exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 545 discussion

Actual exam question from CompTIA's CAS-004
Question #: 545
Topic #: 1
[All CAS-004 Questions]

An analyst reviews the following output collected during the execution of a web application security assessment:



Which of the following attacks would be most likely to succeed, given the output?

  • A. NULL and unauthenticated cipher downgrade attack
  • B. Availability attack from manipulation of associated authentication data
  • C. Padding oracle attack
  • D. On-path forced renegotiation to insecure ciphers
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bright07
2 weeks, 4 days ago
Selected Answer: A
Given the output from the web application security assessment, the most likely attack to succeed is: A. NULL and unauthenticated cipher downgrade attack.
upvoted 1 times
...
grelaman
2 months ago
Selected Answer: C
Given that the server uses obsolete CBC ciphers without strong encryption and lacks forward secrecy, it is susceptible to padding oracle attacks. Allows attackers to decrypt sensitive data or manipulate encrypted messages without knowing the encryption key. - TLS 1.0 is considered insecure due to vulnerabilities. - Obsolete CBC Ciphers (AES, ARIA, etc.) Offered: Cipher Block Chaining (CBC) modes are susceptible to padding oracle attack
upvoted 2 times
...
lj22HI
2 months, 2 weeks ago
D While a padding oracle attack is a potential threat, the provided output doesn't directly indicate its susceptibility. The server's support for older, less secure cipher suites, such as RC4 and 3DES, is a more immediate concern. The most likely successful attack in this scenario is a forced downgrade attack. The attacker could exploit the server's support for weaker cipher suites to force the client to negotiate a less secure connection. This could lead to data confidentiality and integrity issues. Therefore, D. On-path forced renegotiation to insecure ciphers remains the most likely attack.
upvoted 1 times
...
nezeranonymous
2 months, 2 weeks ago
Selected Answer: C
Padding oracle attack: This attack takes advantage of improper validation of padding in cryptographic operations, particularly in block ciphers. If the application provides feedback based on padding errors, this attack could succeed. Based on common vulnerabilities in web applications, if the output suggests any specific issues with padding or cipher handling, C. Padding oracle attack could be the most likely to succeed, especially if the application reveals errors or feedback on cryptographic operations..
upvoted 1 times
...
c4521e0
2 months, 3 weeks ago
Changing answer to C
upvoted 1 times
...
c4521e0
2 months, 3 weeks ago
Selected Answer: A
Since TLS 1.0 is still being offered and more secure protocols are not available, it is likely that a downgrade attack could be used to force the communication to fall back to a weaker, deprecated protocol. Downgrade attacks, including those that lead to NULL ciphers, allow attackers to force weak encryption or no encryption, which aligns with the weaknesses highlighted in this scan. Although NULL ciphers aren't explicitly offered, the downgrade to weak protocols like TLS 1.0 opens the door to various downgrade attacks.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago