exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 222 discussion

Actual exam question from CompTIA's CAS-004
Question #: 222
Topic #: 1
[All CAS-004 Questions]

A security analyst runs a vulnerability scan on a network administrator's workstation. The network administrator has direct administrative access to the company’s SSO web portal. The vulnerability scan uncovers critical vulnerabilities with equally high CVSS scores for the user's browser, OS, email client, and an offline password manager. Which of the following should the security analyst patch FIRST?

  • A. Email client
  • B. Password manager
  • C. Browser
  • D. OS
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Cock
Highly Voted 1 year, 9 months ago
Selected Answer: D
The highest priority for patching should be given to the Operating System (OS) first. This is because the OS is the foundation of the workstation and critical system functions depend on it. A compromised OS could mean that all the other applications and software running on the system are exposed to risks even with patched applications. Once all security holes from the OS are patched, then the security analyst should patch the browser, email client, and password manager in that order of priority.
upvoted 12 times
...
dragonflysecurity
Highly Voted 1 year, 9 months ago
Selected Answer: C
Given that the network administrator has direct administrative access to the company’s SSO web portal, it is crucial to prioritize the patching of vulnerabilities that can be exploited through the SSO web portal. Out of the vulnerabilities mentioned, the vulnerability in the user's browser is the most likely to be exploited through the SSO web portal. Therefore, it should be patched first to minimize the risk of a potential attacker gaining unauthorized access to the company's network.
upvoted 5 times
Ariel235788
1 year, 3 months ago
The OS being vulnerable would have a larger attack surface
upvoted 2 times
hb0011
11 months, 4 weeks ago
I think the fact that they specifically mention the sso portal is a clue that they're wanting you to select C.
upvoted 1 times
...
...
...
deeden
Most Recent 3 weeks, 6 days ago
Selected Answer: C
The browser is the most likely attack vector in this scenario because: 1. Direct exposure to external threats: Browsers are often used to access the internet, making them a primary target for phishing, malicious websites, and drive-by downloads. 2. SSO web portal access: The network administrator uses the browser to access the SSO web portal, which can lead to compromise of critical credentials if the browser is exploited. While important, OS vulnerabilities are less likely to be immediately exploited compared to a browser used for internet access.
upvoted 1 times
...
mansamusa
4 weeks, 1 day ago
Selected Answer: D
OS is the answer
upvoted 1 times
...
IT_Master_Tech
3 months ago
ChatGPT states C. Browser
upvoted 1 times
...
isaphiltrick
6 months ago
Selected Answer: C
99% of the time, the OS SHOULD be patched first but there's always exceptions, especially in cybersecurity. The question clearly states that "the network admin has direct administrative access to the company's SSO web portal." That means if that vulnerability is not addressed first, a hacker may be able to use session hijacking or other browser-based attacks to gain access to the SSO portal where hacker can then create privileged accounts for undetected entry in the future. By the time you patch your OS, your entire organization may have already been compromised by this web vulnerability.
upvoted 4 times
...
SangSang
6 months, 4 weeks ago
Selected Answer: C
OS is critical and need to patch as soon as possible, but OS often require a higher level of sophistication to exploit remotely, require local access or complex exploitation methods. OS compromise could allow full system control but might require additional steps to reach sensitive applications like the SSO portal. Browsers are frequently targeted by attackers because they are used to access the web, including the SSO web portal. Exploiting a browser vulnerability could allow an attacker to execute code, steal session cookies, or perform phishing attacks to gain access to the SSO portal and other sensitive systems. => Browsers are frequently exposed to web-based threats, compromising the browser could lead to immediate access to web-based applications, including the SSO portal, through session hijacking, credential theft, or phishing.
upvoted 3 times
...
talosDevbot
11 months, 3 weeks ago
Selected Answer: D
Patching the OS should be highest-priority Source: https://usa.kaspersky.com/blog/patching-priorities/28808/#:~:text=Operating%20systems,installed%20as%20quickly%20as%20possible.
upvoted 2 times
...
strong1
1 year, 2 months ago
The network administrator has direct administrative access to the company's SSO web portal, and the browser is the primary tool they use to interact with web applications, including the SSO portal. If the browser has critical vulnerabilities, it could be exploited to C: compromise the administrator's workstation and potentially gain access to sensitive systems and data through the SSO portal. Therefore, patching the browser vulnerabilities should be the first priority.
upvoted 1 times
...
Ariel235788
1 year, 3 months ago
Selected Answer: D
D. OS (Operating System). Explanation: OS Vulnerabilities: Operating system vulnerabilities often have broad-reaching consequences, as the OS provides the foundation for all other software running on the system. If the network administrator's workstation is compromised due to an OS vulnerability, it could lead to unauthorized access to critical systems and resources, including the SSO web portal. Browser, Email Client, and Password Manager: While vulnerabilities in these applications are also important to address, they are typically considered secondary to OS vulnerabilities. Compromising an OS can provide attackers with a higher level of control and access, potentially leading to the exploitation of other applications. Risk Prioritization: In vulnerability management, it's common to prioritize patching based on risk, which may consider factors such as the impact of exploitation, the availability of exploits, and the importance of the affected systems. Given that the network administrator has access to sensitive systems, protecting the OS is a primary concern.
upvoted 2 times
...
CXSSP
1 year, 4 months ago
By patching the operating system (OS) vulnerabilities first, you reduce the overall attack surface and mitigate potential security risks. After that, you can address the vulnerabilities in the browser, email client, and password manager in order of their severity. However, prioritizing the OS is essential to prevent attackers from exploiting vulnerabilities at the core of the system.
upvoted 2 times
...
josepa
1 year, 9 months ago
B: offline password manager D: OS is importan I have doubts
upvoted 3 times
Ariel235788
1 year, 3 months ago
if the OS is compromised, a TA could abuse much more. I think B would come 2nd to D
upvoted 1 times
...
...
smqzbq
1 year, 10 months ago
Selected Answer: C
It is required for the administrator to use browser to connect and perform work. PM is not a must-have, so I would go with browser
upvoted 4 times
...
OneSaint
1 year, 10 months ago
Selected Answer: B
Password Manager Server
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago