CompTIA Advanced Security Practitioner (CASP+) CAS-004 Free Dumps

  1. Home
  2. /
  3. Free Dumps
  4. /
  5. CompTIA Advanced Security Practitioner...

Question 21
0
Please leave a feedback on thisx

A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open- source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away.
Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?

  • A. Scan the code with a static code analyzer, change privileged user passwords, and provide security training.
  • B. Change privileged usernames, review the OS logs, and deploy hardware tokens.
  • C. Implement MFA, review the application logs, and deploy a WAF.
  • D. Deploy a VPN, configure an official open-source library repository, and perform a full application review for vulnerabilities.

 

 

Question 22
0
Please leave a feedback on thisx

A security analyst discovered that the company’s WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

CASP+_CAS-004_22__Certget

Which of the following would BEST mitigate this vulnerability?

  • A. CAPTCHA
  • B. Input validation
  • C. Data encoding
  • D. Network intrusion prevention

 

 

Question 23
0
Please leave a feedback on thisx

A university issues badges through a homegrown identity management system to all staff and students. Each week during the summer, temporary summer school students arrive and need to be issued a badge to access minimal campus resources. The security team received a report from an outside auditor indicating the homegrown system is not consistent with best practices in the security field and leaves the institution vulnerable.
Which of the following should the security team recommend FIRST?

  • A. Investigating a potential threat identified in logs related to the identity management system
  • B. Updating the identity management system to use discretionary access control
  • C. Beginning research on two-factor authentication to later introduce into the identity management system
  • D. Working with procurement and creating a requirements document to select a new IAM syste

 

 

 

Question 24
0
Please leave a feedback on thisx

A customer reports being unable to connect to a website at www.test.com to consume services. The customer notices the web application has the following published cipher suite:

CASP+_CAS-004_24__Certget

Which of the following is the MOST likely cause of the customer’s inability to connect?

  • A. Weak ciphers are being used.
  • B. The public key should be using ECDSA.
  • C. The default should be on port 80.
  • D. The server name should be test.com.

 

 

Question 25
0
Please leave a feedback on thisx

An IT administrator is reviewing all the servers in an organization and notices that a server is missing crucial practice against a recent exploit that could gain root access.
Which of the following describes the administrator’s discovery?

  • A. A vulnerability
  • B. A threat
  • C. A breach
  • D. A risk

 

Question 26
0
Please leave a feedback on thisx

A security analyst is performing a vulnerability assessment on behalf of a client. The analyst must define what constitutes a risk to the organization.
Which of the following should be the analyst’s FIRST action?

  • A. Create a full inventory of information and data assets.
  • B. Ascertain the impact of an attack on the availability of crucial resources.
  • C. Determine which security compliance standards should be followed.
  • D. Perform a full system penetration test to determine the vulnerabilities.

 

 

Question 27
0
Please leave a feedback on thisx

While investigating a security event, an analyst finds evidence that a user opened an email attachment from an unknown source. Shortly after the user opened the attachment, a group of servers experienced a large amount of network and resource activity. Upon investigating the servers, the analyst discovers the servers were encrypted by ransomware that is demanding payment within 48 hours or all data will be destroyed. The company has no response plans for ransomware.
Which of the following is the NEXT step the analyst should take after reporting the incident to the management team?

  • A. Pay the ransom within 48 hours.
  • B. Isolate the servers to prevent the spread.
  • C. Notify law enforcement.
  • D. Request that the affected servers be restored immediately.

 

 

Question 28
0
Please leave a feedback on thisx

A company plans to build an entirely remote workforce that utilizes a cloud-based infrastructure. The Chief Information Security Officer asks the security engineer to design connectivity to meet the following requirements:
– Only users with corporate-owned devices can directly access servers hosted by the cloud provider.
– The company can control what SaaS applications each individual user can access.
– User browser activity can be monitored.
Which of the following solutions would BEST meet these requirements?

  • A. IAM gateway, MDM, and reverse proxy
  • B. VPN, CASB, and secure web gateway
  • C. SSL tunnel, DLP, and host-based firewall
  • D. API gateway, UEM, and forward proxy

 

 

Question 29
0
Please leave a feedback on thisx

During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels.
Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?

  • A. Spawn a shell using sudo and an escape string such as sudo vim -c ‘!sh’.
  • B. Perform ASIC password cracking on the host.
  • C. Read the /etc/passwd file to extract the usernames.
  • D. Initiate unquoted service path exploits.
  • E. Use the UNION operator to extract the database schema.

 

 

 

Question 30
0
Please leave a feedback on thisx

A systems administrator is in the process of hardening the host systems before connecting to the network. The administrator wants to add protection to the boot loader to ensure the hosts are secure before the OS fully boots.
Which of the following would provide the BEST boot loader protection?

  • A. TPM
  • B. HSM
  • C. PKI
  • D. UEFI/BIOS

 

 

 

 

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
error: Content is protected !!