Free CAS-003 Exam Braindumps (page: 68)

Page 68 of 137

A developer is reviewing the following transaction logs from a web application:

Username: John Doe
Street name: Main St.
Street number: <script>alert(‘test’)</alert>

Which of the following code snippets should the developer implement given the above transaction logs?

  1. if ($input != strcmp($var1, “<>”)) {die();}
  2. <form name =”form1” action=”/submit.php” onsubmit=”return validate()” action=POST>
  3. $input=strip_tags(trim($_POST[‘var1’]));
  4. <html><form name=”myform” action=”www.server.com/php/submit.php action=GET”

Answer(s): C



A manufacturing company recently recovered from an attack on its ICS devices. It has since reduced the attack surface by isolating the affected components. The company now wants to implement detection capabilities. It is considering a system that is based on machine learning. Which of the following features would BEST describe the driver to adopt such nascent technology over mainstream commercial IDSs?

  1. Trains on normal behavior and identifies deviations therefrom
  2. Identifies and triggers upon known bad signatures and behaviors
  3. Classifies traffic based on logical protocols and messaging formats
  4. Automatically reconfigures ICS devices based on observed behavior

Answer(s): A



An engineer is reviewing the security architecture for an enterprise network. During the review, the engineer notices an undocumented node on the network. Which of the following approaches can be utilized to determine how this node operates? (Choose two.)

  1. Use reverse engineering and techniques
  2. Assess the node within a continuous integration environment
  3. Employ a static code analyzer
  4. Review network and traffic logs
  5. Use a penetration testing framework to analyze the node
  6. Analyze the output of a ping sweep

Answer(s): D,E



A security administrator is reviewing the following output from an offline password audit:


Which of the following should the systems administrator implement to BEST address this audit finding? (Choose two.)

  1. Cryptoprocessor
  2. Bcrypt
  3. SHA-256
  4. PBKDF2
  5. Message authentication

Answer(s): B,D



Page 68 of 137



Post your Comments and Discuss CompTIA CAS-003 exam with other Community members:

Nathan commented on April 20, 2020
I appreicate that you provide the Xengine software for free. But are you planning to keep it free! I really hope so!
GERMANY
upvote