CompTIA: Advanced Security Practitioner (CASP) Exam Prep - Question List

Select how would you like to study

16. Jim’s company is paying Chris’s company to develop software and a third party keeps a copy of the source code. What should Jim have in place for protection?
  1. Financial Escrow
  2. Software Escrow
  3. Application Escrow
  4. Technical Escrow
17. Software development methods provide software developers and vendor guidelines for program creation. What software development method is generally implemented in scenarios requiring rapid adaptations to changing client requirements?
  1. Iterative Development
  2. Component-Based Development
  3. Modified Prototype model
  4. Extreme Programming
18. What is created when RAM and secondary storage is combined?
  1. Combined Mode
  2. Virtual Memory
  3. Salvaged Memory
  4. Protection Rings
19. Which of the following situations would incline you to use a vulnerability scanner?
  1. Enabling a protocol analyzing capability.
  2. Enabling remote access.
  3. Enabling encryption.
  4. Identifying ports that are open on the computer.
20. What would dictate the degree of association between elements, methods of access, processing alternatives, and the organization of data elements?
  1. Cohesion
  2. Coupling
  3. Attributions
  4. Data Structure

Select how would you like to study