exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 21 discussion

Actual exam question from CompTIA's CAS-004
Question #: 21
Topic #: 1
[All CAS-004 Questions]

A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open- source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away.
Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?

  • A. Scan the code with a static code analyzer, change privileged user passwords, and provide security training.
  • B. Change privileged usernames, review the OS logs, and deploy hardware tokens.
  • C. Implement MFA, review the application logs, and deploy a WAF.
  • D. Deploy a VPN, configure an official open-source library repository, and perform a full application review for vulnerabilities.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
blacksheep6r
2 months, 2 weeks ago
Selected Answer: C
Why C is the Best Answer: ✔ MFA (Multi-Factor Authentication) Even if an attacker exploits the vulnerability, MFA adds an extra layer of protection. Prevents unauthorized users from easily accessing privileged accounts. ✔ Reviewing Application Logs Helps detect suspicious access attempts and understand how the vulnerability is being targeted. Logs provide early indicators of compromise (IoCs). ✔ Deploying a WAF (Web Application Firewall) WAFs can block exploit attempts targeting the vulnerable open-source library. They provide virtual patching by filtering malicious requests before the application is updated
upvoted 1 times
...
23169fd
9 months, 2 weeks ago
Selected Answer: C
This combination provides both proactive and reactive measures that can be implemented relatively quickly to mitigate the risk while a permanent fix is developed.
upvoted 1 times
...
cyspec
9 months, 3 weeks ago
Selected Answer: C
MFA to prevent stolen information from being used to logon. WAF to prevent the vulnerability from being used.
upvoted 2 times
...
Delab202
1 year, 3 months ago
Selected Answer: C
To reduce the risk to an acceptable level until the issue can be fixed, the BEST option is: C. Implement MFA, review the application logs, and deploy a WAF (Web Application Firewall).
upvoted 2 times
...
wizwiz
1 year, 5 months ago
Selected Answer: D
It cannot be C as MFA will do nothing to protect you from the library vulnerability which allows unuathorized access. VPN will allow only authenticated / authorized users access to the system. I think D is the appropriate answer.
upvoted 1 times
...
BiteSize
1 year, 9 months ago
Selected Answer: C
Seems like the textbook go to for controls to implement. MFA, review logs, and deploy a WAF. If you can't fix the problem technically or by patching, offering continuous monitoring is the answer (logs/Detections). Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 3 times
...
lifeblood12005
1 year, 9 months ago
As we cannot fix the vulnerability in the code right away, we can have rules in the WAF to mitigate the risk. The correct answer is: Implement MFA, review the application logs, and deploy a WAF
upvoted 2 times
...
DJK667
1 year, 11 months ago
c is the best
upvoted 3 times
...
margomi86
2 years ago
Selected Answer: C
C. Implement MFA, review the application logs, and deploy a WAF. Implementing MFA can add an extra layer of security to protect against unauthorized access if the vulnerability is exploited. Reviewing the application logs can help identify if any attempts have been made to exploit the vulnerability, and deploying a WAF can help block any attempts to exploit the vulnerability. While the other options may provide some level of security, they may not directly address the vulnerability and may not reduce the risk to an acceptable level.
upvoted 3 times
...
FOURDUE
2 years, 3 months ago
Selected Answer: C
Here is my concern with D. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away. If they can't fix the issue right away then why would they perform a full application review? Also, an official open source library where a vulnerability already exists? Going with MFA
upvoted 2 times
FOURDUE
2 years, 3 months ago
WAF Pros-- Web traffic filtering Bot Control Real-time visibility Easy to monitor web traffic Prevent against any type of attack, like SQL code injection Easy to create the rules Easy to filter the packet as per your requirement DDOs attack prevention It protects applications at layer 7 (HTTP) of the OSI model and not just layer 4 (TCP) The user can choose the traffic of their applications
upvoted 1 times
FOURDUE
2 years, 3 months ago
Specifying a repository serves no purpose. You already know the library has a vulnerability. You need something which mitigates the unauthorized access, which MFA does, and a properly configured WAF would also provide protection.
upvoted 1 times
...
...
...
Andre876
2 years, 5 months ago
tough one but i believe it is D. Why? the issue is confidentialty of information, i am thinking to prevent an attacker from performing a MITM attack a VPN would encrypt the traffic going across the internet. The vpn is the only thing that can guarantee confidentiality while data is in motion in this scenario
upvoted 3 times
angryelvis
2 years, 4 months ago
Interesting view. VPN addresses the unauthorized user, Official library with app review should prevent reoccurrence. Answer C is also good but overkill when compared to this. You persuaded me.
upvoted 2 times
...
...
ryanzou
2 years, 5 months ago
Selected Answer: C
C should be the answer
upvoted 2 times
...
Meraz
2 years, 9 months ago
C should be answer
upvoted 4 times
...
RevZig67
2 years, 11 months ago
Selected Answer: C
Best answer
upvoted 3 times
...
dgfhyjfghfgfkfhd
3 years ago
Selected Answer: C
Specifying a repository serves no purpose. You already know the library has a vulnerability. You need something which mitigates the unauthorized access, which MFA does, and a properly configured WAF would also provide protection.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago