Free CAS-004 Exam Braindumps

Pass your CompTIA Advanced Security Practitioner (CASP+) Exam exam with these free Questions and Answers

Page 2 of 69
QUESTION 1

A security analyst is reading the results of a successful exploit that was recently conducted by third-party penetration testers. The testers reverse engineered a privileged executable. In the report, the planning and execution of the exploit is detailed using logs and outputs from the test However, the attack vector of the exploit is missing, making it harder to recommend remediation’s. Given the following output:
CAS-004 dumps exhibit
The penetration testers MOST likely took advantage of:

  1. A. A TOC/TOU vulnerability
  2. B. A plain-text password disclosure
  3. C. An integer overflow vulnerability
  4. D. A buffer overflow vulnerability

Correct Answer: A

QUESTION 2

A company requires a task to be carried by more than one person concurrently. This is an example of:

  1. A. separation of d duties.
  2. B. dual control
  3. C. least privilege
  4. D. job rotation

Correct Answer: B

QUESTION 3

A systems administrator is preparing to run a vulnerability scan on a set of information systems in the organization. The systems administrator wants to ensure that the targeted systems produce accurate information especially regarding configuration settings.
Which of the following scan types will provide the systems administrator with the MOST accurate information?

  1. A. A passive, credentialed scan
  2. B. A passive, non-credentialed scan
  3. C. An active, non-credentialed scan
  4. D. An active, credentialed scan

Correct Answer: D

QUESTION 4

A company’s SOC has received threat intelligence about an active campaign utilizing a specific vulnerability. The company would like to determine whether it is vulnerable to this active campaign.
Which of the following should the company use to make this determination?

  1. A. Threat hunting
  2. B. A system penetration test
  3. C. Log analysis within the SIEM tool
  4. D. The Cyber Kill Chain

Correct Answer: A

QUESTION 5

A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company’s services to ensure false positives do not drop legitimate traffic.
Which of the following would satisfy the requirement?

  1. A. NIDS
  2. B. NIPS
  3. C. WAF
  4. D. Reverse proxy

Correct Answer: A

Page 2 of 69

Post your Comments and Discuss CompTIA CAS-004 exam with other Community members: