Free CAS-003 Exam Braindumps (page: 21)

Page 21 of 137



  1. Please refer to Explanation below for the answer.

Answer(s): A

Explanation:

Step 1: Verify that the certificate is valid or not. In case of any warning message, cancel the download. Step 2: If certificate issue is not there then, download the file in your system.
Step 3: Calculate the hash value of the downloaded file.
Step 4: Match the hash value of the downloaded file with the one which you selected on the website. Step 5: Install the file if the hash value matches.



Given the code snippet below:


Which of the following vulnerability types in the MOST concerning?

  1. Only short usernames are supported, which could result in brute forcing of credentials.
  2. Buffer overflow in the username parameter could lead to a memory corruption vulnerability.
  3. Hardcoded usernames with different code paths taken depend on which user is entered.
  4. Format string vulnerability is present for admin users but not for standard users.

Answer(s): B



To meet an SLA, which of the following document should be drafted, defining the company’s internal interdependent unit responsibilities and delivery timelines.

  1. BPA
  2. OLA
  3. MSA
  4. MOU

Answer(s): B

Explanation:

OLA is an agreement between the internal support groups of an institution that supports SLA. According to the Operational Level Agreement, each internal support group has certain responsibilities to the other group. The OLA clearly depicts the performance and relationship of the internal service groups. The main objective of OLA is to ensure that all the support groups provide the intended ServiceLevelAgreement.



A security analyst sees some suspicious entries in a log file from a web server website, which has a form that allows customers to leave feedback on the company’s products. The analyst believes a malicious actor is scanning the web form. To know which security controls to put in place, the analyst first needs to determine the type of activity occurring to design a control. Given the log below:


Which of the following is the MOST likely type of activity occurring?

  1. SQL injection
  2. XSS scanning
  3. Fuzzing
  4. Brute forcing

Answer(s): A



Page 21 of 137



Post your Comments and Discuss CompTIA CAS-003 exam with other Community members:

Nathan commented on April 20, 2020
I appreicate that you provide the Xengine software for free. But are you planning to keep it free! I really hope so!
GERMANY
upvote