Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Free CompTIA CAS-004 Exam Dumps

Here you can find all the free questions related with CompTIA Advanced Security Practitioner (CASP+) Exam (CAS-004) exam. You can also find on this page links to recently updated premium files with which you can practice for actual CompTIA Advanced Security Practitioner (CASP+) Exam . These premium versions are provided as CAS-004 exam practice tests, both as desktop software and browser based application, you can use whatever suits your style. Feel free to try the CompTIA Advanced Security Practitioner (CASP+) Exam premium files for free, Good luck with your CompTIA Advanced Security Practitioner (CASP+) Exam .
Question No: 1

MultipleChoice

A systems administrator is preparing to run a vulnerability scan on a set of information systems in the organization. The systems administrator wants to ensure that the targeted systems produce accurate information especially regarding configuration settings.

Which of the following scan types will provide the systems administrator with the MOST accurate information?

Options
Question No: 2

MultipleChoice

Law enforcement officials informed an organization that an investigation has begun. Which of the following is the FIRST step the organization should take?

Options
Question No: 3

MultipleChoice

A customer requires secure communication of subscribed web services at all times, but the company currently signs its own certificate requests to an internal C

Options
Question No: 4

MultipleChoice

A product development team has submitted code snippets for review prior to release.

INSTRUCTIONS

Analyze the code snippets, and then select one vulnerability, and one fix for each code snippet.

Code Snippet 1

Code Snippet 2

Vulnerability 1:

SQL injection

Cross-site request forgery

Server-side request forgery

Indirect object reference

Cross-site scripting

Fix 1:

Perform input sanitization of the userid field.

Perform output encoding of queryResponse,

Ensure usex:ia belongs to logged-in user.

Inspect URLS and disallow arbitrary requests.

Implement anti-forgery tokens.

Vulnerability 2

1) Denial of service

2) Command injection

3) SQL injection

4) Authorization bypass

5) Credentials passed via GET

Fix 2

A) Implement prepared statements and bind

variables.

B) Remove the serve_forever instruction.

C) Prevent the 'authenticated' value from being overridden by a GET parameter.

D) HTTP POST should be used for sensitive parameters.

E) Perform input sanitization of the userid field.

Options
Question No: 5

MultipleChoice

A developer needs to implement PKI in an autonomous vehicle's software in the most efficient and labor-effective way possible. Which of the following will the developer MOST likely implement?

Options
Question No: 6

MultipleChoice

A company's finance department acquired a new payment system that exports data to an unencrypted file on the system. The company implemented controls on the file so only appropriate personnel are allowed access. Which of the following risk techniques did the department use in this situation?

Options
Question No: 7

MultipleChoice

A security consultant has been asked to identify a simple, secure solution for a small business with a single access point. The solution should have a single SSID and no guest access. The customer

facility is located in a crowded area of town, so there is a high likelihood that several people will come into range every day. The customer has asked that the solution require low administrative overhead and be resistant to offline password attacks. Which of the following should the security consultant recommend?

Options
Question No: 8

MultipleChoice

Which of the following technologies should the company deploy to meet its security objectives? (Select TWO)_

Options
Question No: 9

MultipleChoice

An administrator at a software development company would like to protect the integrity of the company's applications with digital signatures. The developers report that the signing process keeps failing

on all applications. The same key pair used for signing, however, is working properly on the website, is valid, and is issued by a trusted CA. Which of the following is MOST likely the cause of the

signature failing?

Options
Question No: 10

MultipleChoice

A security analyst runs a vulnerability scan on a network administrator's workstation. The network administrator has direct administrative access to the company's SSO web portal. The vulnerability scan uncovers critical vulnerabilities with equally high CVSS scores for the user's browser, OS, email client, and an offline password manager. Which of the following should the security analyst patch FIRST?

Options

Save Cancel