Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CASP+ 2023 Questions and answer - Part 5

Mary Smith

Wed, 09 Jul 2025

ComptiA CASP+ 2023 Questions and answer - Part 5

1. A security analyst was asked to develop a quantitative risk analysis and risk assessment for online shopping of the business application. Based on heuristic information from the Security Operations Center (SOC), performed a Denial of Service (DoS) attack is successful five times a year. The Operations Department has determined the loss is associated with each attack $ 40,000. After the implementation of application caching, the number of DoS attacks was reduced to once a year. The cost of the countermeasures was $ 100,000. Which of the following is the monetary value earned during the first year of operation?

A) $140,000
B) $200,000
C) $60,000
D) None
E) $100,000


2. A user has configured a laptop with multiple operating systems. The systems are all installed on a single SSD, but each has its own partition or logical volume. Which of the following is the best way to ensure the confidentiality of individual operating system?

A) Encryption of each partition
B) None
C) FDE of each logical volume on the SSD
D) Encryption SSD file level
E) FDE of the entire SSD as a single disc


3. Install faster SSD drives in the storage system is used in the infrastructure.(Select 2answers)

A) Isolate the system immediately and begin forensics on the host.
B) The administrator should disable remote root logins
C) A remote attacker has root account affected by a buffer overflow in sshd.
D) A remote attacker has root password guessed by a dictionary attack.
E) An authorized administrator has logged into the root account remotely.


4. Which of the following describes a risk and control related to cloud data storage?

A) None
B) Risk: Offsite Replication Mitigation: Multi-site backups
C) Risk: Combined Data Archiving Mitigation: Two-factor authentication manager
D) Risk: loss of data de-duplication Mitigation: Dynamic Host Bus Addressing
E) Risk: Shared hardware causes data leakage mitigation: Strong encryption at rest


5. Joe, a hacker has discovered that he has a web page that when viewed can craft a specific browser to crash the browser and enables him to get the remote code execution in the context of the victim's privilege level. The browser crashes due to an exception error when a heap memory is accessed unused. Which of the following best describes application issue?

A) Click-jacking
B) integer overflow
C) Use after free
D) SQL injection
E) race condition


1. Right Answer: C
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: A,D
Explanation:

4. Right Answer: E
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment