Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dealsixty

Pearson CAS-003 New Attempt

Page: 18 / 25
Question 72

During a criminal investigation, the prosecutor submitted the original hard drive from the suspect’s computer as evidence. The defense objected during the trial proceedings, and the evidence was rejected. Which of the following practices should the prosecutor’s forensics team have used to ensure the suspect’s data would be admissible as evidence? (Select TWO.)

Options:

A.

Follow chain of custody best practices

B.

Create an identical image of the original hard drive, store the original securely, and then perform forensics only on the imaged drive.

C.

Use forensics software on the original hard drive and present generated reports as evidence

D.

Create a tape backup of the original hard drive and present the backup as evidence

E.

Create an exact image of the original hard drive for forensics purposes, and then place the original back in service

Question 73

A security consultant is attempting to discover if the company is utilizing databases on client machines to store the customer data. The consultant reviews the following information:

Which of the following commands would have provided this output?

Options:

A.

arp -s

B.

netstat -a

C.

ifconfig -arp

D.

sqlmap -w

Question 74

To prepare for an upcoming audit, the Chief Information Security Officer (CISO) asks for all 1200 vulnerabilities on production servers to be remediated. The security engineer must determine which vulnerabilities represent real threats that can be exploited so resources can be prioritized to migrate the most dangerous risks. The CISO wants the security engineer to act in the same manner as would an external threat, while using vulnerability scan results to prioritize any actions.

Which of the following approaches is described?

Options:

A.

Blue team

B.

Red team

C.

Black box

D.

White team

Question 75

A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via rootkit. Post-incident analysis is ongoing, and the incident responders and systems administrators are working to determine a strategy to reduce the risk of recurrence. The firm’s systems are running modern operating systems and feature UEFI and TPMs. Which of the following technical options would provide the MOST preventive value?

Options:

A.

Update and deploy GPOs

B.

Configure and use measured boot

C.

Strengthen the password complexity requirements

D.

Update the antivirus software and definitions

Page: 18 / 25
Exam Code: CAS-003
Exam Name: CompTIA Advanced Security Practitioner (CASP) Exam
Last Update: Apr 14, 2023
Questions: 683
CAS-003 pdf

CAS-003 PDF

$32  $80
CAS-003 Engine

CAS-003 Testing Engine

$38  $95
CAS-003 PDF + Engine

CAS-003 PDF + Testing Engine

$52  $130