COMPTIA CASP EXAM 2025
QUESTIONS AND ANSWERS
Design review - ....ANSWER ...-A project manager is working with a software
development group to collect and evaluate user stories related
to the organization's internally designed CRM tool. After defining requirements, the
project manager would
like to validate the developer's interpretation and understanding of the user's request.
Which of the following
would BEST support this objective?
Mitigate - ....ANSWER ...-The finance department has started to use a new
payment system that requests strict PII security restrictions
on various network devices. The company decides to enforce the restrictions and
configure all devices
appropriately. Which of the following risk response strategies is being used?
Deploying a CASB - ....ANSWER ...-Security policies that are in place at an
organization prohibit USB drives from being utilized across the entire
enterprise, with adequate technical controls in place to block them. As a way to still be
able to work from
...©️ 2025, ALL RIGHTS RESERVED 1
,various locations on different computing resources, several sales staff members have
signed up for a webbased
storage solution without the consent of the IT department. However, the operations
department is
required to use the same service to transmit certain business partner documents. Which
of the following
would BEST allow the IT department to monitor and control this behavior?
Forcing different people to perform the same job minimizes the amount of time
malicious actions go
undetected by forcing malicious actors to attempt collusion between two or more people.
- ....ANSWER ...-A security engineer is attempting to convey the importance of
including job rotation in a company's standard
security policies, Which of the following would be the BEST justification?
Mulitenant IaaS cloud - ....ANSWER ...-A vulnerability was recently announced
that allows a malicious user to gain root privileges on other virtual
machines running within the same hardware cluster. Customers of which of the
following cloud-based
solutions should be MOST concerned about this vulnerability?
Require all mobile device backups to be encrypted and Implement an always-on VPN -
....ANSWER ...-A technician is configuring security options on the mobile device
manager of users who often utilize public
...©️ 2025, ALL RIGHTS RESERVED 2
,Internet connections while traveling. After ensuring that full disk encryption is enabled,
which of the following
security measures should the technician take?
Use reverse engineering tools and techniques and Review network and traffic logs -
....ANSWER ...-An engineer is reviewing the security architecture for an enterprise
network. During the review, the engineer
notices an undocumented node on the network. Which of the following approaches can
be utilized to
determine how this node operates?
Implement an IdP that supports SAML and time-based, one-time passwords. -
....ANSWER ...-The Chief Information Officer (CIO) wants to increase security
and accessibility among the organization's
cloud SaaS applications. The applications are configured to use passwords, and two-
factor authentication is
not provided natively. Which of the following would BEST address the CIO's concerns?
Effective deployment of network taps. - ....ANSWER ...-A security analyst has
requested network engineers integrate sFlow into the SOC's overall monitoring picture.
For this to be useful addition to the monitoring capabilities, which of the following must
be considered by the
engineering team?
HIPS - ....ANSWER ...-Several recent ransomware outbreaks at a company have
cost a significant amount of lost revenue. The
...©️ 2025, ALL RIGHTS RESERVED 3
, security team needs to find a technical control mechanism that will meet the following
requirements and aid
in preventing these outbreaks:
- Stop malicious software that does not match a signature
- Report on instances of suspicious behavior.
- Protect from previously unknown threats.
- Augment existing security capabilities.
Which of the following tools would BEST meet these requirements?
Move line 3 below line 4 and change port 80 to 443 on line 4
Add port 443 to line 2 - ....ANSWER ...-A request has been approved for a vendor
to access a new internal server using only HTTPS and SSH to
manage the back-end systems for the portal. Internal users just need HTTP and HTTPS
access to all internal
web servers. All other external access to the new server and its subnet is not allowed. The
security manager
must ensure proper access is configured.
New internal server IP" 10.1.50.150
Vendor IP: 208.206.109.249
External development subnet: 108.109.110.0/28
Internal subnet: 10.1.10.0/24
Web team subnet: 10.1.40.0/24
...©️ 2025, ALL RIGHTS RESERVED 4
QUESTIONS AND ANSWERS
Design review - ....ANSWER ...-A project manager is working with a software
development group to collect and evaluate user stories related
to the organization's internally designed CRM tool. After defining requirements, the
project manager would
like to validate the developer's interpretation and understanding of the user's request.
Which of the following
would BEST support this objective?
Mitigate - ....ANSWER ...-The finance department has started to use a new
payment system that requests strict PII security restrictions
on various network devices. The company decides to enforce the restrictions and
configure all devices
appropriately. Which of the following risk response strategies is being used?
Deploying a CASB - ....ANSWER ...-Security policies that are in place at an
organization prohibit USB drives from being utilized across the entire
enterprise, with adequate technical controls in place to block them. As a way to still be
able to work from
...©️ 2025, ALL RIGHTS RESERVED 1
,various locations on different computing resources, several sales staff members have
signed up for a webbased
storage solution without the consent of the IT department. However, the operations
department is
required to use the same service to transmit certain business partner documents. Which
of the following
would BEST allow the IT department to monitor and control this behavior?
Forcing different people to perform the same job minimizes the amount of time
malicious actions go
undetected by forcing malicious actors to attempt collusion between two or more people.
- ....ANSWER ...-A security engineer is attempting to convey the importance of
including job rotation in a company's standard
security policies, Which of the following would be the BEST justification?
Mulitenant IaaS cloud - ....ANSWER ...-A vulnerability was recently announced
that allows a malicious user to gain root privileges on other virtual
machines running within the same hardware cluster. Customers of which of the
following cloud-based
solutions should be MOST concerned about this vulnerability?
Require all mobile device backups to be encrypted and Implement an always-on VPN -
....ANSWER ...-A technician is configuring security options on the mobile device
manager of users who often utilize public
...©️ 2025, ALL RIGHTS RESERVED 2
,Internet connections while traveling. After ensuring that full disk encryption is enabled,
which of the following
security measures should the technician take?
Use reverse engineering tools and techniques and Review network and traffic logs -
....ANSWER ...-An engineer is reviewing the security architecture for an enterprise
network. During the review, the engineer
notices an undocumented node on the network. Which of the following approaches can
be utilized to
determine how this node operates?
Implement an IdP that supports SAML and time-based, one-time passwords. -
....ANSWER ...-The Chief Information Officer (CIO) wants to increase security
and accessibility among the organization's
cloud SaaS applications. The applications are configured to use passwords, and two-
factor authentication is
not provided natively. Which of the following would BEST address the CIO's concerns?
Effective deployment of network taps. - ....ANSWER ...-A security analyst has
requested network engineers integrate sFlow into the SOC's overall monitoring picture.
For this to be useful addition to the monitoring capabilities, which of the following must
be considered by the
engineering team?
HIPS - ....ANSWER ...-Several recent ransomware outbreaks at a company have
cost a significant amount of lost revenue. The
...©️ 2025, ALL RIGHTS RESERVED 3
, security team needs to find a technical control mechanism that will meet the following
requirements and aid
in preventing these outbreaks:
- Stop malicious software that does not match a signature
- Report on instances of suspicious behavior.
- Protect from previously unknown threats.
- Augment existing security capabilities.
Which of the following tools would BEST meet these requirements?
Move line 3 below line 4 and change port 80 to 443 on line 4
Add port 443 to line 2 - ....ANSWER ...-A request has been approved for a vendor
to access a new internal server using only HTTPS and SSH to
manage the back-end systems for the portal. Internal users just need HTTP and HTTPS
access to all internal
web servers. All other external access to the new server and its subnet is not allowed. The
security manager
must ensure proper access is configured.
New internal server IP" 10.1.50.150
Vendor IP: 208.206.109.249
External development subnet: 108.109.110.0/28
Internal subnet: 10.1.10.0/24
Web team subnet: 10.1.40.0/24
...©️ 2025, ALL RIGHTS RESERVED 4