Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CAS-003 Exam Questions Tutorials

Page: 20 / 25
Question 80

A developer has executed code for a website that allows users to search for employees’ phone numbers by last

name. The query string sent by the browser is as follows:

te.com/search.php?q=SMITH

The developer has implemented a well-known JavaScript sanitization library and stored procedures, but a

penetration test shows the website is vulnerable to XSS. Which of the following should the developer implement

NEXT to prevent XSS? (Choose two.)

Options:

A.

Sanitization library

B.

Secure cookies

C.

TLS encryption

D.

Input serialization

E.

Output encoding

F.

PUT form submission

Question 81

A network service on a production system keeps crashing at random times. The systems administrator suspects a bug in the listener is causing the service to crash, resuming in the a DoS. Which the service crashes, a core dump is left in the /tmp directory. Which of the following tools can the systems administrator use to reproduction these symptoms?

Options:

A.

Fuzzer

B.

Vulnerability scanner

C.

Core dump analyzer

D.

Debugger

Question 82

A system administrator recently conducted a vulnerability scan of the internet. Subsequently, the organization was successfully attacked by an adversary. Which of the following in the MOST likely explanation for why the organization network was compromised?

Options:

A.

There was a false positive since the network was fully patched.

B.

The system administrator did not perform a full system sun.

C.

The systems administrator performed a credentialed scan.

D.

The vulnerability database was not updated.

Question 83

A corporation with a BYOD policy is very concerned about issues that may arise from data ownership. The corporation is investigating a new MDM solution and has gathered the following requirements as part of the requirements-gathering phase.

* Each device must be issued a secure token of trust from the corporate PKI.

* All corporate application and local data must be able to deleted from a central console.

* Cloud storage and backup applications must be restricted from the device.

* Devices must be on the latest OS version within three weeks of an OS release.

Which of the following should be feature in the new MDM solution to meet these requirement? (Select TWO.)

Options:

A.

Application-based containerization

B.

Enforced full-device encryption

C.

Mandatory acceptance of SCEP system

D.

Side-loaded application prevention

E.

Biometric requirement to unlock device

F.

Over-the-air restriction

Page: 20 / 25
Exam Code: CAS-003
Exam Name: CompTIA Advanced Security Practitioner (CASP) Exam
Last Update: Apr 14, 2023
Questions: 683
CAS-003 pdf

CAS-003 PDF

$28  $80
CAS-003 Engine

CAS-003 Testing Engine

$33.25  $95
CAS-003 PDF + Engine

CAS-003 PDF + Testing Engine

$45.5  $130