Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CASP+ 2023 Questions and answer - Part 43

Mary Smith

Sat, 18 Apr 2026

ComptiA CASP+ 2023 Questions and answer - Part 43

1. A senior network security engineer has the task to reduce the attack surface of the corporate network. What the external network of the following interfaces to external attackers would protect perform network scanning?

A) None
B) Test external interfaces to see how they function when processing fragmented IP packets.
C) Filter ICMP use all internal messaging, allowing attackers full-blown TCP port scans against external network interfaces.
D) Remove contact the domain name registrar to avoid social engineering attacks.
E) Turn a honeynet to catch and future analysis of facilitating malicious attack vectors.


2. An IT manager is concerned about errors during the implementation process for a new model of the tablet. Which of the following would best practices and configuration parameters suggest that technicians can follow during the implementation process?

A) Procedure
B) collective standard
C) directive
D) automated workflow
E) None


3. An IT manager is working with a project manager for a new ERP system is able to implement the processing of data between the new ERP system and the old system. As part of this process, both parties must use the controls to secure data connections between the two operating systems. This is often documented in any of the following formal documents?

A) Memorandum of Understanding
B) interoperability Agreement
C) Agreement Information System Security
D) None
E) Interconnection Agreement Safety


4. A risk manager has decided to use probability and consequence to determine the risk of occurrence of a business asset. Which of the following is a limitation of this approach to risk management?

A) Enables cost-effectiveness.
B) Calculations can be quite complex MANAG
C) Subjective and based on the experience of an individual.
D) Requires a high degree of advance work environment to collect data.
E) Difficult to distinguish between high, medium and low risk.


5. A manager believes that the web servers are flooded with too much traffic from time to time. The manager suspects that this traffic flooding match when a competitor makes big announcements. Which of the following should the administrator to prove this theory?

A) Configuring servers for high availability of extra bandwidth to handle.
B) Implement a honeypot to catch traffic during the next attack.
C) None
D) Log all traffic from public IP addresses of competitors.
E) Implement data analysis to try and correlate the performance times.


1. Right Answer: B
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: E
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: E
Explanation:

0 Comments

Leave a comment