Free CompTIA CAS-004 Exam Actual Questions

The questions for CAS-004 were last updated On Apr 27, 2025

At ValidExamDumps, we consistently monitor updates to the CompTIA CAS-004 exam questions by CompTIA. Whenever our team identifies changes in the exam questions,exam objectives, exam focus areas or in exam requirements, We immediately update our exam questions for both PDF and online practice exams. This commitment ensures our customers always have access to the most current and accurate questions. By preparing with these actual questions, our customers can successfully pass the CompTIA Advanced Security Practitioner (CASP+) Exam exam on their first attempt without needing additional materials or study guides.

Other certification materials providers often include outdated or removed questions by CompTIA in their CompTIA CAS-004 exam. These outdated questions lead to customers failing their CompTIA Advanced Security Practitioner (CASP+) Exam exam. In contrast, we ensure our questions bank includes only precise and up-to-date questions, guaranteeing their presence in your actual exam. Our main priority is your success in the CompTIA CAS-004 exam, not profiting from selling obsolete exam questions in PDF or Online Practice Test.

 

Question No. 1

A company security engineer arrives at work to face the following scenario:

1) Website defacement

2) Calls from the company president indicating the website needs to be fixed Immediately because It Is damaging the brand

3) A Job offer from the company's competitor

4) A security analyst's investigative report, based on logs from the past six months, describing how lateral movement across the network from various IP addresses originating from a foreign adversary country resulted in exfiltrated data

Which of the following threat actors Is MOST likely involved?

Show Answer Hide Answer
Correct Answer: C

An Advanced Persistent Threat (APT) is an attack that is targeted, well-planned, and conducted over a long period of time by a nation-state actor. The evidence provided in the scenario indicates that the security analyst has identified a foreign adversary, which is strong evidence that an APT/nation-state actor is responsible for the attack. Resources:

CompTIA Advanced Security Practitioner (CASP+) Study Guide, Chapter 5: ''Advanced Persistent Threats,'' Wiley, 2018.https://www.wiley.com/en-us/CompTIA+Advanced+Security+Practitioner+CASP%2B+Study+Guide%2C+2nd+Edition-p-9781119396582


Question No. 2

During a vendor assessment, an analyst reviews a listing of the complementary user entity controls included in the audit report. Which of the following is the most important aspect to consider when reviewing this list with the security team?

Show Answer Hide Answer
Correct Answer: A

Step by Step

User entity controls are responsibilities that must be implemented by the organization, so determining how to implement and monitor them is critical.

Monitoring the CSP or auditing their implementation pertains to the CSP's responsibilities, not complementary user entity controls.


Question No. 3

A security architect needs to implement a CASB solution for an organization with a highly distributed remote workforce. One Of the requirements for

the implementation includes the capability to discover SaaS applications and block access to those that are unapproved or identified as risky. Which

of the following would BEST achieve this objective?

Show Answer Hide Answer
Correct Answer: C

The best way to achieve the objective of discovering SaaS applications and blocking access to unapproved or identified as risky ones is to implement cloud infrastructure to proxy all user web traffic and control access according to centralized policy (C). This solution would allow the security architect to inspect all web traffic and enforce access control policies centrally. This solution also allows the security architect to detect and block risky SaaS applications.


Question No. 4

A company's Chief Information Security Officer wants to prevent the company from being the target of ransomware. The company's IT assets need to be protected. Which of the following are the most secure options to address these concerns? (Select three).

Show Answer Hide Answer
Correct Answer: B, C, D

To prevent ransomware attacks and protect IT assets, the most secure options are:

Endpoint Detection and Response (EDR): Provides advanced threat detection, real-time monitoring, and response capabilities, which can help identify and mitigate ransomware attacks before they spread.

Sandboxing: Isolates suspicious files or software in a controlled environment where they can be analyzed for malicious behavior without affecting production systems.

Application Control: Ensures that only whitelisted, trusted applications can run, which can prevent ransomware from executing unauthorized or malicious code.Together, these controls provide a robust defense against ransomware by addressing detection, isolation, and prevention. CASP+ emphasizes the importance of combining detection and prevention strategies to mitigate sophisticated attacks like ransomware.


CASP+ CAS-004 Exam Objectives: Domain 2.0 -- Enterprise Security Operations (Endpoint Protection, Ransomware Mitigation)

CompTIA CASP+ Study Guide: Mitigating Ransomware with EDR, Sandboxing, and Application Control

Question No. 5

A university issues badges through a homegrown identity management system to all staff and students. Each week during the summer, temporary summer school students arrive and need to be issued a badge to access minimal campus resources. The security team received a report from an outside auditor indicating the homegrown system is not consistent with best practices in the security field and leaves the institution vulnerable.

Which of the following should the security team recommend FIRST?

Show Answer Hide Answer
Correct Answer: D

This is because the homegrown identity management system is not consistent with best practices and leaves the institution vulnerable, which means it needs to be replaced with a more secure and reliable solution. A new IAM system/vendor should be able to provide features such as role-based access control, two-factor authentication, auditing, and compliance that can enhance the security andefficiency of the identity management process. A requirements document can help define the scope, objectives, and criteria for selecting a suitable IAM system/vendor that meets the needs of the institution.