Free CAS-004 Exam Braindumps (page: 22)

Page 22 of 140

A systems administrator is preparing to run a vulnerability scan on a set of information systems in the organization. The systems administrator wants to ensure that the targeted systems produce accurate information especially regarding configuration settings.
Which of the following scan types will provide the systems administrator with the MOST accurate information?

  1. A passive, credentialed scan
  2. A passive, non-credentialed scan
  3. An active, non-credentialed scan
  4. An active, credentialed scan

Answer(s): D



A networking team asked a security administrator to enable Flash on its web browser. The networking team explained that an important legacy embedded system gathers SNMP information from various devices. The system can only be managed through a web browser running Flash. The embedded system will be replaced within the year but is still critical at the moment.
Which of the following should the security administrator do to mitigate the risk?

  1. Explain to the networking team the reason Flash is no longer available and insist the team move up the timetable for replacement.
  2. Air gap the legacy system from the network and dedicate a laptop with an end-of-life OS on it to connect to the system via crossover cable for management.
  3. Suggest that the networking team contact the original embedded system's vendor to get an update to the system that does not require Flash.
  4. Isolate the management interface to a private VLAN where a legacy browser in a VM can be used as needed to manage the system.

Answer(s): D



Given the following log snippet from a web server:
Which of the following BEST describes this type of attack?

  1. SQL injection
  2. Cross-site scripting
  3. Brute-force
  4. Cross-site request forgery

Answer(s): A



A pharmaceutical company recently experienced a security breach within its customer-facing web portal. The attackers performed a SQL injection attack and exported tables from the company's managed database, exposing customer information.
The company hosts the application with a CSP utilizing the IaaS model.
Which of the following parties is ultimately responsible for the breach?

  1. The pharmaceutical company
  2. The cloud software provider
  3. The web portal software vendor
  4. The database software vendor

Answer(s): A



Page 22 of 140



Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

michrle23 commented on November 08, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
PAKISTAN
upvote

Fatima commented on June 17, 2024
The purchase and download is very streamlined. I was able to quickly pay and download my course content. I have now started preparing. Once I finish my exam I will share my experience of the exam.
EUROPEAN UNION
upvote

Sysadmin commented on April 22, 2024
How can you report incorrect answers? #27 is incorrect. First and foremost is always stop the spread, and then access the damage.
UNITED STATES
upvote

Gord commented on March 19, 2024
I hardly submit reivews... but the team at Xcerts.com really deserve one. They are super professional and the quality of their study guides are good. I highly recommend it anyone preparing for their exams.
UNITED KINGDOM
upvote

9eagles commented on April 07, 2023
on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous
upvote

Change commented on December 11, 2023
Are some answers wrong
UNITED STATES
upvote

makeel commented on December 10, 2023
the questions are the same exist of another website
Anonymous
upvote

SecPro commented on October 29, 2023
Great dumps, helped me pass the exam.
Anonymous
upvote