Free CAS-003 Exam Braindumps (page: 7)

Page 7 of 137

An internal penetration tester was assessing a recruiting page for potential issues before it was pushed to the production website. The penetration tester discovers an issue that must be corrected before the page goes live. The web host administrator collects the log files below and gives them to the development team so improvements can be made to the security design of the website.


Which of the following types of attack vectors did the penetration tester use?

  1. SQL injection
  2. CSRF
  3. Brute force
  4. XSS
  5. TOC/TOU

Answer(s): B



The Chief Information Security Officer (CISO) for an organization wants to develop custom IDS rulesets faster, prior to new rules being released by IDS vendors. Which of the following BEST meets this objective?

  1. Identify a third-party source for IDS rules and change the configuration on the applicable IDSs to pull in the new rulesets
  2. Encourage cybersecurity analysts to review open-source intelligence products and threat database to generate new IDS rules based on those sources
  3. Leverage the latest TCP- and UDP-related RFCs to arm sensors and IDSs with appropriate heuristics for anomaly detection
  4. Use annual hacking conventions to document the latest attacks and threats, and then develop IDS rules to counter those threats

Answer(s): B



A user workstation was infected with a new malware variant as a result of a drive-by download. The security administrator reviews key controls on the infected workstation and discovers the following:


Which of the following would BEST prevent the problem from reoccurring in the future? (Choose two.)

  1. Install HIPS
  2. Enable DLP
  3. Install EDR
  4. Install HIDS
  5. Enable application blacklisting
  6. Improve patch management processes

Answer(s): B,E



An engineer is assisting with the design of a new virtualized environment that will house critical company services and reduce the datacenter’s physical footprint. The company has expressed concern about the integrity of operating systems and wants to ensure a vulnerability exploited in one datacenter segment would not lead to the compromise of all others. Which of the following design objectives should the engineer complete to BEST mitigate the company’s concerns? (Choose two.)

  1. Deploy virtual desktop infrastructure with an OOB management network
  2. Employ the use of vTPM with boot attestation
  3. Leverage separate physical hardware for sensitive services and data
  4. Use a community CSP with independently managed security services
  5. Deploy to a private cloud with hosted hypervisors on each physical machine

Answer(s): A,C



Page 7 of 137



Post your Comments and Discuss CompTIA CAS-003 exam with other Community members:

Nathan commented on April 20, 2020
I appreicate that you provide the Xengine software for free. But are you planning to keep it free! I really hope so!
GERMANY
upvote