exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 356 discussion

Actual exam question from CompTIA's CAS-004
Question #: 356
Topic #: 1
[All CAS-004 Questions]

A security team is concerned with attacks that are taking advantage of return-oriented programming against the company's public facing applications. Which of the following should the company implement on the public-facing servers?

  • A. WAF
  • B. ASLR
  • C. NX
  • D. HSM
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Leroy_24
5 days, 9 hours ago
Selected Answer: C
NX prevents malicious code from being executed from the memory stack, blocking ROP attacks.
upvoted 1 times
Leroy_24
1 day, 1 hour ago
I’m changing my answer to B. ASLR. This question is a duplicate of 433 and ASLR is the answer there, NX isn’t an option.
upvoted 1 times
...
Leroy_24
1 day, 1 hour ago
I’m changing my answer to B. ASLR. This question is a duplicate of 433 and ASLR is the answer there, NX isn’t an option.
upvoted 1 times
...
...
Steel16
1 month, 3 weeks ago
Selected Answer: C
o C. NX (Non-eXecutable pages): is a security feature that prevents code from being executed from memory pages marked as non-executable. This is crucial in defending against return-oriented programming (ROP) attacks, as attackers often exploit vulnerabilities to inject malicious code into the stack and then execute it. By making the stack non-executable, NX effectively disrupts this attack vector. o B. ASLR: Address Space Layout Randomization (ASLR) randomizes the memory addresses of key system components, making it harder for attackers to guess the location of vulnerable code. While ASLR can help mitigate ROP attacks to some extent, NX provides a more direct and effective defense against them.
upvoted 1 times
...
fac161f
7 months, 1 week ago
I chose ASLR, so was a bit perturbed when WAF was the supposive answer. So I read the question thoroughly and googled. I find the Key word is Implemented and Public Facing, you dont Implement ASLR as it is built into all current windows(auto enables for .NET applications, which is all front facing applications) and linux systems and automatically enabled. NX bit is already implemented in the BIOS and auto enabled if the CPU supports it (all modern CPUs do). HSM has nothing to do with the question. You are only left with WAF and does not directly deal with ROP, but does deal with most initial attacks (Gaining Access). WAF on any public facing system is widly suggested and endorced by MS and AWS.
upvoted 1 times
...
23169fd
9 months, 2 weeks ago
Selected Answer: B
Purpose: ASLR is a security technique used to randomize the memory addresses used by system and application processes. By randomizing the location of code and data in memory, ASLR makes it significantly more difficult for attackers to predict the location of specific functions and exploit them using return-oriented programming (ROP). Effectiveness: ASLR increases the complexity of exploiting memory corruption vulnerabilities by making it harder for attackers to execute reliable ROP chain
upvoted 2 times
...
armid
9 months, 4 weeks ago
In order to increase the security level of the operating system, Microsoft has implemented several mitigation mechanisms, such as DEP and ASLR. Data Execution Prevention (DEP) is a security feature that prohibits the application from executing code from non-executable memory area. To exploit a vulnerability, an attacker must find a executable memory region and be able to fill it with necessary data (e.g., shellcode instructions). Generally, achieving this goal using old exploitation techniques is made significantly more difficult with the addition of the DEP mechanism. As a result, attackers improved upon the classic “return-into-libc” technique and started using return-oriented programming (ROP) [3, 7] to bypass Data Execution Prevention.
upvoted 1 times
armid
9 months, 4 weeks ago
Techniques like ROP are still based on the attacker understanding memory layout characteristics, leading Microsoft to implement Address Space Layout Randomization (ASLR) as a countermeasure. ASLR renders the layout of an application’s address space less predictable because it relocates the base addresses of executable modules and other memory mappings. In order to bypass DEP protection mechanism ROP technique was introduced.
upvoted 1 times
armid
9 months, 4 weeks ago
given that DEP works in conjunction with NX bit, I think NX bit is technically the "more" accurate answer. But this question once again is about mind reading of the examiner. Could be both B and C.
upvoted 1 times
armid
9 months, 4 weeks ago
Apologies, i misread the article. So according to the last sentence in my first post, DEP is bypassable by ROP, thus ASLR was implemented to make the process of bypassing DEP harder. So I will go wtih B. ASLR
upvoted 1 times
...
...
...
...
b49eb27
1 year ago
Selected Answer: B
my problem with NX is that it prevents execution all together. an ROP could redirect data to a register that is not normally used for specific kinds of data, an attacker could redirect it to that register. NX just keeps it from executing, not stopping others from executing on a buffer overflow. ASLR is not in and of itself directly good for preventing ROP, but it's better than NX. My source is based of off working with assembly language and working with registers
upvoted 2 times
...
HappyG
1 year, 1 month ago
Selected Answer: C
ASLR and NX (No eXecute) are both important security features, but NX (DEP) is more directly relevant to preventing the exploitation of return-oriented programming (ROP) attacks. NX prevents code execution in specific memory regions marked as non-executable, thereby thwarting attempts to execute malicious code injected into these areas, including ROP chains. Therefore, the more direct and relevant solution for preventing ROP exploitation is: C. NX (No eXecute)
upvoted 2 times
...
ElDirec
1 year, 2 months ago
Selected Answer: B
The company should implement B. ASLR (Address Space Layout Randomization) on the public-facing servers. ASLR is a security technique used in operating systems to prevent exploitation of memory corruption vulnerabilities. It randomly arranges the address space positions of key data areas of a process, which makes it difficult for an attacker to predict target addresses. This can help protect against return-oriented programming attacks, which rely on knowing the exact addresses of instructions in memory. While the other options (WAF, NX, HSM) can provide some level of security, they do not directly address the issue of return-oriented programming attacks. Remember, it’s crucial to have a robust security infrastructure in place to protect against potential threats. Regular security reviews and audits are also a good practice to identify and mitigate potential security issues.
upvoted 2 times
...
nuel_12
1 year, 5 months ago
Selected Answer: B
To prevent or mitigate an attack on return-oriented programming, there are several techniques that can be used, such as: Address space layout randomization (ASLR): This technique randomizes the base addresses of the code, data, stack, and heap segments, making it harder for the attacker to predict the location of the gadgets and the payload amongst all the possible solution the is no C(no-execute), so the answer is B
upvoted 3 times
...
joinedatthehop
1 year, 6 months ago
Selected Answer: B
Address space layout randomization (ASLR) – This technique was the first kind of defense mechanisms proposed to defend against ROP.
upvoted 2 times
OdinAtlasSteel
1 year, 5 months ago
No, the most appropriate solution for mitigating attacks that take advantage of return-oriented programming (ROP) against public-facing applications is not B. ASLR (Address Space Layout Randomization). ASLR is a security feature that randomizes the memory addresses used by system and application components, making it more difficult for attackers to predict the location of specific functions or code gadgets. While ASLR is a valuable defense mechanism, it may not directly address the ROP technique. The more direct and relevant solution for preventing the exploitation of return-oriented programming is C. NX (No eXecute), also known as Data Execution Prevention (DEP). NX prevents code execution in certain areas of memory, making it harder for attackers to execute malicious code, including ROP chains. So, in the context of preventing ROP attacks, the recommended solution is NX/DEP.
upvoted 2 times
...
...
hheerreessjjoohhnnyy
1 year, 6 months ago
Selected Answer: B
According to Intel, the answer is ASLR (B). "Areas of strength for ROP attacks includes the ability to circumvent data execution prevention (NX)"... meaning C is not the correct answer. See page 8 at link below. "Existing solutions to ROP attacks include Address Space Layout Randomization: ASLR is the state-of-the-art protection against ROP attacks." See page 9 at link below. https://www.intel.com/content/dam/develop/external/us/en/documents/catc17-anti-rop-moving-target-defense-844137.pdf
upvoted 4 times
...
32d799a
1 year, 6 months ago
Selected Answer: B
While it is beneficial to have a WAF for any public-facing application, it doesn't directly defend against ROP attacks. B. ASLR (Address Space Layout Randomization): ASLR randomizes the memory addresses used by processes, making it more difficult for an attacker to predict the location of specific functions or buffers. This makes exploitation, including ROP attacks, harder to accomplish because the attacker cannot predict where the necessary gadgets (fragments of code useful in ROP) will be in memory.
upvoted 4 times
...
Ariel235788
1 year, 6 months ago
Selected Answer: C
C. NX (No-Execute) or DEP (Data Execution Prevention). Explanation: NX (No-Execute) or DEP (Data Execution Prevention) is a security feature that helps prevent buffer overflow attacks, including those using return-oriented programming (ROP). NX marks certain areas of memory as non-executable, so even if an attacker attempts to execute malicious code injected into a buffer, the operating system will prevent it from running in non-executable memory regions.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago