exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 194 discussion

Actual exam question from CompTIA's CAS-004
Question #: 194
Topic #: 1
[All CAS-004 Questions]

A company created an external, PHP-based web application for its customers. A security researcher reports that the application has the Heartbleed vulnerability.
Which of the following would BEST resolve and mitigate the issue? (Choose two.)

  • A. Deploying a WAF signature
  • B. Fixing the PHP code
  • C. Changing the web server from HTTPS to HTTP
  • D. Using SSLv3
  • E. Changing the code from PHP to ColdFusion
  • F. Updating the OpenSSL library
Show Suggested Answer Hide Answer
Suggested Answer: BF 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
AlenKumar
Highly Voted 2 years, 4 months ago
B. Fixing the PHP code: The Heartbleed vulnerability is a flaw in the OpenSSL library, which is a widely used open-source implementation of the SSL and TLS protocols. To fix the vulnerability, the PHP code should be updated to use a version of the OpenSSL library that is not vulnerable to Heartbleed. F. Updating the OpenSSL library: In addition to updating the PHP code to use a fixed version of the OpenSSL library, it is important to update the OpenSSL library itself to a version that is not vulnerable to Heartbleed.
upvoted 8 times
...
Rob69420
Highly Voted 2 years, 4 months ago
Selected Answer: BF
B.F. Heartbleed, BASH and now POODLE - new SSL vulnerability discovered. Researchers from Google have announced the discovery of another major flaw in Web Security. It has been called POODLE and follows hot on the heels of Bash and Heartbleed. The vulnerability is rooted in SSL v3.
upvoted 5 times
...
deeden
Most Recent 5 months ago
Selected Answer: AF
The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software, not PHP code. Fixing PHP will not address the issue. https://seclists.org/fulldisclosure/2014/Apr/90
upvoted 1 times
...
SuntzuLegacy
5 months, 1 week ago
Selected Answer: AF
A and F are the correct answers just by looking up Heartbleed vulnerability
upvoted 1 times
...
IT_Master_Tech
7 months, 1 week ago
ChatGPT goes with A and F.
upvoted 1 times
...
23169fd
9 months, 3 weeks ago
Selected Answer: AF
F. Updating the OpenSSL library: Reason: The Heartbleed vulnerability is a flaw in certain versions of the OpenSSL library. Updating to a version of OpenSSL that is not affected by this vulnerability (e.g., 1.0.1g or later) directly addresses the issue by removing the vulnerability. Impact: This is the most critical step to ensure that your web server is no longer vulnerable to Heartbleed. A. Deploying a WAF signature: Reason: Deploying a Web Application Firewall (WAF) with a specific signature to detect and block Heartbleed exploitation attempts adds an additional layer of security. This measure helps protect your system from attacks targeting the vulnerability until the underlying issue is fully resolved by updating OpenSSL. Impact: This provides immediate protection against exploitation attempts and helps mitigate the risk until the update can be applied.
upvoted 2 times
23169fd
9 months, 3 weeks ago
The Heartbleed vulnerability is related to OpenSSL, not PHP. Changing the PHP code will not address the vulnerability because it exists in the OpenSSL library used by the web server
upvoted 2 times
...
...
6809276
1 year, 1 month ago
Selected Answer: AF
Waf and open ssl
upvoted 3 times
...
userguy890
1 year, 2 months ago
Selected Answer: AF
Read up on the heartbleed vuln. it has nothing to do with PHP its all with openSSL. I swear people put the wrong answers to mess with people.
upvoted 4 times
...
hb0011
1 year, 3 months ago
The people saying fixing the PHP code won't fix it are wrong. Do not listen to them.
upvoted 1 times
...
Delab202
1 year, 3 months ago
Using SSLv3 SSLv3 was created, and, together with the newer TLSv1/1.1/1.2, it is still currently being used to secure the transport layer of the Internet. As it happened for SSLv2, recently Google engineers pointed out that SSLv3 is broken (with an exploitation technique known as POODLE) and should not be used any longer.
upvoted 1 times
...
ThatGuyOverThere
1 year, 6 months ago
Selected Answer: AF
https://www.leviathansecurity.com/media/leviathans-mandatory-heartbleed-blog-entry "Now that the vulnerability has become public, IDS vendors have put out signatures to detect overly-large TLS Heartbeat Response packets. Some IPS and WAF implementations will block all incoming TLS Heartbeat requests and close the connection."
upvoted 5 times
...
weaponxcel
1 year, 6 months ago
Selected Answer: AF
I don't think "B. Fixing PHP code" is correct. They are talking about Heartbleed vulnerability. Heartbleed has nothing to do with PHP. Change PHP won't do anything. I will go with A and F instead.
upvoted 3 times
...
weaponxcel
1 year, 6 months ago
I don't think "B. Fixing PHP code" is correct. They are talking about Heartbleed vulnerability. Heartbleed has nothing to do with PHP. Change PHP won't do anything. I will go with A and F instead.
upvoted 2 times
...
32d799a
1 year, 6 months ago
Selected Answer: AF
F. Updating the OpenSSL library: This is the primary and most direct solution. A. Deploying a WAF (Web Application Firewall) signature: While updating OpenSSL is the primary solution, deploying a WAF that recognizes and blocks Heartbleed attack attempts can serve as a defensive measure
upvoted 1 times
...
BreakOff874
2 years ago
B. Fixing the PHP code: The Heartbleed vulnerability is a flaw in the OpenSSL cryptographic software library that can allow an attacker to steal sensitive information such as passwords, usernames, and credit card numbers from the memory of the affected system. To fix the issue, the PHP code needs to be reviewed and fixed to ensure that it is not vulnerable to the Heartbleed bug. F. Updating the OpenSSL library: The Heartbleed vulnerability is a flaw in the OpenSSL cryptographic software library. To fix the issue, the version of OpenSSL used by the web server should be updated to a version that does not have the Heartbleed bug. This will ensure that the web application is not vulnerable to attacks exploiting the Heartbleed bug.
upvoted 2 times
...
FOURDUE
2 years, 2 months ago
Selected Answer: BF
Know your code First, managing open source software components is critically important for application security. While using open source components is a practical and fruitful strategy for application developers, those components do have to be managed properly. You have to know which components you’ve used in your applications, and you must be aware of any known vulnerabilities in those components. When new vulnerabilities are published about the software components you’ve used, you need to know right away so you can take action if necessary. (Likewise, you should know the software licenses of those components to ensure you are not using something improperly, but that is not the focus of this article.) A software composition analysis (SCA) solution like Black Duck automates much of this work. https://www.synopsys.com/blogs/software-security/heartbleed-vulnerability-appsec-deep-dive/
upvoted 4 times
...
Mr_BuCk3th34D
2 years, 4 months ago
Selected Answer: BF
Without a doubt
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago