exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 195 discussion

Actual exam question from CompTIA's CAS-004
Question #: 195
Topic #: 1
[All CAS-004 Questions]

A security engineer is reviewing a record of events after a recent data breach incident that involved the following:
✑ A hacker conducted reconnaissance and developed a footprint of the company's Internet-facing web application assets.
✑ A vulnerability in a third-party library was exploited by the hacker, resulting in the compromise of a local account.
✑ The hacker took advantage of the account's excessive privileges to access a data store and exfiltrate the data without detection.
Which of the following is the BEST solution to help prevent this type of attack from being successful in the future?

  • A. Dynamic analysis
  • B. Secure web gateway
  • C. Software composition analysis
  • D. User behavior analysis
  • E. Web application firewall
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Mr_BuCk3th34D
Highly Voted 1 year, 4 months ago
Selected Answer: C
Software Composition Analysis Software composition analysis involves the inspection of source code to identify any open source components, which can include open source code itself but also any libraries that are being used as part of the application's design. The primary purpose of software composition analysis is to determine if software contains open source elements with known vulnerabilities and to help with issue prioritization and possible remediation steps.
upvoted 8 times
hidady
1 year, 4 months ago
Does it fullfill all required ptions,I still think of WAF
upvoted 3 times
Matty_B
1 year, 3 months ago
This is a tough one because the keyword is "prevent" Seems like WAF could be an immediate preventative measure to take. Analyzing software is just a review and doesn't give you a preventative option.
upvoted 2 times
Serliop378
1 year, 1 month ago
Waf do protects but SCA prevents vulnerable librairies exploitation
upvoted 2 times
...
...
Ariel235788
7 months, 1 week ago
WAF wouldnt cover the use of the 3rd party libraries
upvoted 1 times
...
...
...
mansamusa
Most Recent 5 months ago
Selected Answer: E
WAF is the answer
upvoted 2 times
...
Ariel235788
7 months, 1 week ago
Selected Answer: C
The BEST solution to help prevent this type of attack from being successful in the future involves: C. Software composition analysis. Here's why: Reconnaissance and Footprint Development: Software composition analysis (SCA) helps identify and track third-party libraries and components used in your applications. By regularly scanning and monitoring your codebase for vulnerabilities and known issues in these libraries, you can address them before attackers have a chance to exploit them. This helps prevent vulnerabilities from being discovered during reconnaissance. Vulnerability Exploitation: SCA can identify and notify you about vulnerabilities in third-party libraries, including those that could be exploited by attackers. Promptly patching or updating vulnerable libraries can help prevent attackers from exploiting these weaknesses, as they did in this incident. Excessive Privileges and Data Exfiltration: While SCA focuses on identifying and mitigating vulnerabilities in third-party libraries, additional measures such as user behavior analysis (D) can help detect suspicious activities, such as excessive privileges and data exfiltration. However, SCA is more directly related to the specific vulnerabilities mentioned in the scenario.
upvoted 1 times
...
imather
9 months, 1 week ago
Selected Answer: C
Repeat of 255, where there is no WAF. Answer is SCA.
upvoted 3 times
...
BiteSize
9 months, 3 weeks ago
Selected Answer: C
Software Composition Analysis (SCA) "3rd party library" vulnerability could be directly mitigated by a SCA solution. Source: https://www.synopsys.com/glossary/what-is-software-composition-analysis.html#D Doing reconnaissance doesn't mean that you need a WAF. Attackers always do that. This part of the question is a red herring. None of the options really can get after preventing exfiltrating data. User behavior analysis is not Continous Monitoring for irregular user behavior. Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 4 times
...
darkdumper
1 year ago
Selected Answer: E
E, correct
upvoted 3 times
...
BreakOff874
1 year ago
E. The hacker exploited vulnerabilities in a web server. WAF can monitor HTTP traffic and inspect the content. User behavior analysis might help but is not the BEST solution. Everything could have been avoided from the beginning with the reconnaissance if a WAF was in place.
upvoted 3 times
...
josepa
1 year, 1 month ago
E, correct
upvoted 2 times
...
FoxTrotDG
1 year, 1 month ago
Selected Answer: C
A WAF isn't going to detect or prevent all attacks that exploit vulnerabilities in third-party libraries. A software composition analysis is specifically designed to identify and manage risks associated with third-party libraries and open-source components. An SCA would have prevented this from happening.
upvoted 3 times
...
FOURDUE
1 year, 2 months ago
Selected Answer: E
Why do you need a web application firewall (WAF)? Maximizes the detection and catch rate for known and unknown threats Minimizes false alerts (false positives) and adapts to continually evolving web applications Ensures broader adoption through ease of use and minimal performance impact
upvoted 3 times
FOURDUE
1 year, 2 months ago
key word is prevent
upvoted 2 times
...
...
hidady
1 year, 4 months ago
E seems correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago