Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

CompTIA Updated CAS-004 Exam Questions and Answers by arwen

Page: 7 / 32

CompTIA CAS-004 Exam Overview :

Exam Name: CompTIA Advanced Security Practitioner (CASP+) Exam
Exam Code: CAS-004 Dumps
Vendor: CompTIA Certification: CompTIA CASP
Questions: 439 Q&A's Shared By: arwen
Question 28

After a server was compromised an incident responder looks at log files to determine the attack vector that was used The incident responder reviews the web server log files from the time before an unexpected SSH session began:

Questions 28

Which of the following is the most likely vulnerability that was exploited based on the log files?

Options:

A.

Directory traversal revealed the hashed SSH password, which was used to access the server.

B.

A SQL injection was used during the ordering process to compromise the database server

C.

The root password was easily guessed and used as a parameter lo open a reverse shell

D.

An outdated third-party PHP plug-in was vulnerable to a known remote code execution

Discussion
Joey
I highly recommend Cramkey Dumps to anyone preparing for the certification exam. They have all the key information you need and the questions are very similar to what you'll see on the actual exam.
Dexter (not set)
Agreed. It's definitely worth checking out if you're looking for a comprehensive and reliable study resource.
Billy
It was like deja vu! I was confident going into the exam because I had already seen those questions before.
Vincent (not set)
Definitely. And the best part is, I passed! I feel like all that hard work and preparation paid off. Cramkey is the best resource for all students!!!
Cecilia
Yes, I passed my certification exam using Cramkey Dumps.
Helena (not set)
Great. Yes they are really effective
Hassan
Highly Recommended Dumps… today I passed my exam! Same questions appear. I bought Full Access.
Kasper (not set)
Hey wonderful….so same questions , sounds good. Planning to write this week, I will go for full access today.
Question 29

A forensic investigator started the process of gathering evidence on a laptop in response to an incident The investigator took a snapshof of the hard drive, copied relevant log files and then performed a memory dump Which of the following steps in the process should have occurred first?

Options:

A.

Preserve secure storage

B.

Clone the disk.

C.

Collect the most volatile data

D.

Copy the relevant log files

Discussion
Question 30

To bring digital evidence in a court of law the evidence must be:

Options:

A.

material

B.

tangible

C.

consistent

D.

conserved

Discussion
Question 31

A security analyst has been tasked with assessing a new API The analyst needs to be able to test for a variety of different inputs, both malicious and benign, in order to close any vulnerabilities Which of the following should the analyst use to achieve this goal?

Options:

A.

Static analysis

B.

Input validation

C.

Fuzz testing

D.

Post-exploitation

Discussion
Page: 7 / 32
Title
Questions
Posted

CAS-004
PDF

$35  $99.99

CAS-004 Testing Engine

$42  $119.99

CAS-004 PDF + Testing Engine

$56  $159.99