CompTIA CAS-004 Exam Practice Questions (P. 3)
- Full Access (645 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open- source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away.
Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?
Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?
- AScan the code with a static code analyzer, change privileged user passwords, and provide security training.
- BChange privileged usernames, review the OS logs, and deploy hardware tokens.
- CImplement MFA, review the application logs, and deploy a WAF.Most Voted
- DDeploy a VPN, configure an official open-source library repository, and perform a full application review for vulnerabilities.
Correct Answer:
D
Reference:
https://www.microfocus.com/en-us/what-is/sast
D
Reference:
https://www.microfocus.com/en-us/what-is/sast
send
light_mode
delete
Question #22
A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

Which of the following would BEST mitigate this vulnerability?

Which of the following would BEST mitigate this vulnerability?
- ACAPTCHA
- BInput validationMost Voted
- CData encoding
- DNetwork intrusion prevention
Correct Answer:
B
Reference:
https://hdivsecurity.com/owasp-xml-external-entities-xxe
B
Reference:
https://hdivsecurity.com/owasp-xml-external-entities-xxe

send
light_mode
delete
Question #23
A university issues badges through a homegrown identity management system to all staff and students. Each week during the summer, temporary summer school students arrive and need to be issued a badge to access minimal campus resources. The security team received a report from an outside auditor indicating the homegrown system is not consistent with best practices in the security field and leaves the institution vulnerable.
Which of the following should the security team recommend FIRST?
Which of the following should the security team recommend FIRST?
- AInvestigating a potential threat identified in logs related to the identity management system
- BUpdating the identity management system to use discretionary access control
- CBeginning research on two-factor authentication to later introduce into the identity management system
- DWorking with procurement and creating a requirements document to select a new IAM system/vendorMost Voted
Correct Answer:
B
B

When a report highlights that an identity management system isn't up to par with security best practices and thus poses vulnerabilities, a sensible initial step is to address the core security mechanisms within the system. Updating the system to incorporate stronger access control measures such as discretionary access control (DAC) enhances security by granting access rights based on user identity, often managed at the discretion of the system administrator. It's a proactive response, strengthening the system against potential security flaws identified in the audit, ensuring that it provides secure access management for both permanent and temporary users.
send
light_mode
delete
Question #24
A customer reports being unable to connect to a website at www.test.com to consume services. The customer notices the web application has the following published cipher suite:

Which of the following is the MOST likely cause of the customer's inability to connect?

Which of the following is the MOST likely cause of the customer's inability to connect?
- AWeak ciphers are being used.Most Voted
- BThe public key should be using ECDSA.
- CThe default should be on port 80.
- DThe server name should be test.com.
Correct Answer:
B
Reference:
https://security.stackexchange.com/questions/23383/ssh-key-type-rsa-dsa-ecdsa-are-there-easy-answers-for-which-to-choose-when
B
Reference:
https://security.stackexchange.com/questions/23383/ssh-key-type-rsa-dsa-ecdsa-are-there-easy-answers-for-which-to-choose-when
send
light_mode
delete
Question #25
An IT administrator is reviewing all the servers in an organization and notices that a server is missing crucial practice against a recent exploit that could gain root access.
Which of the following describes the administrator's discovery?
Which of the following describes the administrator's discovery?
- AA vulnerabilityMost Voted
- BA threat
- CA breach
- DA risk
Correct Answer:
A
Reference:
https://www.beyondtrust.com/blog/entry/privilege-escalation-attack-defense-explained
A
Reference:
https://www.beyondtrust.com/blog/entry/privilege-escalation-attack-defense-explained
send
light_mode
delete
Question #26
A security analyst is performing a vulnerability assessment on behalf of a client. The analyst must define what constitutes a risk to the organization.
Which of the following should be the analyst's FIRST action?
Which of the following should be the analyst's FIRST action?
- ACreate a full inventory of information and data assets.Most Voted
- BAscertain the impact of an attack on the availability of crucial resources.
- CDetermine which security compliance standards should be followed.
- DPerform a full system penetration test to determine the vulnerabilities.
Correct Answer:
A
A

When initiating a vulnerability assessment, the first key step is creating a comprehensive inventory of all information and data assets. This foundational knowledge enables the security analyst to clearly understand and identify what needs protection within the organization. It sets the stage for all further assessments and decisions on security measures by clearly defining the organization's assets that are at risk, ensuring a focused and effective approach to managing cybersecurity threats.
send
light_mode
delete
Question #27
While investigating a security event, an analyst finds evidence that a user opened an email attachment from an unknown source. Shortly after the user opened the attachment, a group of servers experienced a large amount of network and resource activity. Upon investigating the servers, the analyst discovers the servers were encrypted by ransomware that is demanding payment within 48 hours or all data will be destroyed. The company has no response plans for ransomware.
Which of the following is the NEXT step the analyst should take after reporting the incident to the management team?
Which of the following is the NEXT step the analyst should take after reporting the incident to the management team?
- APay the ransom within 48 hours.
- BIsolate the servers to prevent the spread.Most Voted
- CNotify law enforcement.
- DRequest that the affected servers be restored immediately.
Correct Answer:
B
B

The correct next step is to isolate the affected servers. This prevents the ransomware from spreading across the network and further compromising additional systems. Once isolated, the impact and scope of the breach can be controlled more effectively, maintaining other operations and safeguarding critical data still unaffected. Such immediate containment is paramount before considering further actions, such as law enforcement notification or restoration efforts.
send
light_mode
delete
Question #28
A company plans to build an entirely remote workforce that utilizes a cloud-based infrastructure. The Chief Information Security Officer asks the security engineer to design connectivity to meet the following requirements:
✑ Only users with corporate-owned devices can directly access servers hosted by the cloud provider.
✑ The company can control what SaaS applications each individual user can access.
✑ User browser activity can be monitored.
Which of the following solutions would BEST meet these requirements?
✑ Only users with corporate-owned devices can directly access servers hosted by the cloud provider.
✑ The company can control what SaaS applications each individual user can access.
✑ User browser activity can be monitored.
Which of the following solutions would BEST meet these requirements?
- AIAM gateway, MDM, and reverse proxy
- BVPN, CASB, and secure web gatewayMost Voted
- CSSL tunnel, DLP, and host-based firewall
- DAPI gateway, UEM, and forward proxy
Correct Answer:
A
A

The most effective configuration to meet all listed requirements involves employing a mix of an IAM gateway, MDM (Mobile Device Management), and a reverse proxy. Specifically, an IAM gateway can restrict server access to solely corporate-owned devices, aligning with the first requirement. An MDM solution ensures that only approved devices are utilized for workspace operations, providing granular control over the devices and fulfilling the need for specific application accessibility by users. Lastly, a reverse proxy not only facilitates controlled access to web applications but also allows the monitoring of user browser activity, ensuring oversight consistent with the company’s security policies. This combination adequately addresses the connectivity and security management for a remote workforce in a cloud environment.
send
light_mode
delete
Question #29
During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels.
Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?
Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?
- ASpawn a shell using sudo and an escape string such as sudo vim -c '!sh'.Most Voted
- BPerform ASIC password cracking on the host.
- CRead the /etc/passwd file to extract the usernames.
- DInitiate unquoted service path exploits.
- EUse the UNION operator to extract the database schema.
Correct Answer:
A
Reference:
https://docs.rapid7.com/insightvm/elevating-permissions/
A
Reference:
https://docs.rapid7.com/insightvm/elevating-permissions/
send
light_mode
delete
Question #30
A systems administrator is in the process of hardening the host systems before connecting to the network. The administrator wants to add protection to the boot loader to ensure the hosts are secure before the OS fully boots.
Which of the following would provide the BEST boot loader protection?
Which of the following would provide the BEST boot loader protection?
- ATPM
- BHSM
- CPKI
- DUEFI/BIOSMost Voted
Correct Answer:
D
Reference:
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-898217D4-689D-4EB5-866C-888353FE241C.html
D
Reference:
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-898217D4-689D-4EB5-866C-888353FE241C.html

send
light_mode
delete
All Pages