) None
D) System processes, network processes, file system information, exchanging files and raw disk blocks
E) Raw disk blocks, exchange files, network, system processes, and file system


2. A security solutions architect has consistently advocated to implement the most secure method for encrypting corporate messages. The solution was as unprofitable mocked by other members of the IT department. The proposed solution makes use of symmetric keys to encrypt all messages, and is highly resistant to unauthorized decryption. The method also requires special handling and safety for all the important stuff that goes above and beyond most encryption systems. Which of the following is the most likely solutions architect trying to implement?

A) PKI
B) Digital Rights Management
C) One-time pad
D) None
E) quantum cryptography


3. Accountant at a small company trying to understand the value of a server to determine if the company can afford to buy another server DR. The risk manager only gave the auditor with SLE of $ 24,000, ARO 20% and the exposure factor of 25%. Which of the following is the correct net asset value calculated by the auditor?

A) $4,800
B) $96,000
C) None
D) $120,000
E) $24,000


4. A company has noticed recently that its corporate information is finally on an online forum. A study has found that internal staff are sharing confidential company information on a daily basis. Which of the following are the most effective security measures that can be used to stop the above problem? (Choose two).(Select 2answers)

A) Deploy NIDS on the desktop and DMZ networks
B) Deploying DLP on the desktop, email gateway and web proxies
C) Security awareness compliance training for all employees
D) Implement a URL filter to block the online forum
E) Review of security policies and procedures


5. The risk manager at a small bank wants to use quantitative analysis to the ALE of running an operating system in a location that is subject to be determined during the year to fires. A risk analyst reports to the risk manager that the intrinsic value of the business system is $ 120,000 and, according to industry data, the exposure factor to burn only 20% due to the fire suppression system installed on the site. Fires occur in the area on average every four years. Which of the following is the ALE?

A) None
B) $30,000
C) $96,000
D) $24,000
E) $6,000


1. Right Answer: D
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: B,C
Explanation:

5. Right Answer: E
Explanation:

0 Comments

Leave a comment