COMPTIA CASP+ EXAM 2025
QUESTIONS AND ANSWERS
Scalability - ....ANSWER ...-How well a system can scale up, or adapt to the
increased demands of growth and to maintain the same performance.
Armored Virus - ....ANSWER ...-A virus that goes to great lengths in order to avoid
detection.
The development server has been issued a self-signed digital certificate to use during
testing. When Jim, a developer, connects to the web application over HTTPS, he
receives an error that states "Your connection is not private". Which of the following
actions should Tim take to securely use the web application on the development server
for testing on the company's internal test and development network? -
....ANSWER ...-Accept the self-signed certificate as trusted in the client's browser
Artificial intelligence (AI) - ....ANSWER ...-Artificial Intelligence is the science of
creating machines to develop problem-solving and analysis strategies without significant
human direction or intervention.
Machine Learning (ML) - ....ANSWER ...-system uses a computer to accomplish a
task without being explicitly programmed. In the context of cybersecurity, ML generally
works by analyzing example data sets to create its own ability to classify future items
...©️ 2025, ALL RIGHTS RESERVED 1
, presented. If the system was presented with large datasets of malicious and benign
traffic, it will learn which is malicious and categorize future traffic presented to it.
What type of technique does exploit chaining often implement? - ....ANSWER ...-
Injecting parameters into a connection string using semicolons as a separator
Connection String Parameter Pollution (CSPP) exploits - ....ANSWER ...-
specifically the semicolon-delimited database connection strings that are constructed
dynamically based on the user inputs from web applications. CSPP, if carried out
successfully, can be used to steal user identities and hijack web credentials. CSPP is a
high-risk attack because of the relative ease with which it can be carried out (low access
complexity) and the potential results it can have (high impact). Exploit chaining involves
multiple commands and exploits being conducted in a series to fully attack or exploit a
given target.
Software Development Life Cycle - ....ANSWER ...-Step 1. Plan/initiate project
Step 2. Gather requirements
Step 3. Design
Step 4. Develop
Step 5. Test/validate
...©️ 2025, ALL RIGHTS RESERVED 2
QUESTIONS AND ANSWERS
Scalability - ....ANSWER ...-How well a system can scale up, or adapt to the
increased demands of growth and to maintain the same performance.
Armored Virus - ....ANSWER ...-A virus that goes to great lengths in order to avoid
detection.
The development server has been issued a self-signed digital certificate to use during
testing. When Jim, a developer, connects to the web application over HTTPS, he
receives an error that states "Your connection is not private". Which of the following
actions should Tim take to securely use the web application on the development server
for testing on the company's internal test and development network? -
....ANSWER ...-Accept the self-signed certificate as trusted in the client's browser
Artificial intelligence (AI) - ....ANSWER ...-Artificial Intelligence is the science of
creating machines to develop problem-solving and analysis strategies without significant
human direction or intervention.
Machine Learning (ML) - ....ANSWER ...-system uses a computer to accomplish a
task without being explicitly programmed. In the context of cybersecurity, ML generally
works by analyzing example data sets to create its own ability to classify future items
...©️ 2025, ALL RIGHTS RESERVED 1
, presented. If the system was presented with large datasets of malicious and benign
traffic, it will learn which is malicious and categorize future traffic presented to it.
What type of technique does exploit chaining often implement? - ....ANSWER ...-
Injecting parameters into a connection string using semicolons as a separator
Connection String Parameter Pollution (CSPP) exploits - ....ANSWER ...-
specifically the semicolon-delimited database connection strings that are constructed
dynamically based on the user inputs from web applications. CSPP, if carried out
successfully, can be used to steal user identities and hijack web credentials. CSPP is a
high-risk attack because of the relative ease with which it can be carried out (low access
complexity) and the potential results it can have (high impact). Exploit chaining involves
multiple commands and exploits being conducted in a series to fully attack or exploit a
given target.
Software Development Life Cycle - ....ANSWER ...-Step 1. Plan/initiate project
Step 2. Gather requirements
Step 3. Design
Step 4. Develop
Step 5. Test/validate
...©️ 2025, ALL RIGHTS RESERVED 2