Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CAS-004 Topic 1 Question 52 Discussion

Actual exam question for CompTIA's CAS-004 exam
Question #: 52
Topic #: 1
[All CAS-004 Questions]

After a server was compromised an incident responder looks at log files to determine the attack vector that was used The incident responder reviews the web server log files from the time before an unexpected SSH session began:

Which of the following is the most likely vulnerability that was exploited based on the log files?

Show Suggested Answer Hide Answer
Suggested Answer: D

ssdeep is a tool that computes and matches Context Triggered Piecewise Hashing (CTPH), also known as fuzzy hashing. It can be used to identify similar files or slight variations of the same file, which may point to the creator of the file if certain patterns or markers are consistently present. This method allows for integrity checking without altering the evidence, which is critical in forensic investigation.


Contribute your Thoughts:

Sheron
3 days ago
Hmm, the log files suggest a potential directory traversal vulnerability. I'll need to take a closer look at the specifics.
upvoted 0 times
...
Quentin
8 days ago
I'm not sure, but I think C) The root password being easily guessed is also a possibility.
upvoted 0 times
...
Dominga
9 days ago
I agree with Kristel, an outdated third-party PHP plug-in is a common target for attackers.
upvoted 0 times
...
Kristel
18 days ago
I think the most likely vulnerability that was exploited is D) An outdated third-party PHP plug-in was vulnerable to a known remote code execution.
upvoted 0 times
...

Save Cancel