Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dealsixty

CAS-003 Exam Dumps - CompTIA CASP Questions and Answers

Page: 1 / 25
Questions 4

A company is deploying a DIP solution and scanning workstations and network drives for documents that contain potential Pll and payment card data. The results of the first scan are as follows:

The security learn is unable to identify the data owners for the specific files in a timely manner and does not suspect malicious activity with any of the detected files. Which of the following would address the inherent risk until the data owners can be formally identified?

Options:

A.

Move the files from the marketing share to a secured drive.

B.

Search the metadata for each file to locate the file's creator and transfer the files to the personal drive of the listed creator.

C.

Configure the DLP tool to delete the files on the shared drives

D.

Remove the access for the internal audit group from the accounts payable and payroll shares

Buy Now
Questions 5

A system administrator recently conducted a vulnerability scan of the internet. Subsequently, the organization was successfully attacked by an adversary. Which of the following in the MOST likely explanation for why the organization network was compromised?

Options:

A.

There was a false positive since the network was fully patched.

B.

The system administrator did not perform a full system sun.

C.

The systems administrator performed a credentialed scan.

D.

The vulnerability database was not updated.

Buy Now
Questions 6

A network service on a production system keeps crashing at random times. The systems administrator suspects a bug in the listener is causing the service to crash, resuming in the a DoS. Which the service crashes, a core dump is left in the /tmp directory. Which of the following tools can the systems administrator use to reproduction these symptoms?

Options:

A.

Fuzzer

B.

Vulnerability scanner

C.

Core dump analyzer

D.

Debugger

Buy Now
Questions 7

A developer has executed code for a website that allows users to search for employees’ phone numbers by last

name. The query string sent by the browser is as follows:

http://www.companywebsi te.com/search.php?q=SMITH

The developer has implemented a well-known JavaScript sanitization library and stored procedures, but a

penetration test shows the website is vulnerable to XSS. Which of the following should the developer implement

NEXT to prevent XSS? (Choose two.)

Options:

A.

Sanitization library

B.

Secure cookies

C.

TLS encryption

D.

Input serialization

E.

Output encoding

F.

PUT form submission

Buy Now
Page: 1 / 25
Exam Code: CAS-003
Exam Name: CompTIA Advanced Security Practitioner (CASP) Exam
Last Update: Apr 14, 2023
Questions: 683
CAS-003 pdf

CAS-003 PDF

$32  $80
CAS-003 Engine

CAS-003 Testing Engine

$38  $95
CAS-003 PDF + Engine

CAS-003 PDF + Testing Engine

$52  $130