Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CASP+ 2023 Questions and answer - Part 6

Mary Smith

Wed, 09 Jul 2025

ComptiA CASP+ 2023 Questions and answer - Part 6

1. A security administrator observes the following line in the server security log:

A) WAF
B) input validation
C) sandboxing
D) SIEM
E) DAM


2. A forensic gets a hard disk with malware quarantine antivirus application. After creating an image and determine the directory location of the malware file, which of the following will help to determine if the system is infected?

A) The changing malware file access, change time properties.
B) None
C) The timing of the malware in the swap.
D) The date / time-stamp of the malware detection in the anti-virus-logs.
E) The timeline analysis of the file system.


3. The Chief Information Officer (CIO) is reviewing the IT-centric BIA and RA documentation. The documentation shows that a single 24-hour downtime in a mission-critical function will cost the company $ 2.3 million. In addition, the business unit that has determined depending on the mission-critical function that there is a high probability that a threat will materialize based on historical data. The Cioa ¬ ys budget does not allow for a complete system hardware replacement in the event of a catastrophic failure, arrange for the purchase of additional compensating controls. Which of the following CIO would recommend to the financial director to minimize financial loss?

A) The company should avoid the risk.
B) The company needs to reduce risk.
C) None
D) The company must accept the risk.
E) The company has to bear the risk.


4. A new piece of ransomware is installed on the backup server of a company which encrypted hard drives with the operating system and backup application configuration, but did not affect the deduplication data drives. During the incident response, the company believes that all backup tapes for the server are corrupt. Which of the following is the primary concern?

A) None
B) Validating the integrity of deduplicated data
C) Determine how HIPS installed on all server platforms to prevent future incidents
D) Prevent restore the ransomware from re-infecting the server
E) Restoring the data difficult without the application configuration


5. An application present on virtually an organization 1000 system is vulnerable to a buffer overflow attack. Which of the following is the most comprehensive way to problem solve?

A) Run the application in terminal services to reduce threats.
B) None
C) Validate and implement the appropriate patch.
D) NIPS deploy custom signatures to detect and block attacks.
E) Deploy HIPS custom signatures to detect and block attacks.


1. Right Answer: A
Explanation:

2. Right Answer: E
Explanation:

3. Right Answer: E
Explanation:

4. Right Answer: E
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment