Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CASP+ 2023 Questions and answer - Part 59

Mary Smith

Sun, 19 Apr 2026

ComptiA CASP+ 2023 Questions and answer - Part 59

1. Which threat modeling tool allows for assets to be automatically or manually placed on a drawing pane?

A) IriusRisk
B) SD Elements
C) Threat Modeling Tool
D) securiCAD



2. You have recently been hired by a company to analyze its security mechanisms to determine any weaknesses in the current security mechanisms. During this analysis, you detect that an application is using a 3DES implementation that encrypts each block of data three times, each time with a different key. Which 3DES implementation does the application use?

A) 3DES-EDE3
B) 3DES-EEE2
C) 3DES-EEE3
D) 3DES-EDE2



3. Your company implements one of its applications on a Linux server. You would like to store passwords in a location that can be protected using a hash. Where is this location?

A) /etc/shadow
B) /etc/root
C) /etc/passwd/hash
D) /etc/passwd



4. Which technology uses chips and receivers to manage inventory?

A) geotagging
B) geolocation
C) RFID
D) SRTM



5. Which organization issues RFCs?

A) IEEE
B) ISO
C) IEC
D) IETF



1. Right Answer: A
Explanation: securiCAD focuses on threat modeling of IT infrastructures using a CAD-based approach where assets are automatically or manually placed on a drawing pane.

2. Right Answer: C
Explanation: The 3DES-EEE3 implementation encrypts each block of data three times, each time with a different key. The 3DES-EDE3 implementation encrypts each block of data with the first key, decrypts each block with the second key, and encrypts each block with the third key. The 3DES-EEE2 implementation encrypts each block of data with the first key, encrypts each block with the second key, and then encrypts each block again with the first key. The 3DES-EDE2 implementation encrypts each block of data with the first key, decrypts each block with the second key, and then encrypts each block with the first key.

3. Right Answer: A
Explanation: For Linux, passwords are stored in the /etc/passwd or /etc/shadow file. Because the /etc/passwd file is a text file that can be easily accessed, you should ensure that any Linux servers use the /etc/shadow file, where the passwords in the file can be protected using a hash.

4. Right Answer: C
Explanation: Radio frequency identification (RFID) involves using chips and receivers to manage inventory.

5. Right Answer: D
Explanation: The IETF issues RFCs.

0 Comments

Leave a comment