Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CASP+ 2023 Questions and answer - Part 53

Mary Smith

Sat, 18 Apr 2026

ComptiA CASP+ 2023 Questions and answer - Part 53

1. A hacker gains access to your organization - s network. During this attack, he is able to change some data and access some design plans that are protected by a U.S. patent. Which security tenets have been violated?

A) confidentiality, integrity, and availability
B) confidentiality and availability
C) integrity and availability
D) confidentiality and integrity



2. Which of the following creates an encrypted area to hold and quarantine corporate data separately from that of the users?

A) COPE
B) virtualization
C) VNC
D) containerization



3. In which type of test is the tester provided with limited knowledge of the network systems and devices, does the tester perform the test using publicly available information only, and does the organization - s security team knows that an attack is coming?

A) blind
B) double blind
C) fuzz
D) target



4. Which form of HSM is specifically suited to mobile apps?

A) Ethernet
B) serial
C) USB
D) microSD



5. OllyDbg is an example of which tool type?

A) sniffer
B) fuzzer
C) reverse engineering tools
D) network enumerator



1. Right Answer: D
Explanation: Confidentiality and integrity have been violated. Changing the data violates integrity, and accessing patented design plans violates confidentiality. Availability has not been violated in this scenario.

2. Right Answer: D
Explanation: Containerization is a newer feature of most mobile device management (MDM) software that creates an encrypted container to hold and quarantine corporate data separately from that of the users. This allows for MDM policies to be applied only to that container and not the rest of the device.

3. Right Answer: A
Explanation: In a blind test, the testing team is provided with limited knowledge of the network systems and devices and performs the test using publicly available information only. The organization s security team knows that an attack is coming. This test requires more effort from the testing team.

4. Right Answer: D
Explanation: A microSD HSM is an HSM that connects to the microSD port on a device that has such a port. The card is specifically suited for mobile apps written for Android and is supported by most Android phones and tablets with a microSD card slot.

5. Right Answer: C
Explanation: OllyDbg is a reverse engineering tool. Specifically, it is a 32- bit, assembler-level analyzing debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where the source is unavailable.

0 Comments

Leave a comment