100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CASP PRACTICE EXAM 3 2025 QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
76
Grade
A+
Uploaded on
08-07-2025
Written in
2024/2025

CASP PRACTICE EXAM 3 2025 QUESTIONS AND ANSWERS

Institution
CASP - Comptia Advanced Security Practitioner
Course
CASP - Comptia Advanced Security Practitioner











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CASP - Comptia Advanced Security Practitioner
Course
CASP - Comptia Advanced Security Practitioner

Document information

Uploaded on
July 8, 2025
Number of pages
76
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CASP PRACTICE EXAM 3 2025
QUESTIONS AND ANSWERS


You are the security administrator for your company. You are required to implement a

solution that will provide the highest level of confidentiality possible to all data on the

network.




Two-factor token and biometric-based authentication is implemented for all users.

Administrator-level accounts are tightly controlled and issued separately to each user

needing administrative access. Auditing is enabled to log all transactions. All hard drives

are protected using full disk encryption.




All resources have access control lists (ACLs) that can only be changed by an

administrator. All server resources are virtualized. LUN masking is implemented to

segregate storage area network (SAN) data. All switches are configured with port

security. The network is protected with a firewall using ACLs, a NIPS device, and

secured wireless access points.




You need to improve the current architecture to provide the stated goal. What shou -

....ANSWER ...-Answer: A




...©️ 2025, ALL RIGHTS RESERVED 1

,Explanation: You should implement transport encryption to provide the highest level of

confidentiality possible for all data on the network.

The public relations department at your company regularly sends out emails signed by

the company's CEO with announcements about the company. The CEO sends company

and personal emails from a different email account.




A competitor is suing your company for copyright infringement. As part of the

investigation, you must provide legal counsel with a copy of all emails that came from

the CEO, including those generated by the public relations department. The email

server allows emails to be digitally signed, and the corporate PKI provisioning allows for

one certificate per user. The CEO did not share his password with anyone. You need to

provide legal counsel with information on how to determine whether a particular email

came from the public relations department or from the CEO. What should you do?




Options:




A. Implement digital rights management (DRM).




B. Use non-repudiation.




C. Implement encryption.



...©️ 2025, ALL RIGHTS RESERVED 2

,D. Employ key esc - ....ANSWER ...-Answer: B




Explanation: You should use non-repudiation. Non-repudiation is provided when an

email includes a digital signature.

After connecting to a secure payment server at https://checkout.pearson.com, an

auditor notices that the SSL certificate was issued to *.pearson.com. The auditor also

notices that many of the internal development servers use the same certificate. After

installing the certificate on Srv1.pearson.com, one of the developers reports misplacing

the USB thumb drive where the SSL certificate was stored.




Which of the following should the auditor recommend FIRST?




Options:




A. Generate a new public key for each server.




B. Generate a new private key for each server.




C. Replace the SSL certificate on Srv1.pearson.com.




...©️ 2025, ALL RIGHTS RESERVED 3

, D. Replace the SSL certificate on checkout.pearson.com. - ....ANSWER ...-Answer:

C




Explanation: You should replace the SSL certificate on Srv1.pearson.com. The

development servers need to have a new SSL certificate.

A new company requirement says that multi-factor authentication is required to access

network resources. You have been asked to research and implement the most cost-

effective solution that would authenticate both hardware and users. The company wants

to leverage PKI, which is already well established.




You issue individual private/public key pairs to each user and install the public key on

the central authentication system. What should you do next?




Options:




A. Require each user to install the private key on his or her computer and protect it with

his or her credentials.




B. Deploy biometrics on each client computer.




C. Issue each user one hardware token.




...©️ 2025, ALL RIGHTS RESERVED 4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EmilyCharlene Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
457
Member since
2 year
Number of followers
138
Documents
21611
Last sold
21 hours ago
Charlene\'s Scholastic Emporium.

Your Actual and Virtual Exam Tests Excellent Tutor.

3.7

98 reviews

5
46
4
13
3
15
2
7
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions