Free CAS-004 Exam Braindumps (page: 6)

Page 6 of 99

A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open-source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away.

Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?

  1. Scan the code with a static code analyzer, change privileged user passwords, and provide security training.
  2. Change privileged usernames, review the OS logs, and deploy hardware tokens.
  3. Implement MFA, review the application logs, and deploy a WAF.
  4. Deploy a VPN, configure an official open-source library repository, and perform a full application review for vulnerabilities.

Answer(s): C

Explanation:

Specifying a repository serves no purpose. You already know the library has a vulnerability. You need something which mitigates the unauthorized access, which MFA does, and a properly configured WAF would also provide protection.



A security analyst discovered that the company’s WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

Which of the following would BEST mitigate this vulnerability?

  1. CAPTCHA
  2. Input validation
  3. Data encoding
  4. Network intrusion prevention

Answer(s): B

Explanation:


Reference:

https://hdivsecurity.com/owasp-xml-external-entities-xxe



A university issues badges through a homegrown identity management system to all staff and students. Each week during the summer, temporary summer school students arrive and need to be issued a badge to access minimal campus resources. The security team received a report from an outside auditor indicating the homegrown system is not consistent with best practices in the security field and leaves the institution vulnerable.

Which of the following should the security team recommend FIRST?

  1. Investigating a potential threat identified in logs related to the identity management system
  2. Updating the identity management system to use discretionary access control
  3. Beginning research on two-factor authentication to later introduce into the identity management system
  4. Working with procurement and creating a requirements document to select a new IAM system/vendor

Answer(s): A



A customer reports being unable to connect to a website at www.test.com to consume services. The customer notices the web application has the following published cipher suite:

Which of the following is the MOST likely cause of the customer’s inability to connect?

  1. Weak ciphers are being used.
  2. The public key should be using ECDSA.
  3. The default should be on port 80.
  4. The server name should be test.com.

Answer(s): B


Reference:

https://security.stackexchange.com/questions/23383/ssh-key-type-rsa-dsa-ecdsa-are-there-easy-answers-for-which-to-choose-when



Page 6 of 99



Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

Sysadmin 4/22/2024 3:30:17 PM
How can you report incorrect answers? #27 is incorrect. First and foremost is always stop the spread, and then access the damage.
UNITED STATES
upvote

Gord 3/19/2024 9:44:01 AM
I hardly submit reivews... but the team at Xcerts.com really deserve one. They are super professional and the quality of their study guides are good. I highly recommend it anyone preparing for their exams.
UNITED KINGDOM
upvote

9eagles 4/7/2023 10:04:00 AM
on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous
upvote

Change 12/11/2023 5:07:09 PM
Are some answers wrong
UNITED STATES
upvote

makeel 12/10/2023 2:13:20 PM
the questions are the same exist of another website
Anonymous
upvote