PrepAway - Latest Free Exam Questions & Answers

Category: CAS-001 (v.1)

Exam CAS-001: CompTIA Advanced Security Practitioner (update May 17th, 2015)

Pattern match "\bunion\b.{1,100}?

An administrator is reviewing logs and sees the following entry:
Message: Access denied with code 403 (phase 2). Pattern match “\bunion\b.{1,100}?\bselect\b” at
ARGS:$id. [data “union all select”] [severity “CRITICAL”] [tag “WEB_ATTACK”] [tag
“WASCTC/WASC-19”] [tag “OWASP_TOP_10/A1”] [tag “OWASP_AppSensor/CIE1”]
Action: Intercepted (phase 2) Apache-Handler: php5-script
Which of the following attacks was being attempted?

Which of the following when implemented would provide the BEST level of protection with the LEAST amount of di

A new startup company with very limited funds wants to protect the organization from external
threats by implementing some type of best practice security controls across a number of hosts
located in the application zone, the production zone, and the core network. The 50 hosts in the
core network are a mixture of Windows and Linux based systems, used by development staff to
develop new applications. The single Windows host in the application zone is used exclusively by

the production team to control software deployments into the production zone. There are 10 UNIX
web application hosts in the production zone which are publically accessible.
Development staff is required to install and remove various types of software from their hosts on a
regular basis while the hosts in the zone rarely require any type of configuration changes.
Which of the following when implemented would provide the BEST level of protection with the
LEAST amount of disruption to staff?

Which of the following provides the MOST comprehensive method for reducing the time to recover?

An organization has had six security incidents over the past year against their main web
application. Each time the organization was able to determine the cause of the incident and
restore operations within a few hours to a few days. Which of the following provides the MOST
comprehensive method for reducing the time to recover?

Which of the following presents the MOST risk to confidentiality in this scenario?

A company runs large computing jobs only during the overnight hours. To minimize the amount of
capital investment in equipment, the company relies on the elastic computing services of a major
cloud computing vendor. Because the virtual resources are created and destroyed on the fly
across a large pool of shared resources, the company never knows which specific hardware
platforms will be used from night to night. Which of the following presents the MOST risk to
confidentiality in this scenario?


Page 24 of 50« First...10...2223242526...304050...Last »